Statements (25)
Predicate | Object |
---|---|
gptkbp:instanceOf |
MITRE ATT&CK technique
|
gptkbp:belongsToTactic |
gptkb:Command_and_Control
|
gptkbp:citation |
https://attack.mitre.org/techniques/T1105/
|
gptkbp:describes |
Adversaries may transfer tools or other files from external systems into a compromised environment using various protocols.
|
gptkbp:detects |
network intrusion detection systems
|
gptkbp:example |
gptkb:FTP
gptkb:HTTP gptkb:SCP gptkb:VNC gptkb:SMB gptkb:RDP HTTPS SSH |
https://www.w3.org/2000/01/rdf-schema#label |
T1105 (Remote File Copy)
|
gptkbp:mitigatedBy |
network segmentation
monitoring network traffic |
gptkbp:partOf |
gptkb:MITRE_ATT&CK_framework
|
gptkbp:platform |
gptkb:Windows
gptkb:macOS gptkb:network_protocol gptkb:Linux |
gptkbp:technique |
T1105
|
gptkbp:usedBy |
threat actors
|
gptkbp:bfsParent |
gptkb:SofacyCHOPSTICK
|
gptkbp:bfsLayer |
7
|