Trusted Design

TA0011 - Command and Control

戦術「Command and Control」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1001 Data Obfuscation Adversaries may obfuscate command and control traffic to make it more difficult to detect.(Citation: Bitdefender FunnyDr…
T1001.001 Junk Data Adversaries may add junk data to protocols used for command and control to make detection more difficult.(Citation: Fire…
T1001.002 Steganography Adversaries may use steganographic techniques to hide command and control traffic to make detection efforts more difficu…
T1001.003 Protocol or Service Impersonation Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thw…
T1008 Fallback Channels Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible i…
T1024 Custom Cryptographic Protocol Adversaries may use a custom cryptographic protocol or algorithm to hide command and control traffic. A simple scheme, s…
T1026 Multiband Communication **This technique has been deprecated and should no longer be used.** Some adversaries may split communications between …
T1032 Standard Cryptographic Protocol Adversaries may explicitly employ a known encryption algorithm to conceal command and control traffic rather than relyin…
T1043 Commonly Used Port **This technique has been deprecated. Please use [Non-Standard Port](https://attack.mitre.org/techniques/T1571) where ap…
T1065 Uncommonly Used Port Adversaries may conduct C2 communications over a non-standard port to bypass proxies and firewalls that have been improp…
T1071 Application Layer Protocol Adversaries may communicate using OSI application layer protocols to avoid detection/network filtering by blending in wi…
T1071.001 Web Protocols Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network fil…
T1071.002 File Transfer Protocols Adversaries may communicate using application layer protocols associated with transferring files to avoid detection/netw…
T1071.003 Mail Protocols Adversaries may communicate using application layer protocols associated with electronic mail delivery to avoid detectio…
T1071.004 DNS Adversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network fil…
T1071.005 Publish/Subscribe Protocols Adversaries may communicate using publish/subscribe (pub/sub) application layer protocols to avoid detection/network fil…
T1079 Multilayer Encryption An adversary performs C2 communications using multiple layers of encryption, typically (but not exclusively) tunneling a…
T1090 Proxy Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network c…
T1090.001 Internal Proxy Adversaries may use an internal proxy to direct command and control traffic between two or more systems in a compromised…
T1090.002 External Proxy Adversaries may use an external proxy to act as an intermediary for network communications to a command and control serv…
T1090.003 Multi-hop Proxy Adversaries may chain together multiple proxies to disguise the source of malicious traffic. Typically, a defender will …
T1090.004 Domain Fronting Adversaries may take advantage of routing schemes in Content Delivery Networks (CDNs) and other services which host mult…
T1092 Communication Through Removable Media Adversaries can perform command and control between compromised hosts on potentially disconnected networks using removab…
T1094 Custom Command and Control Protocol Adversaries may communicate using a custom command and control protocol instead of encapsulating commands/data in an exi…
T1095 Non-Application Layer Protocol Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected…
T1102 Web Service Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised syst…
T1102.001 Dead Drop Resolver Adversaries may use an existing, legitimate external Web service to host information that points to additional command a…
T1102.002 Bidirectional Communication Adversaries may use an existing, legitimate external Web service as a means for sending commands to and receiving output…
T1102.003 One-Way Communication Adversaries may use an existing, legitimate external Web service as a means for sending commands to a compromised system…
T1104 Multi-Stage Channels Adversaries may create multiple stages for command and control that are employed under different conditions or for certa…
T1105 Ingress Tool Transfer Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may…
T1132 Data Encoding Adversaries may encode data to make the content of command and control traffic more difficult to detect. Command and con…
T1132.001 Standard Encoding Adversaries may encode data with a standard data encoding system to make the content of command and control traffic more…
T1132.002 Non-Standard Encoding Adversaries may encode data with a non-standard data encoding system to make the content of command and control traffic …
T1172 Domain Fronting Domain fronting takes advantage of routing schemes in Content Delivery Networks (CDNs) and other services which host mul…
T1188 Multi-hop Proxy To disguise the source of malicious traffic, adversaries may chain together multiple proxies. Typically, a defender will…
T1219 Remote Access Tools An adversary may use legitimate remote access tools to establish an interactive command and control channel within a net…
T1219.001 IDE Tunneling Adversaries may abuse Integrated Development Environment (IDE) software with remote development features to establish an…
T1219.002 Remote Desktop Software An adversary may use legitimate desktop support software to establish an interactive command and control channel to targ…
T1219.003 Remote Access Hardware An adversary may use legitimate remote access hardware to establish an interactive command and control channel to target…
T1483 Domain Generation Algorithms Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination for command and co…
T1568 Dynamic Resolution Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and r…
T1568.001 Fast Flux DNS Adversaries may use Fast Flux DNS to hide a command and control channel behind an array of rapidly changing IP addresses…
T1568.002 Domain Generation Algorithms Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination domain for command…
T1568.003 DNS Calculation Adversaries may perform calculations on addresses returned in DNS results to determine which port and IP address to use …
T1571 Non-Standard Port Adversaries may communicate using a protocol and port pairing that are typically not associated. For example, HTTPS over…
T1572 Protocol Tunneling Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/…
T1573 Encrypted Channel Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inheren…
T1573.001 Symmetric Cryptography Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying…
T1573.002 Asymmetric Cryptography Adversaries may employ a known asymmetric encryption algorithm to conceal command and control traffic rather than relyin…
T1665 Hide Infrastructure Adversaries may manipulate network traffic in order to hide and evade detection of their C2 infrastructure. This can be …