T1001 Data Obfuscation Mappings

Adversaries may obfuscate command and control traffic to make it more difficult to detect. Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content more difficult to discover or decipher and to make the communication less conspicuous and hide commands from being seen. This encompasses many methods, such as adding junk data to protocol traffic, using steganography, or impersonating legitimate protocols.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-4 Information Flow Enforcement Protects T1001 Data Obfuscation
CA-7 Continuous Monitoring Protects T1001 Data Obfuscation
CM-2 Baseline Configuration Protects T1001 Data Obfuscation
CM-6 Configuration Settings Protects T1001 Data Obfuscation
SC-7 Boundary Protection Protects T1001 Data Obfuscation
SI-3 Malicious Code Protection Protects T1001 Data Obfuscation
SI-4 System Monitoring Protects T1001 Data Obfuscation
action.hacking.variety.Use of backdoor or C2 Use of Backdoor or C2 channel related-to T1001 Data Obfuscation
action.hacking.vector.Backdoor or C2 Backdoor or command and control channel related-to T1001 Data Obfuscation
action.malware.variety.Unknown Unknown related-to T1001 Data Obfuscation

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1001.001 Junk Data 9
T1001.003 Protocol Impersonation 8
T1001.002 Steganography 8