Malware Behavior Catalog v3.1

June 30, 2024 · View on GitHub

The Malware Behavior Catalog (MBC) is a catalog of malware objectives and behaviors, created to support malware analysis-oriented use cases, such as labeling, similarity analysis, and standardized reporting. Please see the FAQ page for answers to common questions, and read the newsletters for information on the most recent MBC updates and activity.

Open-source malware analysis tools map their output to MBC and ATT&CK:

MBC supports other community efforts:

Check out MBC presentations:

To join the MBC mailing list, please send a request to mbc@mitre.org.

Objectives

As shown below, malware objectives are based on ATT&CK tactics, and are tailored for the malware analysis use case of characterizing malware based on known objectives and behaviors. Two malware analysis-specific objectives not in ATT&CK are also defined (ANTI-BEHAVIORAL ANALYSIS and ANTI-STATIC ANALYSIS).

Behaviors

Under each objective, MBC captures all behaviors and code characteristics discovered during malware analysis, with links to ATT&CK techniques as appropriate. Names of MBC behaviors may or may not match related ATT&CK techniques. Any content provided on behavior pages is supplemental to ATT&CK content. In other words, ATT&CK content is not duplicated in MBC, and MBC users will reference ATT&CK while capturing malware behaviors.

Methods

Methods are associated with behaviors and serve different roles, depending on the behavior. In some cases, a method further refines a behavior (i.e., sub-behavior); in other cases, a method is an implementation of a behavior. Previously, methods had no ATT&CK counterpart, but beginning in April 2020, ATT&CK defines sub-techniques, which are similar to methods.

Note that a method cannot be used without a behavior.

Micro-objectives / Micro-behaviors

Some malware behaviors are low-level, support many objectives and other behaviors, and aren't necessarily malicious. For example, a TCP socket may be created, or a string may be checked for some condition. Because such behaviors are often noted in malware analysis, they are captured in MBC. See Micro-behaviors for details.

Identifiers

As shown below, the letter of an identifier relays information about a behavior. Note that letters used in MBC v2 and v3 are changed from MBC v1.

LetterExampleDescription
BB0040An MBC behavior.
CC0015An MBC micro-behavior.
TT1234An ATT&CK technique.
EE1234An ATT&CK technique that has been enhanced with malware-specific details. The numerical portion of the identifier will match the ATT&CK ID (e.g., E1234 enhances T1234).
FF0004An ATT&CK sub-technique that has been enhanced with malware-specific details.

Two letters of an identifier relay information about an objective.

LetterExampleDescription
OBOB0001An MBC objective.
OCOC0003An MBC micro-objective.

Identifiers of methods are formatted in the same way as ATT&CK sub-techniques. If MBC defines a new method for an existing ATT&CK technique, the identifier is changed from "T" to "E" and an "m" identifier is added (e.g., a method added to T1234 would be denoted E1234.m01 and is different than T1234.001, although both refer to the T1234 ATT&CK technique). Method identifiers of "B", "C", and "F" behaviors are defined without the "m" (e.g., B0008.009; C0005.002; F0001.005).

When two or more MBC behaviors refine the same ATT&CK technique, each is given an MBC identifier and each references the ATT&CK identifier. When a new ATT&CK technique is defined after an MBC behavior has been defined, the preexisting MBC identifier is preserved and the new ATT&CK identifier is referenced.

In cases where an MBC behavior enhances a technique/sub-technique that is defined in both ATT&CK Mobile and Enterprise, the "E" identifier used in MBC corresponds to the Enterprise identifier. For example, the Obfuscated Files or Information technique has identifier T1027 in Enterprise, identifier T1406 in Mobile, and identifier E1027 in MBC.

Canonical Representation

The canonical representation for MBC content is OBJECTIVE::Behavior::Method. For example, ANTI-BEHAVIORAL ANALYSIS::Debugger Detection::Process Environment Block.

Objectives and behaviors can be used alone, but a method must be associated with a behavior.

STIX 2.1 Representation

A STIX 2.1 representation for MBC v3.1 is available in the mbc-stix2.1 repository. It's based on a refined STIX 2.1 Malware Behavior Extension that includes new STIX domain objects for MBC objectives, behaviors, and methods.

This visual representation of the MBC Matrix is based on the ATT&CK Navigator. Two views are available:

Malware Corpus

The MBC contains a malware corpus where each malware entry is decomposed into behaviors that are mapped to ATT&CK and MBC. The mappings are based on open source malware analysis reports. Note that some malware types are also present in the ATT&CK software page. We refer readers to the corresponding ATT&CK page for a list of identified ATT&CK techniques. However, we will list any newly identified ATT&CK techniques in the MBC malware page.

Malware Objective Descriptions

Malware objectives are defined in the table below. Follow the links to view associated behaviors.

