test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /attack-pattern /attack-pattern--04fd5427-79c7-44ea-ae13-11b24778ff1c.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
3.68 kB
{
"type": "bundle",
"id": "bundle--acdf865d-5e24-4e0c-a9c1-9e9a0f260742",
"spec_version": "2.0",
"objects": [
{
"modified": "2023-03-03T00:31:33.071Z",
"name": "Standard Encoding",
"description": "Adversaries may encode data with a standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a standard data encoding system that adheres to existing protocol specifications. Common data encoding schemes include ASCII, Unicode, hexadecimal, Base64, and MIME.(Citation: Wikipedia Binary-to-text Encoding)(Citation: Wikipedia Character Encoding) Some data encoding systems may also result in data compression, such as gzip.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "command-and-control"
}
],
"x_mitre_detection": "Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used.(Citation: University of Birmingham C2)",
"x_mitre_platforms": [
"Linux",
"macOS",
"Windows"
],
"x_mitre_is_subtechnique": true,
"x_mitre_deprecated": false,
"x_mitre_domains": [
"enterprise-attack"
],
"x_mitre_version": "1.0",
"x_mitre_data_sources": [
"Network Traffic: Network Traffic Content"
],
"type": "attack-pattern",
"id": "attack-pattern--04fd5427-79c7-44ea-ae13-11b24778ff1c",
"created": "2020-03-14T23:36:52.095Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1132/001",
"external_id": "T1132.001"
},
{
"source_name": "University of Birmingham C2",
"description": "Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.",
"url": "https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf"
},
{
"source_name": "Wikipedia Binary-to-text Encoding",
"description": "Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017.",
"url": "https://en.wikipedia.org/wiki/Binary-to-text_encoding"
},
{
"source_name": "Wikipedia Character Encoding",
"description": "Wikipedia. (2017, February 19). Character Encoding. Retrieved March 1, 2017.",
"url": "https://en.wikipedia.org/wiki/Character_encoding"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}