7771 lines
141 KiB
JSON
7771 lines
141 KiB
JSON
[
|
|
{
|
|
"software_id": "S0001",
|
|
"software": "Trojan.Mebromi",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0001",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0002",
|
|
"software": "Mimikatz",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0002",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0003",
|
|
"software": "RIPTIDE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0003",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0004",
|
|
"software": "TinyZBot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0004",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0005",
|
|
"software": "Windows Credential Editor",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0005",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0006",
|
|
"software": "pwdump",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0006",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0007",
|
|
"software": "Skeleton Key",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0007",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0008",
|
|
"software": "gsecdump",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0008",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0009",
|
|
"software": "Hikit",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0009",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0010",
|
|
"software": "Lurid",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0010",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0011",
|
|
"software": "Taidoor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0011",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0012",
|
|
"software": "PoisonIvy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0012",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0013",
|
|
"software": "PlugX",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0013",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0014",
|
|
"software": "BS2005",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0014",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0015",
|
|
"software": "Ixeshe",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0015",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0016",
|
|
"software": "P2P ZeuS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0016",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0017",
|
|
"software": "BISCUIT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0017",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0018",
|
|
"software": "Sykipot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0018",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0019",
|
|
"software": "Regin",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0019",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0020",
|
|
"software": "China Chopper",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0020",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0021",
|
|
"software": "Derusbi",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0021",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0022",
|
|
"software": "Uroburos",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0022",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0023",
|
|
"software": "CHOPSTICK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0023",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0024",
|
|
"software": "Dyre",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0024",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0025",
|
|
"software": "CALENDAR",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0025",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0026",
|
|
"software": "GLOOXMAIL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0026",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0027",
|
|
"software": "Zeroaccess",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0027",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0028",
|
|
"software": "SHIPSHAPE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0028",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0029",
|
|
"software": "PsExec",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0029",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0030",
|
|
"software": "Carbanak",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0030",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0031",
|
|
"software": "BACKSPACE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0031",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0032",
|
|
"software": "gh0st RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0032",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0033",
|
|
"software": "NetTraveler",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0033",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0034",
|
|
"software": "NETEAGLE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0034",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0035",
|
|
"software": "SPACESHIP",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0035",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0036",
|
|
"software": "FLASHFLOOD",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0036",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0037",
|
|
"software": "HAMMERTOSS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0037",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0038",
|
|
"software": "Duqu",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0038",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0039",
|
|
"software": "Net",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0039",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0040",
|
|
"software": "HTRAN",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0040",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0041",
|
|
"software": "Wiper",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0041",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0042",
|
|
"software": "LOWBALL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0042",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0043",
|
|
"software": "BUBBLEWRAP",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0043",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0044",
|
|
"software": "JHUHUGIT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0044",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0045",
|
|
"software": "ADVSTORESHELL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0045",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0046",
|
|
"software": "CozyCar",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0046",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0047",
|
|
"software": "Hacking Team UEFI Rootkit",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0047",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": []
|
|
},
|
|
{
|
|
"software_id": "S0048",
|
|
"software": "PinchDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0048",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0049",
|
|
"software": "GeminiDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0049",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0050",
|
|
"software": "CosmicDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0050",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0051",
|
|
"software": "MiniDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0051",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0052",
|
|
"software": "OnionDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0052",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0053",
|
|
"software": "SeaDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0053",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0054",
|
|
"software": "CloudDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0054",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0055",
|
|
"software": "RARSTONE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0055",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0056",
|
|
"software": "Net Crawler",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0056",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0057",
|
|
"software": "Tasklist",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0057",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0058",
|
|
"software": "SslMM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0058",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0059",
|
|
"software": "WinMM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0059",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0060",
|
|
"software": "Sys10",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0060",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0061",
|
|
"software": "HDoor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0061",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0062",
|
|
"software": "DustySky",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0062",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0063",
|
|
"software": "SHOTPUT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0063",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0064",
|
|
"software": "ELMER",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0064",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0065",
|
|
"software": "4H RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0065",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0066",
|
|
"software": "3PARA RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0066",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0067",
|
|
"software": "pngdowner",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0067",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0068",
|
|
"software": "httpclient",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0068",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0069",
|
|
"software": "BLACKCOFFEE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0069",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0070",
|
|
"software": "HTTPBrowser",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0070",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0071",
|
|
"software": "hcdLoader",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0071",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0072",
|
|
"software": "OwaAuth",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0072",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0073",
|
|
"software": "ASPXSpy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0073",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0074",
|
|
"software": "Sakula",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0074",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0075",
|
|
"software": "Reg",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0075",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0076",
|
|
"software": "FakeM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0076",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0077",
|
|
"software": "CallMe",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0077",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0078",
|
|
"software": "Psylo",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0078",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0079",
|
|
"software": "MobileOrder",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0079",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": []
|
|
},
|
|
{
|
|
"software_id": "S0080",
|
|
"software": "Mivast",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0080",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0081",
|
|
"software": "Elise",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0081",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0082",
|
|
