Alternative names (2)
MITRE ATT&CK Technique • attackTechniqueRandom triples
| Subject | Object |
|---|---|
| gptkb:APT27 | remote access trojans |
| gptkb:T1549 | T1549.005 |
| gptkb:T1549 | T1549.027 |
| gptkb:T1549 | T1549.001 |
| gptkb:T1549 | T1549.049 |
| gptkb:T1549 | T1549.043 |
| gptkb:APT27 | credential theft |
| gptkb:T1549 | T1549.015 |
| gptkb:T1549 | T1549.033 |
| gptkb:T1549 | T1549.010 |
| gptkb:T1549 | T1549.006 |
| gptkb:T1059_(Command-Line_Interface) | T1059.002 (AppleScript) |
| gptkb:APT27 | supply chain compromise |
| gptkb:APT27 | web shell deployment |
| gptkb:T1549 | T1549.002 |
| gptkb:T1549 | T1549.032 |
| gptkb:T1549 | T1549.031 |
| gptkb:T1059_(Command-Line_Interface) | T1059.005 (Visual Basic) |
| gptkb:APT27 | spear phishing |
| gptkb:Zebrocy_backdoor | T1059 (Command and Scripting Interpreter) |