MITRE ATT&CK + D3FEND Coverage

← Back to README

ATT&CK Techniques

ATT&CK IDTechnique NamePackage(s)D3FEND Countermeasure
T1016System Network Configuration Discoveryrecon/network (interfaces, gateway, DNS, public IP), win/domain (paired use)D3-NTPM (Network Traffic Pattern Matching)
T1027Obfuscated Files or Informationevasion/sleepmask, pe/strip, crypto (TEA/XTEA/ArithShift/SBox/MatrixTransform), win/api (PEB-walk hash imports)D3-SMRA (System Memory Range Analysis)
T1027.002Software Packingpe/morphD3-SEA (Static Executable Analysis)
T1027.007Dynamic API Resolutionwin/api (Hell's/Halo's/Tartarus/HashGate resolvers), win/syscall (SSN gating chain)D3-SCA (System Call Analysis)
T1027.013Encrypted/Encoded Filecrypto, encodeD3-FCA (File Content Analysis)
T1036Masqueradingevasion/stealthopen, evasion/callstack (call-stack spoof metadata)D3-FHA (File Hash Analysis)
T1036.005Masquerading: Match Legitimate Name or Locationprocess/tamper/fakecmd (self + remote via SpoofPID), pe/masqueradeD3-PLA (Process Listing Analysis)
T1047.001Boot or Logon Autostart Execution: Registry Run Keyspersistence/registryD3-SBV (Service Binary Verification)
T1003.001OS Credential Dumping: LSASS Memorycredentials/lsassdump (producer — dump + PPL unprotect), credentials/sekurlsa (consumer — pure-Go MSV1_0 + Wdigest + Kerberos + DPAPI + TSPkg + CloudAP + LiveSSP + CredMan parser; PTH write-back into live lsass)D3-PSA (Process Spawn Analysis), D3-SICA (System Image Change Analysis)
T1003.002OS Credential Dumping: Security Account Managercredentials/samdump (offline SAM/SYSTEM hive dump — pure-Go REGF parser + boot-key permutation + AES/RC4 hashed-bootkey derivation + per-RID DES de-permutation; live mode via reg save)D3-PSA (Process Spawn Analysis), D3-FCA (File Content Analysis on reg save artefacts)
T1550.002Use Alternate Authentication Material: Pass the Hashcredentials/sekurlsa (Pass / PassImpersonate — spawn under LOGON_NETCREDENTIALS_ONLY, NtWrite MSV + Kerberos hashes back into live lsass for the spawned LUID; SetThreadToken duplicate-token impersonation)D3-PSA, D3-SICA
T1550.003Use Alternate Authentication Material: Pass the Ticketcredentials/sekurlsa (KerberosTicket.ToKirbi / ToKirbiFile — emit mimikatz-format KRB-CRED with replayable session key); credentials/goldenticket (Submit — LsaCallAuthenticationPackage(KerbSubmitTicketMessage))D3-NTA (Network Traffic Analysis on Kerberos AP-REQ patterns)
T1558.001Steal or Forge Kerberos Tickets: Golden Ticketcredentials/goldenticket (Forge — pure-Go PAC marshaling + KRB5 ticket signing with operator-supplied krbtgt key)D3-NTA
T1053.005Scheduled Task/Job: Scheduled Taskpersistence/schedulerD3-SBV (Service Binary Verification)
T1055Process Injectioninject (15 methods), process/tamper/herpaderping (ModeHerpaderping + ModeGhosting; both work on Win10/Win11 ≤ 26100, blocked on Win11 26100+)D3-PSA (Process Spawn Analysis)
T1055.001DLL Injectionpe/srdi, inject/phantomdllD3-SICA (System Image Change Analysis)
T1055.003Thread Execution Hijackinginject (ThreadHijack)D3-PSA
T1055.004Asynchronous Procedure Callinject (QueueUserAPC, EarlyBirdAPC, NtQueueApcThreadEx)D3-PSA
T1055.012Process Hollowinginject (SpawnWithSpoofedArgs)D3-PSMD (Process Spawn Monitoring)
T1068Exploitation for Privilege Escalationprivesc/cve202430088 (kernel TOCTOU race), kernel/driver/rtcore64 (BYOVD IOCTL R/W)D3-EAL (Exploit Activity Logging), D3-DLIC (Driver Load Integrity Checking)
T1078Valid Accountswin/privilege (alt-creds spawn via Secondary Logon), win/impersonate (alt-creds → thread context swap)D3-UAP (User Account Profiling)
T1056.001Input Capture: Keyloggingcollection/keylogD3-KBIM (Keyboard Input Monitoring)
T1057Process Discoveryprocess/enumD3-PLA (Process Listing Analysis)
T1059Command and Scripting Interpreterc2/shell, c2/meterpreter, runtime/bofD3-EFA (Executable File Analysis)
T1070Indicator Removal on Hostcleanup/memoryD3-SMRA
T1070.004File Deletioncleanup/selfdelete, cleanup/wipeD3-FRA (File Removal Analysis)
T1070.006Timestompcleanup/timestompD3-FHA (File Hash Analysis)
T1071.001Web Protocolsc2/transport/malleable, c2/transport/namedpipeD3-NTA (Network Traffic Analysis)
T1082System Information Discoverywin/domain, win/versionD3-SYSIP (System Information Profiling)
T1083File and Directory Discoveryrecon/folderD3-FDA (File Discovery Analysis)
T1106Native APIwin/api (PEB walk, API hashing), win/syscall, win/ntapi, pe/imports (import table enumeration)D3-SCA (System Call Analysis)
T1113Screen Capturecollection/screenshotD3-DA (Dynamic Analysis)
T1115Clipboard Datacollection/clipboardD3-DA (Dynamic Analysis)
T1120Peripheral Device Discoveryrecon/driveD3-PDD (Peripheral Device Discovery)
T1134Access Token Manipulationwin/token, win/privilegeD3-TAAN (Token Auth Normalization)
T1134.001Token Impersonation/Theftwin/impersonate, win/token, privesc/cve202430088 (_EPROCESS.Token swap)D3-TAAN
T1134.002Create Process with Tokenprocess/session, win/privilege (Secondary Logon path)D3-TAAN
T1134.004Parent PID Spoofingc2/shell (PPID spoofing chain), win/impersonate (RunAsTrustedInstaller lineage)D3-PSA (Process Spawn Analysis)
T1136.001Create Account: Local Accountpersistence/accountD3-UAP (User Account Profiling)
T1204.002User Execution: Malicious Filepersistence/lnkD3-EFA (Executable File Analysis)
T1497Virtualization/Sandbox Evasionrecon/sandboxD3-DA (Dynamic Analysis)
T1497.001System Checksrecon/antivmD3-DA
T1497.003Time Based Evasionrecon/timingD3-DA
T1529System Shutdown/Rebootcleanup/bsodD3-DA (Dynamic Analysis)
T1014Rootkitkernel/driver/rtcore64 (BYOVD — RTCore64 / CVE-2019-16098)D3-DLIC (Driver Load Integrity Checking)
T1543.003Create or Modify System Process: Windows Servicepersistence/service, cleanup/service, kernel/driver/rtcore64 (signed-driver service install)D3-SBV (Service Binary Verification)
T1547.009Shortcut Modificationpersistence/lnk, persistence/startupD3-FDA (File Discovery Analysis)
T1548.002Bypass UACprivesc/uac, recon/dllhijack (AutoElevate scanner)D3-UAP (User Account Profiling)
T1553.002Subvert Trust Controls: Code Signingpe/certD3-SEA (Static Executable Analysis)
T1562.001Disable or Modify Toolsevasion/amsi, evasion/etw, evasion/unhook, evasion/acg, evasion/blockdlls, evasion/kcallback (kernel callback enumeration)D3-AIPA (Application Integrity Analysis)
T1562.002Disable Windows Event Loggingprocess/tamper/phant0mD3-EAL (Execution Activity Logging)
T1574.001Hijack Execution Flow: DLL Search Order Hijackingrecon/dllhijack (discovery) · pe/dllproxy (payload generator)D3-PFV (Process File Verification)
T1574.002Hijack Execution Flow: DLL Side-Loadingpe/dllproxy (forwarder DLL emitter)D3-PFV (Process File Verification)
T1574.012Hijack Execution Flow: Inline Hookingevasion/hookD3-AIPA (Application Integrity Analysis)
T1564Hide Artifactscleanup/serviceD3-FRA
T1564.001Hide Artifacts: Hidden Processprocess/tamper/hideprocessD3-PLA (Process Listing Analysis)
T1564.004Hide Artifacts: NTFS File Attributescleanup/adsD3-FRA (File Removal Analysis)
T1620Reflective Code Loadingruntime/clrD3-AIPA (Application Integrity Analysis)
T1571Non-Standard Portc2/multicat (operator-side multi-session listener)D3-NTA (Network Traffic Analysis)
T1573.002Asymmetric Cryptographyc2/transport (TLS, uTLS)D3-DNSTA (DNS Traffic Analysis)
T1622Debugger Evasionrecon/antidebug, recon/hwbpD3-DICA (Debug Instruction Analysis)

