subject stringlengths 5 9 | predicate stringclasses 21
values | object stringlengths 2 4.68k | source stringclasses 1
value | object_type stringclasses 6
values | meta stringlengths 0 10.5k |
|---|---|---|---|---|---|
T1055.011 | rdf:type | Technique | attack | enum | {"version":"2.0","external_references":[{"url":"https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process","source_name":"Elastic Process Injection July 2017","description":"Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey... |
T1055.011 | name | Extra Window Memory Injection | attack | string | |
T1055.011 | created | 2020-01-14 17:18:32.126000+00:00 | attack | date | |
T1055.011 | modified | 2026-05-12 15:12:00.617000+00:00 | attack | date | |
T1055.011 | description | Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges. EWM injection is a method of executing arbitrary code in the address space of a separate live process.
Before creating a window, graphical Windows-based pro... | attack | string | |
T1055.011 | platform | Windows | attack | string | |
T1055.011 | domain | enterprise-attack | attack | string | |
T1055.011 | is-subtechnique | true | attack | boolean | |
T1055.011 | url | https://attack.mitre.org/techniques/T1055/011 | attack | url | |
T1055.011 | belongs-to-tactic | TA0005 | attack | id | |
T1055.011 | belongs-to-tactic | TA0004 | attack | id | |
T1053.005 | rdf:type | Technique | attack | enum | {"version":"1.8","external_references":[{"url":"https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain","source_name":"ProofPoint Serpent","description":"Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities... |
T1053.005 | name | Scheduled Task | attack | string | |
T1053.005 | created | 2019-11-27 14:58:00.429000+00:00 | attack | date | |
T1053.005 | modified | 2026-05-12 15:12:00.618000+00:00 | attack | date | |
T1053.005 | description | Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The [schtasks](https://attack.mitre.org/software/S0111) utility can be run directly on the command line, or the Task Schedule... | attack | string | |
T1053.005 | platform | Windows | attack | string | |
T1053.005 | domain | enterprise-attack | attack | string | |
T1053.005 | is-subtechnique | true | attack | boolean | |
T1053.005 | url | https://attack.mitre.org/techniques/T1053/005 | attack | url | |
T1053.005 | belongs-to-tactic | TA0002 | attack | id | |
T1053.005 | belongs-to-tactic | TA0003 | attack | id | |
T1053.005 | belongs-to-tactic | TA0004 | attack | id | |
T1205.002 | rdf:type | Technique | attack | enum | {"version":"2.0","external_references":[{"url":"https://exatrack.com/public/Tricephalic_Hellkeeper.pdf","source_name":"exatrack bpf filters passive backdoors","description":"ExaTrack. (2022, May 11). Tricephalic Hellkeeper: a tale of a passive backdoor. Retrieved October 18, 2022."},{"url":"https://www.leonardo.com/doc... |
T1205.002 | name | Socket Filters | attack | string | |
T1205.002 | created | 2022-09-30 21:18:41.930000+00:00 | attack | date | |
T1205.002 | modified | 2026-05-12 15:12:00.619000+00:00 | attack | date | |
T1205.002 | description | Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command and control. With elevated permissions, adversaries can use features such as the `libpcap` library to open sockets and install filters to allow or disallow certain types of data to come through the sock... | attack | string | |
T1205.002 | platform | Linux | attack | string | |
T1205.002 | platform | macOS | attack | string | |
T1205.002 | platform | Windows | attack | string | |
T1205.002 | domain | enterprise-attack | attack | string | |
T1205.002 | is-subtechnique | true | attack | boolean | |
T1205.002 | url | https://attack.mitre.org/techniques/T1205/002 | attack | url | |
T1205.002 | belongs-to-tactic | TA0005 | attack | id | |
T1205.002 | belongs-to-tactic | TA0003 | attack | id | |
T1205.002 | belongs-to-tactic | TA0011 | attack | id | |
T1066 | rdf:type | Technique | attack | enum | {"version":"1.1"} |
T1066 | name | Indicator Removal from Tools | attack | string | |
T1066 | created | 2017-05-31 21:30:54.176000+00:00 | attack | date | |
T1066 | modified | 2026-04-14 22:53:15.802000+00:00 | attack | date | |
T1066 | description | If a malicious tool is detected and quarantined or otherwise curtailed, an adversary may be able to determine why the malicious tool was detected (the indicator), modify the tool by removing the indicator, and use the updated version that is no longer detected by the target's defensive systems or subsequent targets tha... | attack | string | |
T1066 | platform | Linux | attack | string | |
T1066 | platform | macOS | attack | string | |
T1066 | platform | Windows | attack | string | |
T1066 | domain | enterprise-attack | attack | string | |
T1066 | is-subtechnique | false | attack | boolean | |
T1066 | revoked | true | attack | boolean | |
T1066 | url | https://attack.mitre.org/techniques/T1066 | attack | url | |
T1066 | belongs-to-tactic | TA0005 | attack | id | |
T1560.001 | rdf:type | Technique | attack | enum | {"version":"1.3","external_references":[{"url":"https://www.rarlab.com/","source_name":"WinRAR Homepage","description":"A. Roshal. (2020). RARLAB. Retrieved February 20, 2020."},{"url":"https://www.winzip.com/win/en/","source_name":"WinZip Homepage","description":"Corel Corporation. (2020). WinZip. Retrieved February 2... |
T1560.001 | name | Archive via Utility | attack | string | |
T1560.001 | created | 2020-02-20 21:01:25.428000+00:00 | attack | date | |
T1560.001 | modified | 2026-05-12 15:12:00.619000+00:00 | attack | date | |
T1560.001 | description | Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into a format that is easier/more secure to transport.
