ATT&CK coverage › Technique

Network Boundary Bridging: Network Address Translation Traversal T1599.001

Adversaries may bridge network boundaries by modifying a network device’s Network Address Translation (NAT) configuration. Malicious modifications to NAT may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks.

Events covered

1 catalog event are tagged with this technique by at least one rule.

ProviderEvent IDTitle
Sysmon6Driver loaded

Authoring guide

Patterns shared across the 1 rule above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.

Fields filtered most (2 distinct)

The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.

FieldRulesHowSample values
Hashes1match 1IMPHASH=2a5f85fe4609461c6339637594fa9b0a, IMPHASH=58623490691babe8330adc81cd04a663, IMPHASH=a66b476c2d06c370f0a53b5537f2f11e
ImageLoaded1match 1\WinDivert.sys, \lingtiwfp.sys, \eswfp.sys

Top indicator values (23 distinct)

Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.

FieldKindValueRules (here)Corpus reach
HashesmatchIMPHASH=2e5f0e649d97f32b03c09e4686d0574f1
ImageLoadedmatch\lingtiwfp.sys1
HashesmatchIMPHASH=d8a719865c448b1bd2ec241e46ac1c881
HashesmatchIMPHASH=8ee39b48656e4d6b8459d7ba7da7438b1
HashesmatchIMPHASH=2a5f85fe4609461c6339637594fa9b0a1
HashesmatchIMPHASH=bdcd836a46bc2415773f6b5ea77a46e41
ImageLoadedmatch\eswfp.sys1
HashesmatchIMPHASH=a66b476c2d06c370f0a53b5537f2f11e1
HashesmatchIMPHASH=45ee545ae77e8d43fc70ede9efcd4c961
ImageLoadedmatch\WinDivert64.sys1
HashesmatchIMPHASH=c28cd6ccd83179e79dac132a553693d91
HashesmatchIMPHASH=a1b2e245acd47e4a348e1a552a02859a1
HashesmatchIMPHASH=0604bb7cb4bb851e2168d5c7d93990871
HashesmatchIMPHASH=58623490691babe8330adc81cd04a6631
ImageLoadedmatch\NordDivert.sys1
HashesmatchIMPHASH=6b2c6f95233c2914d1d488ee27531acc1
HashesmatchIMPHASH=0ea54f8c9af4a2fe8367fa457f48ed381
HashesmatchIMPHASH=c0e5d314da39dbf65a2dbff409cc2c761
HashesmatchIMPHASH=52f8aa269f69f0edad9e8fcdaedce2761
ImageLoadedmatch\WinDivert.sys1

Rules under this technique

Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.

Sigma 1 rule