D3FEND Defensive Techniques

The D3FEND column above indicates which defensive technique a blue team would use to detect each maldev capability. This helps red teamers understand what they're evading and blue teamers understand what to implement.

graph TD
    subgraph "Attack Techniques (Red)"
        I[Injection T1055]
        E[Evasion T1562]
        S[Syscall Bypass T1106]
        C[C2 T1071/T1573]
    end

    subgraph "D3FEND Countermeasures (Blue)"
        D1[D3-PSA<br>Process Spawn Analysis]
        D2[D3-AIPA<br>App Integrity Analysis]
        D3[D3-SCA<br>System Call Analysis]
        D4[D3-NTA<br>Network Traffic Analysis]
        D5[D3-SMRA<br>Memory Range Analysis]
    end

    I --> D1
    I --> D5
    E --> D2
    S --> D3
    C --> D4

    subgraph "maldev OPSEC Counters"
        O1[Indirect syscalls<br>defeat D3-SCA]
        O2[Sleep mask<br>defeats D3-SMRA]
        O3[uTLS JA3 spoofing<br>defeats D3-NTA]
        O4[Unhooking<br>defeats D3-AIPA hooks]
    end

    D3 -.->|bypassed by| O1
    D5 -.->|bypassed by| O2
    D4 -.->|bypassed by| O3
    D2 -.->|bypassed by| O4