subject
stringlengths
5
9
predicate
stringclasses
21 values
object
stringlengths
2
4.68k
source
stringclasses
1 value
object_type
stringclasses
6 values
meta
stringlengths
0
10.5k
T1055.011
rdf:type
Technique
attack
enum
{"version":"2.0","external_references":[{"url":"https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process","source_name":"Elastic Process Injection July 2017","description":"Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey...
T1055.011
name
Extra Window Memory Injection
attack
string
T1055.011
created
2020-01-14 17:18:32.126000+00:00
attack
date
T1055.011
modified
2026-05-12 15:12:00.617000+00:00
attack
date
T1055.011
description
Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges. EWM injection is a method of executing arbitrary code in the address space of a separate live process. Before creating a window, graphical Windows-based pro...
attack
string
T1055.011
platform
Windows
attack
string
T1055.011
domain
enterprise-attack
attack
string
T1055.011
is-subtechnique
true
attack
boolean
T1055.011
url
https://attack.mitre.org/techniques/T1055/011
attack
url
T1055.011
belongs-to-tactic
TA0005
attack
id
T1055.011
belongs-to-tactic
TA0004
attack
id
T1053.005
rdf:type
Technique
attack
enum
{"version":"1.8","external_references":[{"url":"https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain","source_name":"ProofPoint Serpent","description":"Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities...
T1053.005
name
Scheduled Task
attack
string
T1053.005
created
2019-11-27 14:58:00.429000+00:00
attack
date
T1053.005
modified
2026-05-12 15:12:00.618000+00:00
attack
date
T1053.005
description
Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The [schtasks](https://attack.mitre.org/software/S0111) utility can be run directly on the command line, or the Task Schedule...
attack
string
T1053.005
platform
Windows
attack
string
T1053.005
domain
enterprise-attack
attack
string
T1053.005
is-subtechnique
true
attack
boolean
T1053.005
url
https://attack.mitre.org/techniques/T1053/005
attack
url
T1053.005
belongs-to-tactic
TA0002
attack
id
T1053.005
belongs-to-tactic
TA0003
attack
id
T1053.005
belongs-to-tactic
TA0004
attack
id
T1205.002
rdf:type
Technique
attack
enum
{"version":"2.0","external_references":[{"url":"https://exatrack.com/public/Tricephalic_Hellkeeper.pdf","source_name":"exatrack bpf filters passive backdoors","description":"ExaTrack. (2022, May 11). Tricephalic Hellkeeper: a tale of a passive backdoor. Retrieved October 18, 2022."},{"url":"https://www.leonardo.com/doc...
T1205.002
name
Socket Filters
attack
string
T1205.002
created
2022-09-30 21:18:41.930000+00:00
attack
date
T1205.002
modified
2026-05-12 15:12:00.619000+00:00
attack
date
T1205.002
description
Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command and control. With elevated permissions, adversaries can use features such as the `libpcap` library to open sockets and install filters to allow or disallow certain types of data to come through the sock...
attack
string
T1205.002
platform
Linux
attack
string
T1205.002
platform
macOS
attack
string
T1205.002
platform
Windows
attack
string
T1205.002
domain
enterprise-attack
attack
string
T1205.002
is-subtechnique
true
attack
boolean
T1205.002
url
https://attack.mitre.org/techniques/T1205/002
attack
url
T1205.002
belongs-to-tactic
TA0005
attack
id
T1205.002
belongs-to-tactic
TA0003
attack
id
T1205.002
belongs-to-tactic
TA0011
attack
id
T1066
rdf:type
Technique
attack
enum
{"version":"1.1"}
T1066
name
Indicator Removal from Tools
attack
string
T1066
created
2017-05-31 21:30:54.176000+00:00
attack
date
T1066
modified
2026-04-14 22:53:15.802000+00:00
attack
date
T1066
description
If a malicious tool is detected and quarantined or otherwise curtailed, an adversary may be able to determine why the malicious tool was detected (the indicator), modify the tool by removing the indicator, and use the updated version that is no longer detected by the target's defensive systems or subsequent targets tha...
attack
string
T1066
platform
Linux
attack
string
T1066
platform
macOS
attack
string
T1066
platform
Windows
attack
string
T1066
domain
enterprise-attack
attack
string
T1066
is-subtechnique
false
attack
boolean
T1066
revoked
true
attack
boolean
T1066
url
https://attack.mitre.org/techniques/T1066
attack
url
T1066
belongs-to-tactic
TA0005
attack
id
T1560.001
rdf:type
Technique
attack
enum
{"version":"1.3","external_references":[{"url":"https://www.rarlab.com/","source_name":"WinRAR Homepage","description":"A. Roshal. (2020). RARLAB. Retrieved February 20, 2020."},{"url":"https://www.winzip.com/win/en/","source_name":"WinZip Homepage","description":"Corel Corporation. (2020). WinZip. Retrieved February 2...
