DET0470 Detecting Protocol or Service Impersonation via Anomalous TLS, HTTP Header, and Port Mismatch Correlation
| Item |
Value |
| ID |
DET0470 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1001.003 (Protocol or Service Impersonation)
Analytics
Windows
AN1294
Untrusted processes creating outbound TLS/HTTPS connections with malformed certificates or header fields, often mismatched with target service behavior. Detects protocol impersonation attempts via traffic metadata analysis and host process lineage.
Log Sources
Mutable Elements
| Field |
Description |
| IssuerOrgFilter |
Organizations in certificate issuer fields to allowlist or monitor. |
| UserContext |
Restrict detection to non-system users or external-facing applications. |
| HeaderSignatureMatch |
Specific HTTP header anomalies or patterns (e.g., missing User-Agent). |
Linux
AN1295
Detection of binaries spawning encrypted sessions using OpenSSL or curl to external services with mismatched ports/protocols. Identifies behavior where internal services simulate trusted cloud service traffic patterns.
Log Sources
Mutable Elements
| Field |
Description |
| ProtocolMatchConfidence |
Threshold for header-field mismatch against expected service behavior. |
| TimeWindow |
Correlation window between process spawn and encrypted session. |
macOS
AN1296
Unsigned or suspicious applications initiating network traffic claiming to be browser, mail, or cloud clients. Detects impersonation via TLS fingerprint and User-Agent string deviation.
Log Sources
Mutable Elements
| Field |
Description |
| ParentProcessFilter |
Limit detections to children of suspicious binaries. |
| HeaderAnomalyScore |
Threshold for deviation from expected headers (User-Agent, Host). |
ESXi
AN1297
ESXi hosts initiating connections from non-standard daemons mimicking HTTP/HTTPS or SNMP traffic, but with irregular payload formats or expired/unsigned TLS certificates.
Log Sources
Mutable Elements
| Field |
Description |
| TLSFingerprintMatch |
Allows matching against known-good or known-bad JA3/JA3S hashes. |
| AllowedServicePorts |
Tune for expected network ports per ESXi role. |