"software": "Emissary",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0082",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0083",
|
|
"software": "Misdat",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0083",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0084",
|
|
"software": "Mis-Type",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0084",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0085",
|
|
"software": "S-Type",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0085",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0086",
|
|
"software": "ZLib",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0086",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0087",
|
|
"software": "Hi-Zor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0087",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0088",
|
|
"software": "Kasidet",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0088",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0089",
|
|
"software": "BlackEnergy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0089",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0090",
|
|
"software": "Rover",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0090",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0091",
|
|
"software": "Epic",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0091",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0092",
|
|
"software": "Agent.btz",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0092",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0093",
|
|
"software": "Backdoor.Oldrea",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0093",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0094",
|
|
"software": "Trojan.Karagany",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0094",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0095",
|
|
"software": "FTP",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0095",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0096",
|
|
"software": "Systeminfo",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0096",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0097",
|
|
"software": "Ping",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0097",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0098",
|
|
"software": "T9000",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0098",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0099",
|
|
"software": "Arp",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0099",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0100",
|
|
"software": "ipconfig",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0100",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0101",
|
|
"software": "ifconfig",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0101",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0102",
|
|
"software": "nbtstat",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0102",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0103",
|
|
"software": "route",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0103",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0104",
|
|
"software": "netstat",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0104",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0105",
|
|
"software": "dsquery",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0105",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0106",
|
|
"software": "cmd",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0106",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0107",
|
|
"software": "Cherry Picker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0107",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0108",
|
|
"software": "netsh",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0108",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0109",
|
|
"software": "WEBC2",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0109",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0110",
|
|
"software": "at",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0110",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0111",
|
|
"software": "schtasks",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0111",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0112",
|
|
"software": "ROCKBOOT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0112",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0113",
|
|
"software": "Prikormka",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0113",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0114",
|
|
"software": "BOOTRASH",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0114",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0115",
|
|
"software": "Crimson",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0115",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0116",
|
|
"software": "UACMe",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0116",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0117",
|
|
"software": "XTunnel",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0117",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0118",
|
|
"software": "Nidiran",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0118",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0119",
|
|
"software": "Cachedump",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0119",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0120",
|
|
"software": "Fgdump",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0120",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0121",
|
|
"software": "Lslsass",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0121",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0122",
|
|
"software": "Pass-The-Hash Toolkit",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0122",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0123",
|
|
"software": "xCmd",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0123",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0124",
|
|
"software": "Pisloader",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0124",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0125",
|
|
"software": "Remsec",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0125",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0126",
|
|
"software": "ComRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0126",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0127",
|
|
"software": "BBSRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0127",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0128",
|
|
"software": "BADNEWS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0128",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0129",
|
|
"software": "AutoIt backdoor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0129",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0130",
|
|
"software": "Unknown Logger",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0130",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0131",
|
|
"software": "TINYTYPHON",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0131",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0132",
|
|
"software": "H1N1",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0132",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0133",
|
|
"software": "Miner-C",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0133",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0134",
|
|
"software": "Downdelph",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0134",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0135",
|
|
"software": "HIDEDRV",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0135",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0136",
|
|
"software": "USBStealer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0136",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0137",
|
|
"software": "CORESHELL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0137",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0138",
|
|
"software": "OLDBAIT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0138",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0139",
|
|
"software": "PowerDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0139",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0140",
|
|
"software": "Shamoon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0140",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0141",
|
|
"software": "Winnti for Windows",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0141",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0142",
|
|
"software": "StreamEx",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0142",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0143",
|
|
"software": "Flame",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0143",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0144",
|
|
"software": "ChChes",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0144",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0145",
|
|
"software": "POWERSOURCE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0145",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0146",
|
|
"software": "TEXTMATE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0146",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0147",
|
|
"software": "Pteranodon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0147",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0148",
|
|
"software": "RTM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0148",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0149",
|
|
"software": "MoonWind",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0149",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0150",
|
|
"software": "POSHSPY",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0150",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0151",
|
|
"software": "HALFBAKED",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0151",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0152",
|
|
"software": "EvilGrab",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0152",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0153",
|
|
"software": "RedLeaves",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0153",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0154",
|
|
"software": "Cobalt Strike",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0154",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0155",
|
|
"software": "WINDSHIELD",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0155",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0156",
|
|
"software": "KOMPROGO",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0156",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0157",
|
|
"software": "SOUNDBITE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0157",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0158",
|
|
"software": "PHOREAL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0158",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0159",
|
|
"software": "SNUGRIDE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0159",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0160",
|
|
"software": "certutil",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0160",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0161",
|
|
"software": "XAgentOSX",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0161",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0162",
|
|
"software": "Komplex",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0162",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0163",
|
|
"software": "Janicab",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0163",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0164",
|
|
