Skip to content

Instantly share code, notes, and snippets.

@Cyb3rWard0g
Created November 12, 2019 05:34
Show Gist options
  • Save Cyb3rWard0g/8d0c1ffea0529638a2163a9a35a18070 to your computer and use it in GitHub Desktop.
Save Cyb3rWard0g/8d0c1ffea0529638a2163a9a35a18070 to your computer and use it in GitHub Desktop.
{
"type": "bundle",
"id": "bundle--2326ab0e-9d63-4777-bc72-ededcd8ed07a",
"spec_version": "2.0",
"objects": [
{
"x_mitre_permissions_required": [
"User"
],
"x_mitre_data_sources": [
"Host network interface",
"Netflow/Enclave netflow",
"Network protocol analysis",
"Packet capture",
"SSL/TLS inspection"
],
"name": "Web Service",
"description": "Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system.\n\nThese commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers.\n\nPopular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.\n\nUse of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed).",
"modified": "2019-07-18T21:21:18.135Z",
"id": "attack-pattern--830c9528-df21-472c-8c14-a036bf17d665",
"x_mitre_network_requirements": true,
"x_mitre_platforms": [
"Linux",
"macOS",
"Windows"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_version": "1.0",
"type": "attack-pattern",
"x_mitre_detection": "Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2)",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_contributors": [
"Anastasios Pingios"
],
"created": "2017-05-31T21:31:13.915Z",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "command-and-control"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "defense-evasion"
}
],
"external_references": [
{
"external_id": "T1102",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1102"
},
{
"source_name": "University of Birmingham C2",
"description": "Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.",
"url": "https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf"
}
],
"x_mitre_defense_bypassed": [
"Binary Analysis",
"Log analysis",
"Firewall"
]
}
]
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment