We're updating the issue view to help you get more done. 

Data Obfuscation

Description

Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content more difficult to discover or decipher and to make the communication less conspicuous and hide commands from being seen. This encompasses many methods, such as adding junk data to protocol traffic, using steganography, commingling legitimate traffic with C2 communications traffic, or using a non-standard data encoding system, such as a modified Base64 encoding for the message body of an HTTP request.

id

T1001

tactic

command-and-control

datasources

Process monitoring
Network protocol analysis
Process use of network
Packet capture

maturity

Not Tracked

Assignee

Unassigned
Configure