Adversaries may abuse various utilities to compress or encrypt data before exfiltr... | attack | string | |
T1560.001 | platform | Linux | attack | string | |
T1560.001 | platform | macOS | attack | string | |
T1560.001 | platform | Windows | attack | string | |
T1560.001 | domain | enterprise-attack | attack | string | |
T1560.001 | is-subtechnique | true | attack | boolean | |
T1560.001 | url | https://attack.mitre.org/techniques/T1560/001 | attack | url | |
T1560.001 | belongs-to-tactic | TA0009 | attack | id | |
T1021.005 | rdf:type | Technique | attack | enum | {"version":"1.2","external_references":[{"url":"https://pentestlab.blog/2012/10/30/attacking-vnc-servers/","source_name":"Attacking VNC Servers PentestLab","description":"Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021."},{"url":"https://support.apple.com/gui... |
T1021.005 | name | VNC | attack | string | |
T1021.005 | created | 2020-02-11 18:28:44.950000+00:00 | attack | date | |
T1021.005 | modified | 2025-10-24 17:48:19.567000+00:00 | attack | date | |
T1021.005 | description | Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by re... | attack | string | |
T1021.005 | platform | Linux | attack | string | |
T1021.005 | platform | Windows | attack | string | |
T1021.005 | platform | macOS | attack | string | |
T1021.005 | domain | enterprise-attack | attack | string | |
T1021.005 | is-subtechnique | true | attack | boolean | |
T1021.005 | url | https://attack.mitre.org/techniques/T1021/005 | attack | url | |
T1021.005 | belongs-to-tactic | TA0008 | attack | id | |
T1047 | rdf:type | Technique | attack | enum | {"version":"1.6","external_references":[{"url":"https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf","source_name":"FireEye WMI 2015","description":"Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensic... |
T1047 | name | Windows Management Instrumentation | attack | string | |
T1047 | created | 2017-05-31 21:30:44.329000+00:00 | attack | date | |
T1047 | modified | 2026-05-12 15:12:00.619000+00:00 | attack | date | |
T1047 | description | Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is designed for programmers and is the infrastructure for management data and operations on Windows systems.(Citation: WMI 1-3) WMI is an administration feature that provides a uniform environment to access Wi... | attack | string | |
T1047 | platform | Windows | attack | string | |
T1047 | domain | enterprise-attack | attack | string | |
T1047 | is-subtechnique | false | attack | boolean | |
T1047 | url | https://attack.mitre.org/techniques/T1047 | attack | url | |
T1047 | belongs-to-tactic | TA0002 | attack | id | |
T1687 | rdf:type | Technique | attack | enum | {"version":"1.0","external_references":[{"url":"https://www.bleepingcomputer.com/news/security/hackers-exploited-salesforce-zero-day-in-facebook-phishing-attack/","source_name":"Salesforce zero-day in facebook phishing attack","description":"Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebo... |
T1687 | name | Exploitation for Defense Impairment | attack | string | |
T1687 | created | 2026-04-14 22:53:27.621000+00:00 | attack | date | |
T1687 | modified | 2026-05-12 15:12:00.619000+00:00 | attack | date | |
T1687 | description | Adversaries may exploit vulnerabilities in security software, infrastructure, or defensive components to degrade, disable, or otherwise continue to impair their ability to prevent, detect, or respond to malicious activity.
Adversaries may exploit a system or application vulnerability to directly interfere with defen... | attack | string | |
T1687 | platform | IaaS | attack | string | |
T1687 | platform | Linux | attack | string | |
T1687 | platform | macOS | attack | string | |
T1687 | platform | SaaS | attack | string | |
T1687 | platform | Windows | attack | string | |
T1687 | domain | enterprise-attack | attack | string | |
T1687 | is-subtechnique | false | attack | boolean | |
T1687 | url | https://attack.mitre.org/techniques/T1687 | attack | url | |
T1687 | belongs-to-tactic | TA0112 | attack | id | |
T1156 | rdf:type | Technique | attack | enum | {"version":"1.2","external_references":[{"url":"https://www.intezer.com/blog/research/kaiji-new-chinese-linux-malware-turning-to-golang/","source_name":"intezer-kaiji-malware","description":"Paul Litvak. (2020, May 4). Kaiji: New Chinese Linux malware turning to Golang. Retrieved December 17, 2020."}]} |
T1156 | name | Malicious Shell Modification | attack | string |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.