| Name | Description | 
|---|---|
| Poison Ivy | |
| Darkmoon | 
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1010 | Application Window Discovery | ||
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.[3] | 
| .014 | Boot or Logon Autostart Execution: Active Setup | PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.[5][6][7] | ||
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.[3] | 
| Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service | PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.[3] | 
| Enterprise | T1005 | Data from Local System | PoisonIvy creates a backdoor through which remote attackers can steal system information.[3] | |
| Enterprise | T1074 | .001 | Data Staged: Local Data Staging | |
| Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography | PoisonIvy uses the Camellia cipher to encrypt communications.[1] | 
| Enterprise | T1105 | Ingress Tool Transfer | PoisonIvy creates a backdoor through which remote attackers can upload files.[3] | |
| Enterprise | T1056 | .001 | Input Capture: Keylogging | |
| Enterprise | T1112 | Modify Registry | PoisonIvy creates a Registry subkey that registers a new system device.[3] | |
| Enterprise | T1027 | Obfuscated Files or Information | PoisonIvy hides any strings related to its own indicators of compromise.[3] | |
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection | |
| Enterprise | T1014 | Rootkit | PoisonIvy starts a rootkit from a malicious file dropped to disk.[3] | |
| ID | Name | References | 
|---|---|---|
| G0017 | DragonOK | |
| G0018 | admin@338 | |
| G0045 | menuPass | |
| G0011 | PittyTiger | |
| G0002 | Moafee | |
| G0081 | Tropic Trooper | |
| G0066 | Elderwood | |
| G0021 | Molerats | |
| G0006 | APT1 | |
| G0093 | GALLIUM | |
| G0129 | Mustang Panda | |
| G0136 | IndigoZebra |