"software": "TDTESS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0164",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0165",
|
|
"software": "OSInfo",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0165",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0166",
|
|
"software": "RemoteCMD",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0166",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0167",
|
|
"software": "Matryoshka",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0167",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0168",
|
|
"software": "Gazer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0168",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0169",
|
|
"software": "RawPOS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0169",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0170",
|
|
"software": "Helminth",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0170",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0171",
|
|
"software": "Felismus",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0171",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0172",
|
|
"software": "Reaver",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0172",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0173",
|
|
"software": "FLIPSIDE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0173",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0174",
|
|
"software": "Responder",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0174",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0175",
|
|
"software": "meek",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0175",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0176",
|
|
"software": "Wingbird",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0176",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0177",
|
|
"software": "Power Loader",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0177",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0178",
|
|
"software": "Truvasys",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0178",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0179",
|
|
"software": "MimiPenguin",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0179",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0180",
|
|
"software": "Volgmer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0180",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0181",
|
|
"software": "FALLCHILL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0181",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0182",
|
|
"software": "FinFisher",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0182",
|
|
"domain": [
|
|
"Enterprise",
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0183",
|
|
"software": "Tor",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0183",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0184",
|
|
"software": "POWRUNER",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0184",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0185",
|
|
"software": "SEASHARPEE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0185",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0186",
|
|
"software": "DownPaper",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0186",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0187",
|
|
"software": "Daserf",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0187",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0188",
|
|
"software": "Starloader",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0188",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0189",
|
|
"software": "ISMInjector",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0189",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0190",
|
|
"software": "BITSAdmin",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0190",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0191",
|
|
"software": "Winexe",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0191",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0192",
|
|
"software": "Pupy",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0192",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS",
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0193",
|
|
"software": "Forfiles",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0193",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0194",
|
|
"software": "PowerSploit",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0194",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0195",
|
|
"software": "SDelete",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0195",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0196",
|
|
"software": "PUNCHBUGGY",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0196",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0197",
|
|
"software": "PUNCHTRACK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0197",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0198",
|
|
"software": "NETWIRE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0198",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0199",
|
|
"software": "TURNEDUP",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0199",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0200",
|
|
"software": "Dipsind",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0200",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0201",
|
|
"software": "JPIN",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0201",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0202",
|
|
"software": "adbupd",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0202",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0203",
|
|
"software": "Hydraq",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0203",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0204",
|
|
"software": "Briba",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0204",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0205",
|
|
"software": "Naid",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0205",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0206",
|
|
"software": "Wiarp",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0206",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0207",
|
|
"software": "Vasport",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0207",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0208",
|
|
"software": "Pasam",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0208",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0210",
|
|
"software": "Nerex",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0210",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0211",
|
|
"software": "Linfo",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0211",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0212",
|
|
"software": "CORALDECK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0212",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0213",
|
|
"software": "DOGCALL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0213",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0214",
|
|
"software": "HAPPYWORK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0214",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0215",
|
|
"software": "KARAE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0215",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0216",
|
|
"software": "POORAIM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0216",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0217",
|
|
"software": "SHUTTERSPEED",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0217",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0218",
|
|
"software": "SLOWDRIFT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0218",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0219",
|
|
"software": "WINERACK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0219",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0220",
|
|
"software": "Chaos",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0220",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0221",
|
|
"software": "Umbreon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0221",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0222",
|
|
"software": "CCBkdr",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0222",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0223",
|
|
"software": "POWERSTATS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0223",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0224",
|
|
"software": "Havij",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0224",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0225",
|
|
"software": "sqlmap",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0225",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0226",
|
|
"software": "Smoke Loader",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0226",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0227",
|
|
"software": "spwebmember",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0227",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0228",
|
|
"software": "NanHaiShu",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0228",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0229",
|
|
"software": "Orz",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0229",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0230",
|
|
"software": "ZeroT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0230",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0231",
|
|
"software": "Invoke-PSImage",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0231",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0232",
|
|
"software": "HOMEFRY",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0232",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0233",
|
|
"software": "MURKYTOP",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0233",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0234",
|
|
"software": "Bandook",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0234",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0235",
|
|
"software": "CrossRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0235",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0236",
|
|
"software": "Kwampirs",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0236",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0237",
|
|
"software": "GravityRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0237",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0238",
|
|
"software": "Proxysvc",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0238",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0239",
|
|
"software": "Bankshot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0239",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0240",
|
|
"software": "ROKRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0240",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0241",
|
|
"software": "RATANKBA",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0241",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0242",
|
|
"software": "SynAck",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0242",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0243",
|
|
"software": "DealersChoice",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0243",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0244",
|
|
"software": "Comnie",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0244",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0245",
|
|
"software": "BADCALL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0245",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0246",
|
|
"software": "HARDRAIN",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0246",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0247",
|
|
