DS0022 File
A computer resource object, managed by the I/O system, for storing data (such as images, text, videos, computer programs, or any wide variety of other media).1
Item | Value |
---|---|
ID | DS0022 |
Platforms | Linux, Network, Windows, macOS |
Collection Layers | Host |
Version | 1.0 |
Created | 20 October 2021 |
Last Modified | 07 December 2022 |
Data Components
File Access
Opening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
File Creation
Initial construction of a new file (ex: Sysmon EID 11)
File Deletion
Removal of a file (ex: Sysmon EID 23, macOS ESF EID ES_EVENT_TYPE_AUTH_UNLINK, or Linux commands auditd unlink, rename, rmdir, unlinked, or renameat rules)
Domain | ID | Name |
---|---|---|
enterprise | T1554 | Compromise Client Software Binary |
enterprise | T1485 | Data Destruction |
ics | T0809 | Data Destruction |
enterprise | T1565 | Data Manipulation |
enterprise | T1565.001 | Stored Data Manipulation |
enterprise | T1565.003 | Runtime Data Manipulation |
enterprise | T1070 | Indicator Removal |
enterprise | T1070.001 | Clear Windows Event Logs |
enterprise | T1070.002 | Clear Linux or Mac System Logs |
enterprise | T1070.003 | Clear Command History |
enterprise | T1070.004 | File Deletion |
enterprise | T1070.008 | Clear Mailbox Data |
enterprise | T1070.009 | Clear Persistence |
ics | T0872 | Indicator Removal on Host |
enterprise | T1490 | Inhibit System Recovery |
File Metadata
Contextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
File Modification
Changes made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
References
-
Microsoft. (2018, May 31). File Management (Local File Systems). Retrieved September 28, 2021. ↩
-
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020. ↩
-
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020. ↩
-
Apple. (n.d.). Open items automatically when you log in on Mac. Retrieved October 1, 2021. ↩
-
hoakley. (2021, September 16). How to run an app or tool at startup. Retrieved October 5, 2021. ↩
-
Patrick Wardle. (2018, July 23). Block Blocking Login Items. Retrieved October 1, 2021. ↩
-
Stokes, Phil. (2019, June 17). HOW MALWARE PERSISTS ON MACOS. Retrieved September 10, 2019. ↩
-
Dell SecureWorks. (2015, January 12). Skeleton Key Malware Analysis. Retrieved April 8, 2019. ↩
-
Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016. ↩
-
Patrick Wardle. (2019, September 17). Writing a File Monitor with Apple’s Endpoint Security Framework. Retrieved December 17, 2020. ↩
-
Malware Archaeology. (2016, June). WINDOWS POWERSHELL LOGGING CHEAT SHEET - Win 7/Win 2008 or later. Retrieved June 24, 2016. ↩
-
Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018. ↩
-
Moe, O. (2018, January 14). Putting Data in Alternate Data Streams and How to Execute It. Retrieved June 30, 2018. ↩
-
Moe, O. (2018, April 11). Putting Data in Alternate Data Streams and How to Execute It - Part 2. Retrieved June 30, 2018. ↩
-
Kessler, G. (2022, December 9). GCK’S FILE SIGNATURES TABLE. Retrieved August 23, 2022. ↩
-
Li, V. (2019, October 2). Polyglot Files: a Hacker’s best friend. Retrieved September 27, 2022. ↩
-
Apple. (n.d.). Use rules to manage emails you receive in Mail on Mac. Retrieved June 14, 2021. ↩
-
Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018. ↩
-
Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021. ↩
-
Microsoft. (2007, November 24). IIS Modules Overview. Retrieved June 17, 2021. ↩
-
Hromcová, Z., Cherepanov, A. (2021). Anatomy of Native IIS Malware. Retrieved September 9, 2021. ↩
-
Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021. ↩
-
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. ↩
-
Arntz, P. (2016, March 30). The Windows Vault . Retrieved November 23, 2020. ↩
-
Chrome Enterprise and Education Help. (n.d.). Use Chrome Browser with Roaming User Profiles. Retrieved March 28, 2023. ↩
-
ise. (2019, February 19). Password Managers: Under the Hood of Secrets Management. Retrieved January 22, 2021. ↩
-
Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022. ↩
-
Syynimaa, N. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved August 3, 2022. ↩
-
French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019. ↩
-
NSA Cybersecurity Directorate. (n.d.). Mitigating Web Shells. Retrieved July 22, 2021. ↩
-
Chris Ross. (2018, October 17). Persistent Credential Theft with Authorization Plugins. Retrieved April 22, 2021. ↩
-
French, D., Filar, B.. (2020, March 21). A Chain Is No Stronger Than Its Weakest LNK. Retrieved November 30, 2020. ↩
-
hoakley. (2020, October 29). Quarantine and the quarantine flag. Retrieved September 13, 2021. ↩
-
Brennan, M. (2022, February 16). Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection. Retrieved August 22, 2022. ↩
-
Choi, S. (2015, August 6). Obfuscated API Functions in Modern Packers. Retrieved August 22, 2022. ↩
-
Jason (jxb5151). (2021, January 28). findapihash.py. Retrieved August 22, 2022. ↩
-
Microsoft. (n.d.). PsSetCreateProcessNotifyRoutine routine. Retrieved December 20, 2017. ↩
-
Liberman, T. & Kogan, E. (2017, December 7). Lost in Transaction: Process Doppelgänging. Retrieved December 20, 2017. ↩
-
hasherezade. (2017, December 18). Process Doppelgänging – a new way to impersonate a process. Retrieved December 20, 2017. ↩
-
Harrell, C. (2012, December 11). Extracting ZeroAccess from NTFS Extended Attributes. Retrieved June 3, 2016. ↩
-
Cole, R., Moore, A., Stark, G., Stancill, B. (2020, February 5). STOMP 2 DIS: Brilliance in the (Visual) Basics. Retrieved September 17, 2020. ↩