{"description": "Enterprise techniques used by Doki, ATT&CK software S0600 (v1.0)", "name": "Doki (S0600)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "17", "navigator": "5.1.0"}, "techniques": [{"techniqueID": "T1071", "showSubtechniques": true}, {"techniqueID": "T1071.001", "comment": "[Doki](https://attack.mitre.org/software/S0600) has communicated with C2 over HTTPS.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1020", "comment": "[Doki](https://attack.mitre.org/software/S0600) has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1059", "showSubtechniques": true}, {"techniqueID": "T1059.004", "comment": "[Doki](https://attack.mitre.org/software/S0600) has executed shell scripts with /bin/sh.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1610", "comment": "[Doki](https://attack.mitre.org/software/S0600) was run through a deployed container.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1568", "showSubtechniques": true}, {"techniqueID": "T1568.002", "comment": "[Doki](https://attack.mitre.org/software/S0600) has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1573", "showSubtechniques": true}, {"techniqueID": "T1573.002", "comment": "[Doki](https://attack.mitre.org/software/S0600) has used the embedTLS library for network communications.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1611", "comment": "[Doki](https://attack.mitre.org/software/S0600)\u2019s container was configured to bind the host root directory.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1041", "comment": "[Doki](https://attack.mitre.org/software/S0600) has used Ngrok to establish C2 and exfiltrate data.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1133", "comment": "[Doki](https://attack.mitre.org/software/S0600) was executed through an open Docker daemon API port.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1083", "comment": "[Doki](https://attack.mitre.org/software/S0600) has resolved the path of a process PID to use as a script argument.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1105", "comment": "[Doki](https://attack.mitre.org/software/S0600) has downloaded scripts from C2.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1036", "showSubtechniques": true}, {"techniqueID": "T1036.005", "comment": "[Doki](https://attack.mitre.org/software/S0600) has disguised a file as a Linux kernel module.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1057", "comment": "[Doki](https://attack.mitre.org/software/S0600) has searched for the current process\u2019s PID.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1102", "comment": "[Doki](https://attack.mitre.org/software/S0600) has used the dogechain.info API to generate a C2 address.(Citation: Intezer Doki July 20)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by Doki", "color": "#66b1ff"}]}