"software": "NavRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0247",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0248",
|
|
"software": "yty",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0248",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0249",
|
|
"software": "Gold Dragon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0249",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0250",
|
|
"software": "Koadic",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0250",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0251",
|
|
"software": "Zebrocy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0251",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0252",
|
|
"software": "Brave Prince",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0252",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0253",
|
|
"software": "RunningRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0253",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0254",
|
|
"software": "PLAINTEE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0254",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0255",
|
|
"software": "DDKONG",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0255",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0256",
|
|
"software": "Mosquito",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0256",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0257",
|
|
"software": "VERMIN",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0257",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0258",
|
|
"software": "RGDoor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0258",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0259",
|
|
"software": "InnaputRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0259",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0260",
|
|
"software": "InvisiMole",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0260",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0261",
|
|
"software": "Catchamas",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0261",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0262",
|
|
"software": "QuasarRAT",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0262",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0263",
|
|
"software": "TYPEFRAME",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0263",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0264",
|
|
"software": "OopsIE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0264",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0265",
|
|
"software": "Kazuar",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0265",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0266",
|
|
"software": "TrickBot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0266",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0267",
|
|
"software": "FELIXROOT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0267",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0268",
|
|
"software": "Bisonal",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0268",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0269",
|
|
"software": "QUADAGENT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0269",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0270",
|
|
"software": "RogueRobin",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0270",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0271",
|
|
"software": "KEYMARBLE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0271",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0272",
|
|
"software": "NDiskMonitor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0272",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0273",
|
|
"software": "Socksbot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0273",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0274",
|
|
"software": "Calisto",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0274",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0275",
|
|
"software": "UPPERCUT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0275",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0276",
|
|
"software": "Keydnap",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0276",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0277",
|
|
"software": "FruitFly",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0277",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0278",
|
|
"software": "iKitten",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0278",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0279",
|
|
"software": "Proton",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0279",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0280",
|
|
"software": "MirageFox",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0280",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0281",
|
|
"software": "Dok",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0281",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0282",
|
|
"software": "MacSpy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0282",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0283",
|
|
"software": "jRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0283",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows",
|
|
"macOS",
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0284",
|
|
"software": "More_eggs",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0284",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0285",
|
|
"software": "OldBoot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0285",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0286",
|
|
"software": "OBAD",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0286",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0287",
|
|
"software": "ZergHelper",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0287",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0288",
|
|
"software": "KeyRaider",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0288",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0289",
|
|
"software": "Pegasus for iOS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0289",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0290",
|
|
"software": "Gooligan",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0290",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0291",
|
|
"software": "PJApps",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0291",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0292",
|
|
"software": "AndroRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0292",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0293",
|
|
"software": "BrainTest",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0293",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0294",
|
|
"software": "ShiftyBug",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0294",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0295",
|
|
"software": "RCSAndroid",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0295",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0297",
|
|
"software": "XcodeGhost",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0297",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0298",
|
|
"software": "Xbot",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0298",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0299",
|
|
"software": "NotCompatible",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0299",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0300",
|
|
"software": "DressCode",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0300",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0301",
|
|
"software": "Dendroid",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0301",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0302",
|
|
"software": "Twitoor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0302",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0303",
|
|
"software": "MazarBOT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0303",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0304",
|
|
"software": "Android/Chuli.A",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0304",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0305",
|
|
"software": "SpyNote RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0305",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0306",
|
|
"software": "Trojan-SMS.AndroidOS.FakeInst.a",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0306",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0307",
|
|
"software": "Trojan-SMS.AndroidOS.Agent.ao",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0307",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0308",
|
|
"software": "Trojan-SMS.AndroidOS.OpFake.a",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0308",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0309",
|
|
"software": "Adups",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0309",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0310",
|
|
"software": "ANDROIDOS_ANSERVER.A",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0310",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0311",
|
|
"software": "YiSpecter",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0311",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0312",
|
|
"software": "WireLurker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0312",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0313",
|
|
"software": "RuMMS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0313",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0314",
|
|
"software": "X-Agent for Android",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0314",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0315",
|
|
"software": "DualToy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0315",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android",
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0316",
|
|
"software": "Pegasus for Android",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0316",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0317",
|
|
"software": "Marcher",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0317",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0318",
|
|
"software": "XLoader for Android",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0318",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0319",
|
|
"software": "Allwinner",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0319",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0320",
|
|
"software": "DroidJack",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0320",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0321",
|
|
"software": "HummingWhale",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0321",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0322",
|
|
"software": "HummingBad",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0322",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0323",
|
|
"software": "Charger",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0323",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0324",
|
|
"software": "SpyDealer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0324",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0325",
|
|
"software": "Judy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0325",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0326",
|
|
"software": "RedDrop",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0326",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0327",
|
|
"software": "Skygofree",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0327",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0328",
|
|
