Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Data Encoding
  5. Non-Standard Encoding

Data Encoding: Non-Standard Encoding

IDName
T1132.001 Standard Encoding
T1132.002 Non-Standard Encoding

Adversaries may encode data with a non-standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a non-standard data encoding system that diverges from existing protocol specifications. Non-standard data encoding schemes may be based on or related to standard data encoding schemes, such as a modified Base64 encoding for the message body of an HTTP request.[1][2]

ID: T1132.002
Sub-technique of: T1132
Platforms: ESXi, Linux, Windows, macOS
Version: 1.1
Created: 14 March 2020
Last Modified: 24 October 2025

Procedure Examples

IDNameDescription
S0031 BACKSPACE

Newer variants ofBACKSPACE will encode C2 communications with a custom system.[3]

S0239 Bankshot

Bankshot encodes commands from the control server using a range of characters and gzip.[4]

S1149 CHIMNEYSWEEP

CHIMNEYSWEEP can use a custom Base64 alphabet for encoding C2.[5]

S0687 Cyclops Blink

Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.[6]

S0260 InvisiMole

InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests.[7]

S0681 Lizar

Lizar has used a complex XOR operation to obfuscate C2 communications.[8]

S1189 Neo-reGeorg

Neo-reGeorg can use modified Base64 encoding to obfuscate communications.[9]

S1090 NightClub

NightClub has used a non-standard encoding in DNS tunneling removing any= from the result of base64 encoding, and replacing/ characters with-s and+ characters with-p.[10]

S1100 Ninja

Ninja can encode C2 communications with a base64 algorithm using a custom alphabet.[11]

S0346 OceanSalt

OceanSalt can encode data with a NOT operation before sending the data to the control server.[12]

S1046 PowGoop

PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.[13]

S0495 RDAT

RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions.[14]

S0596 ShadowPad

ShadowPad has encoded data as readable Latin characters.[15]

S1035 Small Sieve

Small Sieve can use a custom hex byte swapping encoding scheme to obfuscate tasking traffic.[16][17]

S1239 TONESHELL

TONESHELL has encoded a payload with a random 32-byte key using XOR.[18]TONESHELL has also encoded payloads with a 256-byte key using XOR.[19]

S0022 Uroburos

Uroburos can use a custom base62 and a de-facto base32 encoding that uses digits 0-9 and lowercase letters a-z in C2 communications.[20]

Mitigations

IDMitigationDescription
M1031 Network Intrusion Prevention

Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific obfuscation technique used by a particular adversary or tool, and will likely be different across various malware families and versions. Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0326Behavior-chain detection for T1132.002 Data Encoding: Non-Standard Encoding across Windows, Linux, macOS, ESXiAN0927

A process/script constructs or references a custom/alphabet translation table (e.g., 64/85/32+ arbitrary chars, XOR/base-N loops) or emits long high-entropy strings that do NOT validate as standard Base64/Hex → shortly after, the same process (or its child) generates outbound traffic with asymmetric bytes_out:bytes_in, fixed-size beacons, or protocol/header mismatches (e.g., Content-Type says JSON but body fails JSON parse / contains non-standard alphabet).

AN0928

Shell scripts or binaries implement custom mapping tables (tr/sed/awk/golang/rust/python encode loops), or emit long high-entropy tokens that fail Base64/Hex validation → correlated with egress showing asymmetric flow, protocol-mismatch payloads, or DNS/HTTP bodies containing low-diversity-but-long custom alphabets.

AN0929

EndpointSecurity/Unified Logs show processes generating custom alphabets or long high-entropy, non-standard tokens → network logs (PF/Zeek/EDR) show asymmetric beacons, protocol mismatches, or periodic fixed-size posts.

AN0930

ESXi shell or scripts produce long, high-entropy tokens (non-standard alphabets) in shell.log/hostd, followed by outbound flows (NSX/Zeek) with asymmetric ratios or protocol mismatches to non-management endpoints.

References

  1. Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017.
  2. Wikipedia. (2017, February 19). Character Encoding. Retrieved March 1, 2017.
  3. FireEye Labs. (2015, April). APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION. Retrieved November 17, 2024.
  4. Sherstobitoff, R. (2018, March 08). Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant. Retrieved May 18, 2018.
  5. Jenkins, L. at al. (2022, August 4). ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations. Retrieved August 6, 2024.
  6. NCSC. (2022, February 23). Cyclops Blink Malware Analysis Report. Retrieved March 3, 2022.
  7. Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020.
  8. Bourhis, P., Sekoia TDR. (2024, February 1). Unveiling the intricacies of DiceLoader. Retrieved May 14, 2025.
  9. L-Codes. (2019). Neo-reGeorg. Retrieved December 4, 2024.
  10. Faou, M. (2023, August 10). MoustachedBouncer: Espionage against foreign diplomats in Belarus. Retrieved September 25, 2023.
  1. Dedola, G. (2022, June 21). APT ToddyCat. Retrieved January 3, 2024.
  2. Sherstobitoff, R., Malhotra, A. (2018, October 18). ‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group. Retrieved November 30, 2018.
  3. Cyber National Mission Force. (2022, January 12). Iranian intel cyber suite of malware uses open source tools. Retrieved September 30, 2022.
  4. Falcone, R. (2020, July 22). OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory. Retrieved July 28, 2020.
  5. GReAT. (2017, August 15). ShadowPad in corporate networks. Retrieved March 22, 2021.
  6. FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022.
  7. NCSC GCHQ. (2022, January 27). Small Sieve Malware Analysis Report. Retrieved August 22, 2022.
  8. Nick Dai, Vickie Su, Sunny Lu. (2022, November 18). Earth Preta Spear-Phishing Governments Worldwide. Retrieved August 4, 2025.
  9. Golo Muhr, Joshua Chung. (2025, May 15). Hive0154 targeting US, Philippines, Pakistan and Taiwan in suspected espionage campaign. Retrieved August 4, 2025.
  10. FBI et al. (2023, May 9). Hunting Russian Intelligence “Snake” Malware. Retrieved June 8, 2023.
×

[8]ページ先頭

©2009-2026 Movatter.jp