S0060 Sys10
Sys10 is a backdoor that was used throughout 2013 by Naikon. 1
| Item | Value | 
|---|---|
| ID | S0060 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.1 | 
| Created | 31 May 2017 | 
| Last Modified | 18 March 2020 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - | 
| enterprise | T1071.001 | Web Protocols | Sys10 uses HTTP for C2.1 | 
| enterprise | T1573 | Encrypted Channel | - | 
| enterprise | T1573.001 | Symmetric Cryptography | Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.1 | 
| enterprise | T1069 | Permission Groups Discovery | - | 
| enterprise | T1069.001 | Local Groups | Sys10 collects the group name of the logged-in user and sends it to the C2.1 | 
| enterprise | T1082 | System Information Discovery | Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.1 | 
| enterprise | T1016 | System Network Configuration Discovery | Sys10 collects the local IP address of the victim and sends it to the C2.1 | 
| enterprise | T1033 | System Owner/User Discovery | Sys10 collects the account name of the logged-in user and sends it to the C2.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G0019 | Naikon | 1 |