Skill Level Classification
Trap classifies attackers into three tiers based on observed behavior:Script Kiddie
| Indicator | Example |
|---|---|
| Uses publicly available tools without modification | Running Hydra with default wordlists |
| Tries only default credentials | admin/admin, root/password, root/123456 |
| No post-exploitation activity | Disconnects after successful login |
| High volume, low sophistication | Hundreds of login attempts with common passwords |
Advanced
| Indicator | Example |
|---|---|
| Modifies tool parameters | Custom wordlists, adjusted scan timing |
| Attempts multiple exploit types | Tries SSH, then HTTP, then MySQL |
| Basic post-exploitation | Runs uname -a, cat /etc/passwd, checks for other hosts |
| Internal network scanning | Probes RFC 1918 addresses after gaining access |
APT (Advanced Persistent Threat)
| Indicator | Example |
|---|---|
| Custom payloads | Non-standard exploit code, compiled binaries |
| Low and slow approach | Few connections over extended time periods |
| Persistence establishment | Installs cron jobs, modifies SSH keys, plants backdoors |
| Targeted behavior | Searches for specific files, databases, or configurations |
| Anti-forensics | Clears logs, modifies timestamps |
Classification Signals
Credential Analysis
Credential Analysis
- Default credentials (admin/admin, root/root): Script Kiddie
- Credential lists (sequential attempts from known wordlists): Script Kiddie to Advanced
- Targeted credentials (organization-specific usernames, previously breached passwords): Advanced to APT
Command Sophistication
Command Sophistication
- Single commands (whoami, id, uname -a): Script Kiddie
- Chained commands (enumeration scripts, privilege escalation attempts): Advanced
- Custom tooling (obfuscated scripts, memory-resident payloads, anti-detection): APT
Behavioral Patterns
Behavioral Patterns
- Fast and noisy (rapid connection attempts, no pauses): Script Kiddie
- Moderate pacing (delays between attempts, some adaptation): Advanced
- Slow and deliberate (long dwell time, careful enumeration, anti-forensics): APT
Intent Analysis
Trap analyzes behavioral patterns to classify attacker intent into 6 categories:| Intent | Indicators | MITRE Tactic |
|---|---|---|
| Reconnaissance | Port scanning, service enumeration, OS fingerprinting | TA0043 |
| Brute Force | High-volume credential attempts, dictionary attacks | TA0006 |
| Exploitation | Known CVE payloads, buffer overflow attempts, injection attacks | TA0001 |
| Lateral Movement | Internal network scanning, SMB enumeration, SSH pivoting | TA0008 |
| Data Exfiltration | File download commands, data encoding, outbound transfers | TA0010 |
| Persistence | Cron job creation, SSH key modification, backdoor installation | TA0003 |
MITRE ATT&CK Mapping
Every attacker action is mapped to the relevant MITRE ATT&CK technique:| Observed Behavior | Technique ID | Technique Name |
|---|---|---|
| SSH password guessing | T1110.001 | Password Guessing |
| Credential stuffing | T1110.004 | Credential Stuffing |
| Web shell upload | T1505.003 | Web Shell |
cat /etc/passwd | T1087.001 | Local Account Discovery |
| Internal port scan | T1046 | Network Service Scanning |
| Cron job creation | T1053.003 | Cron |
| SSH key modification | T1098.004 | SSH Authorized Keys |
| wget/curl download | T1105 | Ingress Tool Transfer |
Profile Report
View attacker profiles via the CLI:Collected Intelligence
Credential Database
All attempted username/password combinations are recorded:Command Logs
Every command executed in a honeypot session is logged with timestamps:Intelligence Flow
Threat Cloud Integration
Attacker profiles are anonymized before sharing:| Data Shared | Anonymization |
|---|---|
| Source IP | /16 masked (last two octets zeroed) |
| Credentials | Hashed (SHA-256), never plaintext |
| Commands | Sanitized of environment-specific data |
| Skill classification | Shared as-is |
| Intent analysis | Shared as-is |
Attacker profiles persist across sessions. If the same IP returns days later, Trap correlates the new activity with the existing profile and may upgrade the skill level classification based on new evidence. Threat Cloud sharing can be disabled with
--no-cloud for air-gapped environments.