"software": "Stealth Mango",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0328",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0329",
|
|
"software": "Tangelo",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0329",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0330",
|
|
"software": "Zeus Panda",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0330",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0331",
|
|
"software": "Agent Tesla",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0331",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0332",
|
|
"software": "Remcos",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0332",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0333",
|
|
"software": "UBoatRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0333",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0334",
|
|
"software": "DarkComet",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0334",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0335",
|
|
"software": "Carbon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0335",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0336",
|
|
"software": "NanoCore",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0336",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0337",
|
|
"software": "BadPatch",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0337",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0338",
|
|
"software": "Cobian RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0338",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0339",
|
|
"software": "Micropsia",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0339",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0340",
|
|
"software": "Octopus",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0340",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0341",
|
|
"software": "Xbash",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0341",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0342",
|
|
"software": "GreyEnergy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0342",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0343",
|
|
"software": "Exaramel for Windows",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0343",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0344",
|
|
"software": "Azorult",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0344",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0345",
|
|
"software": "Seasalt",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0345",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0346",
|
|
"software": "OceanSalt",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0346",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0347",
|
|
"software": "AuditCred",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0347",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0348",
|
|
"software": "Cardinal RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0348",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0349",
|
|
"software": "LaZagne",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0349",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"macOS",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0350",
|
|
"software": "zwShell",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0350",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0351",
|
|
"software": "Cannon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0351",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0352",
|
|
"software": "OSX_OCEANLOTUS.D",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0352",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0353",
|
|
"software": "NOKKI",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0353",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0354",
|
|
"software": "Denis",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0354",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0355",
|
|
"software": "Final1stspy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0355",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0356",
|
|
"software": "KONNI",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0356",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0357",
|
|
"software": "Impacket",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0357",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"macOS",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0358",
|
|
"software": "Ruler",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0358",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Office 365"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0359",
|
|
"software": "Nltest",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0359",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0360",
|
|
"software": "BONDUPDATER",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0360",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0361",
|
|
"software": "Expand",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0361",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0362",
|
|
"software": "Linux Rabbit",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0362",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0363",
|
|
"software": "Empire",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0363",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"macOS",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0364",
|
|
"software": "RawDisk",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0364",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0365",
|
|
"software": "Olympic Destroyer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0365",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0366",
|
|
"software": "WannaCry",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0366",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0367",
|
|
"software": "Emotet",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0367",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0368",
|
|
"software": "NotPetya",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0368",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0369",
|
|
"software": "CoinTicker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0369",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0370",
|
|
"software": "SamSam",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0370",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0371",
|
|
"software": "POWERTON",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0371",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0372",
|
|
"software": "LockerGoga",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0372",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0373",
|
|
"software": "Astaroth",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0373",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0374",
|
|
"software": "SpeakUp",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0374",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0375",
|
|
"software": "Remexi",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0375",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0376",
|
|
"software": "HOPLIGHT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0376",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0377",
|
|
"software": "Ebury",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0377",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0378",
|
|
"software": "PoshC2",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0378",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0379",
|
|
"software": "Revenge RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0379",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0380",
|
|
"software": "StoneDrill",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0380",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0381",
|
|
"software": "FlawedAmmyy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0381",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0382",
|
|
"software": "ServHelper",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0382",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0383",
|
|
"software": "FlawedGrace",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0383",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0384",
|
|
"software": "Dridex",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0384",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0385",
|
|
"software": "njRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0385",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0386",
|
|
"software": "Ursnif",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0386",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0387",
|
|
"software": "KeyBoy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0387",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0388",
|
|
"software": "YAHOYAH",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0388",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0389",
|
|
"software": "JCry",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0389",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": []
|
|
},
|
|
{
|
|
"software_id": "S0390",
|
|
"software": "SQLRat",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0390",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": []
|
|
},
|
|
{
|
|
"software_id": "S0391",
|
|
"software": "HAWKBALL",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0391",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0393",
|
|
"software": "PowerStallion",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0393",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0394",
|
|
"software": "HiddenWasp",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0394",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0395",
|
|
"software": "LightNeuron",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0395",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0396",
|
|
"software": "EvilBunny",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0396",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0397",
|
|
"software": "LoJax",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0397",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0398",
|
|
"software": "HyperBro",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0398",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0399",
|
|
"software": "Pallas",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0399",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0400",
|
|
"software": "RobbinHood",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0400",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0401",
|
|
"software": "Exaramel for Linux",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0401",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0402",
|
|
"software": "OSX/Shlayer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0402",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0403",
|
|
"software": "Riltok",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0403",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0404",
|
|
"software": "esentutl",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0404",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0405",
|
|
"software": "Exodus",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0405",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0406",
|
|
"software": "Gustuff",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0406",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0407",
|
|
"software": "Monokle",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0407",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0408",
|
|
"software": "FlexiSpy",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0408",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0409",
|
|