ObjectiveDescription
Anti-Behavioral AnalysisMalware aims to prevent, obstruct, or evade behavioral analysis, such as analysis done using a sandbox or debugger.
Anti-Static AnalysisMalware aims to prevent static analysis or make it more difficult.
CollectionMalware aims to identify and gather information from a machine or network.
Command and ControlMalware aims to communicate with compromised systems to control them.
Credential AccessMalware aims to steal account names and passwords.
Defense EvasionMalware aims to evade detection.
DiscoveryMalware aims to gain knowledge about the environment.
ExecutionMalware aims to execute code on a system.
ExfiltrationMalware aims to steal data.
ImpactMalware aims to manipulate, interrupt, or destroy systems or data.
Lateral MovementMalware aims to propagate or otherwise move through an environment. Lateral movement may be active, happening via direct machine access, or may be passive (for example, done via malicious email).
PersistenceMalware aims to remain on a system.
Privilege EscalationMalware aims to obtain higher level permissions.

MBC Behaviors

The table below lists MBC behaviors and related ATT&CK techniques. In most cases, related ATT&CK techniques were defined after the MBC behavior was defined. Please see the MBC Summary for a listing of all MBC content.

IDObjective(s)BehaviorRelated ATT&CK Technique
B0001ANTI-BEHAVIORAL ANALYSISDebugger Detectionnone
B0002ANTI-BEHAVIORAL ANALYSISDebugger EvasionDebugger Evasion (T1622)
B0003ANTI-BEHAVIORAL ANALYSISDynamic Analysis EvasionVirtualization/Sandbox Evasion (T1497,T1633)
B0004ANTI-BEHAVIORALEmulator Detectionnone
B0005ANTI-BEHAVIORALEmulator Evasionnone
B0006ANTI-BEHAVIORALMemory Dump Evasionnone
B0007ANTI-BEHAVIORALSandbox DetectionVirtualization/Sandbox Evasion: System Checks (T1497.001,T1633.001); Virtualization/Sandbox Evasion: User Activity Based Checks (T1497.002)
B0008ANTI-BEHAVIORAL ANALYSIS, ANTI-STATIC ANALYSISExecutable Code Virtualizationnone
B0009ANTI-BEHAVIORAL ANALYSISVirtual Machine DetectionVirtualization/Sandbox Evasion (T1497,T1633)
B0010ANTI-STATIC ANALYSISCall Graph Generation Evasionnone
B0011EXECUTIONRemote Commandsnone
B0012ANTI-STATIC ANALYSISDisassembler Evasionnone
B0013DISCOVERYAnalysis Tool Discoverynone
B0014DISCOVERYSMTP Connection Discoverynone
B0015not defined------
B0016IMPACTCompromise Data IntegrityData Manipulation: Stored Data Manipulation (T1565.001)
B0017IMPACTDestroy Hardwarenone
B0018IMPACTResource HijackingResource Hijacking (T1496)
B0019IMPACTManipulate Network TrafficData Manipulation: Transmitted Data Manipulation (T1565.002)
B0020EXECUTION, LATERAL MOVEMENTSend EmailPhishing (T1566)
B0021EXECUTION, LATERAL MOVEMENTSend Poisoned Emailnone
B0022IMPACT, PERSISTENCERemote Accessnone
B0023EXECUTIONInstall Additional Programnone
B0024EXECUTIONPrevent Concurrent Executionnone
B0025ANTI-BEHAVIORAL ANALYSIS//EXECUTIONConditional ExecutionExecution Guardrails (T1480)
B0026LATERAL MOVEMENT, PERSISTENCEMalicious Network Drivernone
B0027DEFENSE EVASIONAlternative Installation Locationnone
B0028CREDENTIAL ACCESSCryptocurrencynone
B0029DEFENSE EVASIONPolymorphic Codenone
B0030COMMAND AND CONTROLCommand and Control Communicationnone
B0031COMMAND AND CONTROLDomain Name GenerationDynamic Resolution: Domain Name Generation (T1568.002)
B0032ANTI-STATIC ANALYSISExecutable Code Obfuscationnone
B0033IMPACTDenial of ServiceNetwork Denial of Service (T1498)
B0034ANTI-STATIC ANALYSISExecutable Code Optimizationnone
B0035PERSISTENCEShutdown Eventnone
B0036ANTI-BEHAVIORAL ANALYSISCapture Evasionnone
B0037DEFENSE EVASIONBypass Data Execution Preventionnone
B0038DISCOVERYSelf Discoverynone
B0039IMPACTSpammingnone
B0040DEFENSE EVASIONCovert Locationnone
B0041not defined------
B0042IMPACTModify Hardwarenone
B0043DISCOVERYTaskbar Discoverynone
B0044EXECUTIONExecution Dependencynone
B0045ANTI-STATIC ANALYSISData Flow Analysis Evasionnone
B0046DISCOVERYCode Discoverynone
B0047DEFENSE EVASION, PERSISTENCEInstall Insecure or Malicious Codenone

Citing MBC

If you use MBC, please cite it as specified in the CITATION file or by using GitHub's sidebar citation widget, which provides both APA and BibTeX formats.

Copyright © 2021-2023, The MITRE Corporation. Terms of Use.