T1505.002 Transport Agent

Adversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsoft Exchange transport agents can operate on email messages passing through the transport pipeline to perform various tasks such as filtering spam, filtering malicious attachments, journaling, or adding a corporate signature to the end of all outgoing emails.(Citation: Microsoft TransportAgent Jun 2016)(Citation: ESET LightNeuron May 2019) Transport agents can be written by application developers and then compiled to .NET assemblies that are subsequently registered with the Exchange server. Transport agents will be invoked during a specified stage of email processing and carry out developer defined tasks.

Adversaries may register a malicious transport agent to provide a persistence mechanism in Exchange Server that can be triggered by adversary-specified email events.(Citation: ESET LightNeuron May 2019) Though a malicious transport agent may be invoked for all emails passing through the Exchange transport pipeline, the agent can be configured to only carry out specific tasks in response to adversary defined criteria. For example, the transport agent may only carry out an action like copying in-transit attachments and saving them for later exfiltration if the recipient email address matches an entry on a list provided by the adversary.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.IR-01.06 Production environment segregation Mitigates T1505.002 Transport Agent
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
References
    PR.AA-05.02 Privileged system access Mitigates T1505.002 Transport Agent
    Comments
    This diagnostic statement protects against Transport Agent through the use of privileged account management and the use of multi-factor authentication.
    References
      DE.CM-09.01 Software and data integrity checking Mitigates T1505.002 Transport Agent
      Comments
      This diagnostic statement protects against Transport Agent through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
      References
        PR.PS-01.03 Configuration deviation Mitigates T1505.002 Transport Agent
        Comments
        This diagnostic statement provides protection from Transport Agent through the implementation of security configuration baselines for OS, software, file integrity monitoring and imaging. Security baselining and integrity checking can help protect against adversaries attempting to compromise and modify software and its configurations.
        References

          NIST 800-53 Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          CM-06 Configuration Settings mitigates T1505.002 Transport Agent
          CM-05 Access Restrictions for Change mitigates T1505.002 Transport Agent
          SA-10 Developer Configuration Management mitigates T1505.002 Transport Agent
          SI-14 Non-persistence mitigates T1505.002 Transport Agent
          CM-11 User-installed Software mitigates T1505.002 Transport Agent
          SC-16 Transmission of Security and Privacy Attributes mitigates T1505.002 Transport Agent
          SR-11 Component Authenticity mitigates T1505.002 Transport Agent
          SR-04 Provenance mitigates T1505.002 Transport Agent
          SR-05 Acquisition Strategies, Tools, and Methods mitigates T1505.002 Transport Agent
          RA-05 Vulnerability Monitoring and Scanning mitigates T1505.002 Transport Agent
          CM-08 System Component Inventory mitigates T1505.002 Transport Agent
          SI-07 Software, Firmware, and Information Integrity mitigates T1505.002 Transport Agent
          AC-16 Security and Privacy Attributes mitigates T1505.002 Transport Agent
          CM-02 Baseline Configuration mitigates T1505.002 Transport Agent
          CM-02 Baseline Configuration mitigates T1505.002 Transport Agent
          SA-11 Developer Testing and Evaluation mitigates T1505.002 Transport Agent
          IA-02 Identification and Authentication (Organizational Users) mitigates T1505.002 Transport Agent
          SI-04 System Monitoring mitigates T1505.002 Transport Agent
          AC-02 Account Management mitigates T1505.002 Transport Agent
          AC-03 Access Enforcement mitigates T1505.002 Transport Agent
          AC-05 Separation of Duties mitigates T1505.002 Transport Agent
          AC-06 Least Privilege mitigates T1505.002 Transport Agent

          VERIS Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          action.hacking.variety.Abuse of functionality Abuse of functionality. related-to T1505.002 Transport Agent
          action.malware.variety.Backdoor Malware creates a backdoor capability for hacking. Child of 'RAT' when combined with 'Trojan'. Child of 'Backdoor or C2'. related-to T1505.002 Transport Agent
          action.malware.variety.Backdoor or C2 Malware creates a remote control capability, but it's unclear if it's a backdoor for hacking or C2 for malware. Parent of 'C2' and 'Backdoor'. related-to T1505.002 Transport Agent