"software": "Machete",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0409",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0410",
|
|
"software": "Fysbis",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0410",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0411",
|
|
"software": "Rotexy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0411",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0412",
|
|
"software": "ZxShell",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0412",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0413",
|
|
"software": "MailSniper",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0413",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Office 365",
|
|
"Windows",
|
|
"Azure AD"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0414",
|
|
"software": "BabyShark",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0414",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0415",
|
|
"software": "BOOSTWRITE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0415",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0416",
|
|
"software": "RDFSNIFFER",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0416",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0417",
|
|
"software": "GRIFFON",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0417",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0418",
|
|
"software": "ViceLeaker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0418",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0419",
|
|
"software": "SimBad",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0419",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0420",
|
|
"software": "Dvmap",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0420",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0421",
|
|
"software": "GolfSpy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0421",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0422",
|
|
"software": "Anubis",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0422",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0423",
|
|
"software": "Ginp",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0423",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0424",
|
|
"software": "Triada",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0424",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0425",
|
|
"software": "Corona Updates",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0425",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0426",
|
|
"software": "Concipit1248",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0426",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0427",
|
|
"software": "TrickMo",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0427",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0428",
|
|
"software": "PoetRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0428",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0430",
|
|
"software": "Winnti for Linux",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0430",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0431",
|
|
"software": "HotCroissant",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0431",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0432",
|
|
"software": "Bread",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0432",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0433",
|
|
"software": "Rifdoor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0433",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0434",
|
|
"software": "Imminent Monitor",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0434",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0435",
|
|
"software": "PLEAD",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0435",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0436",
|
|
"software": "TSCookie",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0436",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0437",
|
|
"software": "Kivars",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0437",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0438",
|
|
"software": "Attor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0438",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0439",
|
|
"software": "Okrum",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0439",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0440",
|
|
"software": "Agent Smith",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0440",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0441",
|
|
"software": "PowerShower",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0441",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0442",
|
|
"software": "VBShower",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0442",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0443",
|
|
"software": "MESSAGETAP",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0443",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0444",
|
|
"software": "ShimRat",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0444",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0445",
|
|
"software": "ShimRatReporter",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0445",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0446",
|
|
"software": "Ryuk",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0446",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0447",
|
|
"software": "Lokibot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0447",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0448",
|
|
"software": "Rising Sun",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0448",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0449",
|
|
"software": "Maze",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0449",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0450",
|
|
"software": "SHARPSTATS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0450",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0451",
|
|
"software": "LoudMiner",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0451",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0452",
|
|
"software": "USBferry",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0452",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0453",
|
|
"software": "Pony",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0453",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0454",
|
|
"software": "Cadelspy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0454",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0455",
|
|
"software": "Metamorfo",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0455",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0456",
|
|
"software": "Aria-body",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0456",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0457",
|
|
"software": "Netwalker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0457",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0458",
|
|
"software": "Ramsay",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0458",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0459",
|
|
"software": "MechaFlounder",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0459",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0460",
|
|
"software": "Get2",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0460",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0461",
|
|
"software": "SDBbot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0461",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0462",
|
|
"software": "CARROTBAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0462",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0463",
|
|
"software": "INSOMNIA",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0463",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0464",
|
|
"software": "SYSCON",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0464",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0465",
|
|
"software": "CARROTBALL",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0465",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0466",
|
|
"software": "WindTail",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0466",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0467",
|
|
"software": "TajMahal",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0467",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0468",
|
|
"software": "Skidmap",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0468",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0469",
|
|
"software": "ABK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0469",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0470",
|
|
"software": "BBK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0470",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0471",
|
|
"software": "build_downer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0471",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0472",
|
|
"software": "down_new",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0472",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0473",
|
|
"software": "Avenger",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0473",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0475",
|
|
"software": "BackConfig",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0475",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0476",
|
|
"software": "Valak",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0476",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0477",
|
|
"software": "Goopy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0477",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0478",
|
|
"software": "EventBot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0478",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0479",
|
|
"software": "DEFENSOR ID",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0479",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0480",
|
|
"software": "Cerberus",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0480",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0481",
|
|
"software": "Ragnar Locker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0481",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0482",
|
|
"software": "Bundlore",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0482",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0483",
|
|
"software": "IcedID",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0483",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0484",
|
|
"software": "Carberp",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0484",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0485",
|
|
"software": "Mandrake",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0485",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0486",
|
|
"software": "Bonadan",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0486",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0487",
|
|
"software": "Kessel",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0487",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0488",
|
|
"software": "CrackMapExec",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0488",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0489",
|
|
"software": "WolfRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0489",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0490",
|
|
"software": "XLoader for iOS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0490",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0491",
|
|
"software": "StrongPity",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0491",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0492",
|
|
