T1036.002
Right-to-Left Override
Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is a non-printing Unicode character that causes the text that follows it to be displayed in reverse. For example, a Windows screensaver executable named 'March 25 \u202Excod.scr' will display as 'March 25 rcs.docx'. Adversaries may abuse the RTLO character as a means of tricking a user into executing what they think is a benign file type. Use of the RTLO character has been seen in many targeted intrusion attempts and criminal activity.
Microsoft Sentinel / Defender
kusto
let RTLO_Char = unicode_codepoints_to_string(dynamic([8238]));
DeviceFileEvents
| where Timestamp > ago(24h)
| where FileName contains RTLO_Char or FolderPath contains RTLO_Char
| project Timestamp, DeviceName, AccountName, FileName, FolderPath, ActionType,
InitiatingProcessFileName, InitiatingProcessCommandLine, SHA256
| sort by Timestamp desc high severity
high confidence
Data Sources
File: File Creation File: File Metadata Microsoft Defender for Endpoint
Required Tables
DeviceFileEvents
False Positives
- Legitimate documents in right-to-left languages (Arabic, Hebrew, Farsi) that use bidirectional text control characters
- Internationalized file names in multilingual environments that legitimately use Unicode control characters
- PDF or Word documents containing RTL text segments that may appear in file metadata
Last updated: 2026-04-20 Research depth: deep
References (6)
- https://attack.mitre.org/techniques/T1036/002/
- https://resources.infosecinstitute.com/spoof-using-right-to-left-override-rtlo-technique-2/
- https://blog.trendmicro.com/trendlabs-security-intelligence/plead-targeted-attacks-against-taiwanese-government-agencies-2/
- https://securelist.com/zero-day-vulnerability-in-telegram/83800/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036.002/T1036.002.md
- https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file_event
Unlock Pro Content
Get the full detection package for T1036.002 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1036MasqueradingRelated Sub-techniques
T1036.001Invalid Code SignatureT1036.003Rename Legitimate UtilitiesT1036.004Masquerade Task or ServiceT1036.005Match Legitimate Resource Name or LocationT1036.006Space after FilenameT1036.007Double File ExtensionT1036.008Masquerade File TypeT1036.009Break Process TreesT1036.010Masquerade Account NameT1036.011Overwrite Process ArgumentsT1036.012Browser Fingerprint