T1001 Data Obfuscation Mappings

Adversaries may obfuscate command and control traffic to make it more difficult to detect.(Citation: Bitdefender FunnyDream Campaign November 2020) Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content more difficult to discover or decipher and to make the communication less conspicuous and hide commands from being seen. This encompasses many methods, such as adding junk data to protocol traffic, using steganography, or impersonating legitimate protocols.

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-04 Information Flow Enforcement mitigates T1001 Data Obfuscation
CA-07 Continuous Monitoring mitigates T1001 Data Obfuscation
CM-06 Configuration Settings mitigates T1001 Data Obfuscation
SC-07 Boundary Protection mitigates T1001 Data Obfuscation
SI-03 Malicious Code Protection mitigates T1001 Data Obfuscation
SI-04 System Monitoring mitigates T1001 Data Obfuscation
CM-02 Baseline Configuration mitigates T1001 Data Obfuscation

VERIS Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.hacking.variety.Other Other related-to T1001 Data Obfuscation
action.hacking.variety.Evade Defenses Modification of the action (rather than the system, as in 'Disable controls') to avoid detection. related-to T1001 Data Obfuscation

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1001.003 Protocol or Service Impersonation 8
T1001.002 Steganography 13
T1001.001 Junk Data 8