"software": "CookieMiner",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0492",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0493",
|
|
"software": "GoldenSpy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0493",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0494",
|
|
"software": "Zen",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0494",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0495",
|
|
"software": "RDAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0495",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0496",
|
|
"software": "REvil",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0496",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0497",
|
|
"software": "Dacls",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0497",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS",
|
|
"Linux",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0498",
|
|
"software": "Cryptoistic",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0498",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0499",
|
|
"software": "Hancitor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0499",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0500",
|
|
"software": "MCMD",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0500",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0501",
|
|
"software": "PipeMon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0501",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0502",
|
|
"software": "Drovorub",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0502",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0503",
|
|
"software": "FrameworkPOS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0503",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": []
|
|
},
|
|
{
|
|
"software_id": "S0504",
|
|
"software": "Anchor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0504",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0505",
|
|
"software": "Desert Scorpion",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0505",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0506",
|
|
"software": "ViperRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0506",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0507",
|
|
"software": "eSurv",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0507",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android",
|
|
"iOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0508",
|
|
"software": "Ngrok",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0508",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0509",
|
|
"software": "FakeSpy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0509",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0511",
|
|
"software": "RegDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0511",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0512",
|
|
"software": "FatDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0512",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0513",
|
|
"software": "LiteDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0513",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0514",
|
|
"software": "WellMess",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0514",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0515",
|
|
"software": "WellMail",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0515",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0516",
|
|
"software": "SoreFang",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0516",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0517",
|
|
"software": "Pillowmint",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0517",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0518",
|
|
"software": "PolyglotDuke",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0518",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0519",
|
|
"software": "SYNful Knock",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0519",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Network"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0520",
|
|
"software": "BLINDINGCAN",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0520",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0521",
|
|
"software": "BloodHound",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0521",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0522",
|
|
"software": "Exobot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0522",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0524",
|
|
"software": "AndroidOS/MalLocker.B",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0524",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0525",
|
|
"software": "Android/AdDisplay.Ashas",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0525",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0526",
|
|
"software": "KGH_SPY",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0526",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0527",
|
|
"software": "CSPY Downloader",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0527",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0528",
|
|
"software": "Javali",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0528",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0529",
|
|
"software": "CarbonSteal",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0529",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0530",
|
|
"software": "Melcoz",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0530",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0531",
|
|
"software": "Grandoreiro",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0531",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0532",
|
|
"software": "Lucifer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0532",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0533",
|
|
"software": "SLOTHFULMEDIA",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0533",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0534",
|
|
"software": "Bazar",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0534",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0535",
|
|
"software": "Golden Cup",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0535",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0536",
|
|
"software": "GPlayed",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0536",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0537",
|
|
"software": "HyperStack",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0537",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0538",
|
|
"software": "Crutch",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0538",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0539",
|
|
"software": "Red Alert 2.0",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0539",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0540",
|
|
"software": "Asacub",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0540",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0543",
|
|
"software": "Spark",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0543",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0544",
|
|
"software": "HenBox",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0544",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0545",
|
|
"software": "TERRACOTTA",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0545",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0546",
|
|
"software": "SharpStage",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0546",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0547",
|
|
"software": "DropBook",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0547",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0549",
|
|
"software": "SilkBean",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0549",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0550",
|
|
"software": "DoubleAgent",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0550",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0551",
|
|
"software": "GoldenEagle",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0551",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": []
|
|
},
|
|
{
|
|
"software_id": "S0552",
|
|
"software": "AdFind",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0552",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0553",
|
|
"software": "MoleNet",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0553",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0554",
|
|
"software": "Egregor",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0554",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0555",
|
|
"software": "CHEMISTGAMES",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0555",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0556",
|
|
"software": "Pay2Key",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0556",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0558",
|
|
"software": "Tiktok Pro",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0558",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0559",
|
|
"software": "SUNBURST",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0559",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0560",
|
|
"software": "TEARDROP",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0560",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0561",
|
|
"software": "GuLoader",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0561",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0562",
|
|
"software": "SUNSPOT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0562",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0564",
|
|
"software": "BlackMould",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0564",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0565",
|
|
"software": "Raindrop",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0565",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0567",
|
|
"software": "Dtrack",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0567",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0568",
|
|
"software": "EVILNUM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0568",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0569",
|
|
"software": "Explosive",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0569",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0570",
|
|
"software": "BitPaymer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0570",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0572",
|
|
"software": "Caterpillar WebShell",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0572",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0574",
|
|
"software": "BendyBear",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0574",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0575",
|
|
"software": "Conti",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0575",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0576",
|
|
"software": "MegaCortex",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0576",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0577",
|
|
"software": "FrozenCell",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0577",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0578",
|
|
"software": "SUPERNOVA",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0578",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0579",
|
|
"software": "Waterbear",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0579",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0581",
|
|
"software": "IronNetInjector",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0581",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0582",
|
|
"software": "LookBack",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0582",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0583",
