Files
cti/enterprise-attack/attack-pattern/attack-pattern--128c55d3-aeba-469f-bd3e-c8996ab4112a.json
T
2018-01-17 16:00:03 -05:00

54 lines
2.9 KiB
JSON

{
"type": "bundle",
"id": "bundle--5171618e-ffcf-4792-9793-d19f82c710e5",
"spec_version": "2.0",
"objects": [
{
"type": "attack-pattern",
"id": "attack-pattern--128c55d3-aeba-469f-bd3e-c8996ab4112a",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"created": "2017-05-31T21:31:12.675Z",
"modified": "2018-01-17T12:56:55.080Z",
"name": "Timestomp",
"description": "Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder. This is done, for example, on files that have been modified or created by the adversary so that they do not appear conspicuous to forensic investigators or file analysis tools. Timestomping may be used along with file name Masquerading to hide malware and tools. (Citation: WindowsIR Anti-Forensic Techniques)\n\nDetection: Forensic techniques exist to detect aspects of files that have had their timestamps modified. (Citation: WindowsIR Anti-Forensic Techniques) It may be possible to detect timestomping using file modification monitoring that collects information on file handle opens and can compare timestamp values.\n\nPlatforms: Linux, Windows\n\nData Sources: File monitoring, Process monitoring, Process command-line parameters\n\nDefense Bypassed: Host forensic analysis\n\nPermissions Required: User, Administrator, SYSTEM",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "defense-evasion"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/wiki/Technique/T1099",
"external_id": "T1099"
},
{
"source_name": "WindowsIR Anti-Forensic Techniques",
"description": "Carvey, H. (2013, July 23). HowTo: Determine/Detect the use of Anti-Forensics Techniques. Retrieved June 3, 2016.",
"url": "http://windowsir.blogspot.com/2013/07/howto-determinedetect-use-of-anti.html"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_data_sources": [
"File monitoring",
"Process monitoring",
"Process command-line parameters"
],
"x_mitre_defense_bypassed": [
"Host forensic analysis"
],
"x_mitre_permissions_required": [
"User",
"Administrator",
"SYSTEM"
],
"x_mitre_platforms": [
"Linux",
"Windows"
]
}
]
}