S0131 TINYTYPHON
TINYTYPHON is a backdoor that has been used by the actors responsible for the MONSOON campaign. The majority of its code was reportedly taken from the MyDoom worm. 1
| Item | Value |
|---|---|
| ID | S0131 |
| Type | MALWARE |
| Version | 1.0 |
| Created | 31 May 2017 |
| Last Modified | 17 October 2018 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1020 | Automated Exfiltration | When a document is found matching one of the extensions in the configuration, TINYTYPHON uploads it to the C2 server.1 |
| enterprise | T1547 | Boot or Logon Autostart Execution | - |
| enterprise | T1547.001 | Registry Run Keys / Startup Folder | TINYTYPHON installs itself under Registry Run key to establish persistence.1 |
| enterprise | T1083 | File and Directory Discovery | TINYTYPHON searches through the drive containing the OS, then all drive letters C through to Z, for documents matching certain extensions.1 |
| enterprise | T1027 | Obfuscated Files or Information | TINYTYPHON has used XOR with 0x90 to obfuscate its configuration file.1 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G0040 | Patchwork | 1 |