Mis-Type is a backdoor hybrid that was used in Operation Dust Storm by 2012.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1087 | .001 | Account Discovery: Local Account | Mis-Type may create a file containing the results of the command  | 
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
| Enterprise | T1547 | Boot or Logon Autostart Execution | Mis-Type has created registry keys for persistence, including  | |
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | Mis-Type has used  | 
| Enterprise | T1136 | .001 | Create Account: Local Account | Mis-Type may create a temporary user on the system named  | 
| Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
| Enterprise | T1005 | Data from Local System | Mis-Type has collected files and data from a compromised host.[1] | |
| Enterprise | T1074 | .001 | Data Staged: Local Data Staging | Mis-Type has temporarily stored collected information to the files  | 
| Enterprise | T1041 | Exfiltration Over C2 Channel | Mis-Type has transmitted collected files and data to its C2 server.[1] | |
| Enterprise | T1008 | Fallback Channels | Mis-Type first attempts to use a Base64-encoded network protocol over a raw TCP socket for C2, and if that method fails, falls back to a secondary HTTP-based protocol to communicate to an alternate C2 server.[1] | |
| Enterprise | T1105 | Ingress Tool Transfer | Mis-Type has downloaded additional malware and files onto a compromised host.[1] | |
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location | Mis-Type saves itself as a file named  | 
| Enterprise | T1106 | Native API | Mis-Type has used Windows API calls, including  | |
| Enterprise | T1095 | Non-Application Layer Protocol | Mis-Type network traffic can communicate over a raw socket.[1] | |
| Enterprise | T1055 | Process Injection | Mis-Type has been injected directly into a running process, including  | |
| Enterprise | T1082 | System Information Discovery | The initial beacon packet for Mis-Type contains the operating system version and file system of the victim.[1] | |
| Enterprise | T1016 | System Network Configuration Discovery | Mis-Type may create a file containing the results of the command  | |
| Enterprise | T1033 | System Owner/User Discovery | Mis-Type runs tests to determine the privilege level of the compromised user.[1] | |
| ID | Name | Description | 
|---|---|---|
| C0016 | Operation Dust Storm |