T1560.001
name
Archive via Utility
attack
string
T1560.001
created
2020-02-20 21:01:25.428000+00:00
attack
date
T1560.001
modified
2026-05-12 15:12:00.619000+00:00
attack
date
T1560.001
description
Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into a format that is easier/more secure to transport. Adversaries may abuse various utilities to compress or encrypt data before exfiltr...
attack
string
T1560.001
platform
Linux
attack
string
T1560.001
platform
macOS
attack
string
T1560.001
platform
Windows
attack
string
T1560.001
domain
enterprise-attack
attack
string
T1560.001
is-subtechnique
true
attack
boolean
T1560.001
url
https://attack.mitre.org/techniques/T1560/001
attack
url
T1560.001
belongs-to-tactic
TA0009
attack
id
T1021.005
rdf:type
Technique
attack
enum
{"version":"1.2","external_references":[{"url":"https://pentestlab.blog/2012/10/30/attacking-vnc-servers/","source_name":"Attacking VNC Servers PentestLab","description":"Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021."},{"url":"https://support.apple.com/gui...
T1021.005
name
VNC
attack
string
T1021.005
created
2020-02-11 18:28:44.950000+00:00
attack
date
T1021.005
modified
2025-10-24 17:48:19.567000+00:00
attack
date
T1021.005
description
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by re...
attack
string
T1021.005
platform
Linux
attack
string
T1021.005
platform
Windows
attack
string
T1021.005
platform
macOS
attack
string
T1021.005
domain
enterprise-attack
attack
string
T1021.005
is-subtechnique
true
attack
boolean
T1021.005
url
https://attack.mitre.org/techniques/T1021/005
attack
url
T1021.005
belongs-to-tactic
TA0008
attack
id
T1047
rdf:type
Technique
attack
enum
{"version":"1.6","external_references":[{"url":"https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf","source_name":"FireEye WMI 2015","description":"Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensic...
T1047
name
Windows Management Instrumentation
attack
string
T1047
created
2017-05-31 21:30:44.329000+00:00
attack
date
T1047
modified
2026-05-12 15:12:00.619000+00:00
attack
date
T1047
description
Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is designed for programmers and is the infrastructure for management data and operations on Windows systems.(Citation: WMI 1-3) WMI is an administration feature that provides a uniform environment to access Wi...
attack
string
T1047
platform
Windows
attack
string
T1047
domain
enterprise-attack
attack
string
T1047
is-subtechnique
false
attack
boolean
T1047
url
https://attack.mitre.org/techniques/T1047
attack
url
T1047
belongs-to-tactic
TA0002
attack
id
T1687
rdf:type
Technique
attack
enum
{"version":"1.0","external_references":[{"url":"https://www.bleepingcomputer.com/news/security/hackers-exploited-salesforce-zero-day-in-facebook-phishing-attack/","source_name":"Salesforce zero-day in facebook phishing attack","description":"Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebo...
T1687
name
Exploitation for Defense Impairment
attack
string
T1687
created
2026-04-14 22:53:27.621000+00:00
attack
date
T1687
modified
2026-05-12 15:12:00.619000+00:00
attack
date
T1687
description
Adversaries may exploit vulnerabilities in security software, infrastructure, or defensive components to degrade, disable, or otherwise continue to impair their ability to prevent, detect, or respond to malicious activity. Adversaries may exploit a system or application vulnerability to directly interfere with defen...
attack
string
T1687
platform
IaaS
attack
string
T1687
platform
Linux
attack
string
T1687
platform
macOS
attack
string
T1687
platform
SaaS
attack
string
T1687
platform
Windows
attack
string
T1687
domain
enterprise-attack
attack
string
T1687
is-subtechnique
false
attack
boolean
T1687
url
https://attack.mitre.org/techniques/T1687
attack
url
T1687
belongs-to-tactic
TA0112
attack
id
T1156
rdf:type
Technique
attack
enum
{"version":"1.2","external_references":[{"url":"https://www.intezer.com/blog/research/kaiji-new-chinese-linux-malware-turning-to-golang/","source_name":"intezer-kaiji-malware","description":"Paul Litvak. (2020, May 4). Kaiji: New Chinese Linux malware turning to Golang. Retrieved December 17, 2020."}]}
T1156
name
Malicious Shell Modification
attack
string