|
|
"software": "Pysa",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0583",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0584",
|
|
"software": "AppleJeus",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0584",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0585",
|
|
"software": "Kerrdown",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0585",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0586",
|
|
"software": "TAINTEDSCRIBE",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0586",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0587",
|
|
"software": "Penquin",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0587",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0588",
|
|
"software": "GoldMax",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0588",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0589",
|
|
"software": "Sibot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0589",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0590",
|
|
"software": "NBTscan",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0590",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0591",
|
|
"software": "ConnectWise",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0591",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0592",
|
|
"software": "RemoteUtilities",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0592",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0593",
|
|
"software": "ECCENTRICBANDWAGON",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0593",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0594",
|
|
"software": "Out1",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0594",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0595",
|
|
"software": "ThiefQuest",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0595",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0596",
|
|
"software": "ShadowPad",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0596",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0597",
|
|
"software": "GoldFinder",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0597",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0598",
|
|
"software": "P.A.S. Webshell",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0598",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0599",
|
|
"software": "Kinsing",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0599",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Containers",
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0600",
|
|
"software": "Doki",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0600",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Containers"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0601",
|
|
"software": "Hildegard",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0601",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Containers",
|
|
"IaaS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0602",
|
|
"software": "Circles",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0602",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": []
|
|
},
|
|
{
|
|
"software_id": "S0603",
|
|
"software": "Stuxnet",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0603",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0604",
|
|
"software": "Industroyer",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0604",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0605",
|
|
"software": "EKANS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0605",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0606",
|
|
"software": "Bad Rabbit",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0606",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0607",
|
|
"software": "KillDisk",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0607",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Linux",
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0608",
|
|
"software": "Conficker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0608",
|
|
"domain": [
|
|
"Enterprise",
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0610",
|
|
"software": "SideTwist",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0610",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0611",
|
|
"software": "Clop",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0611",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0612",
|
|
"software": "WastedLocker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0612",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0613",
|
|
"software": "PS1",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0613",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0614",
|
|
"software": "CostaBricks",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0614",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0615",
|
|
"software": "SombRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0615",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0616",
|
|
"software": "DEATHRANSOM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0616",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0617",
|
|
"software": "HELLOKITTY",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0617",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0618",
|
|
"software": "FIVEHANDS",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0618",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0622",
|
|
"software": "AppleSeed",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0622",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0623",
|
|
"software": "Siloscape",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0623",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Containers"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0624",
|
|
"software": "Ecipekac",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0624",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0625",
|
|
"software": "Cuba",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0625",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0626",
|
|
"software": "P8RAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0626",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0627",
|
|
"software": "SodaMaster",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0627",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0628",
|
|
"software": "FYAnti",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0628",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0629",
|
|
"software": "RainyDay",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0629",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0630",
|
|
"software": "Nebulae",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0630",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0631",
|
|
"software": "Chaes",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0631",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0632",
|
|
"software": "GrimAgent",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0632",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0633",
|
|
"software": "Sliver",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0633",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux",
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0634",
|
|
"software": "EnvyScout",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0634",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0635",
|
|
"software": "BoomBox",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0635",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0636",
|
|
"software": "VaporRage",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0636",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0637",
|
|
"software": "NativeZone",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0637",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0638",
|
|
"software": "Babuk",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0638",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0639",
|
|
"software": "Seth-Locker",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0639",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0640",
|
|
"software": "Avaddon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0640",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0641",
|
|
"software": "Kobalos",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0641",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0642",
|
|
"software": "BADFLICK",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0642",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0643",
|
|
"software": "Peppy",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0643",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0644",
|
|
"software": "ObliqueRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0644",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0645",
|
|
"software": "Wevtutil",
|
|
"type": "Tool",
|
|
"url": "https://attack.mitre.org/software/S0645",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0646",
|
|
"software": "SpicyOmelette",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0646",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0647",
|
|
"software": "Turian",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0647",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows",
|
|
"Linux"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0648",
|
|
"software": "JSS Loader",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0648",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0649",
|
|
"software": "SMOKEDHAM",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0649",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0650",
|
|
"software": "QakBot",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0650",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0651",
|
|
"software": "BoxCaon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0651",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0652",
|
|
"software": "MarkiRAT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0652",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0653",
|
|
"software": "xCaon",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0653",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0654",
|
|
"software": "ProLock",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0654",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0655",
|
|
"software": "BusyGasper",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0655",
|
|
"domain": [
|
|
"Mobile"
|
|
],
|
|
"platform": [
|
|
"Android"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0657",
|
|
"software": "BLUELIGHT",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0657",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S0658",
|
|
"software": "XCSSET",
|
|
"type": "Malware",
|
|
"url": "https://attack.mitre.org/software/S0658",
|
|
"domain": [
|
|
"Enterprise"
|
|
],
|
|
"platform": [
|
|
"macOS"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S1000",
|
|
"software": "ACAD/Medre.A",
|
|
"type": "Malware",
|
|
"url": "https://collaborate.mitre.org/attackics/index.php/Software/S0018",
|
|
"domain": [
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S1006",
|
|
"software": "PLC-Blaster",
|
|
"type": "Malware",
|
|
"url": "https://collaborate.mitre.org/attackics/index.php/Software/S0009",
|
|
"domain": [
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S1009",
|
|
"software": "Triton",
|
|
"type": "Malware",
|
|
"url": "https://collaborate.mitre.org/attackics/index.php/Software/S0013",
|
|
"domain": [
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
},
|
|
{
|
|
"software_id": "S1010",
|
|
"software": "VPNFilter",
|
|
"type": "Malware",
|
|
"url": "https://collaborate.mitre.org/attackics/index.php/Software/S0002",
|
|
"domain": [
|
|
"ICS"
|
|
],
|
|
"platform": [
|
|
"Windows"
|
|
]
|
|
}
|
|
] |