Alternative names (2)
MITRE ATT&CK Technique • attackTechniqueRandom triples
| Subject | Object |
|---|---|
| gptkb:T1549 | T1549.021 |
| gptkb:T1549 | T1549.008 |
| gptkb:T1549 | T1549.013 |
| gptkb:T1549 | T1549.010 |
| gptkb:Zebrocy_backdoor | gptkb:T1027_(Obfuscated_Files_or_Information) |
| gptkb:APT27 | data exfiltration |
| gptkb:APT27 | supply chain compromise |
| gptkb:APT27 | lateral movement |
| gptkb:T1549 | T1549.006 |
| gptkb:T1549 | T1549.020 |
| gptkb:T1549 | T1549.011 |
| gptkb:T1549 | T1549.022 |
| gptkb:T1549 | T1549.045 |
| gptkb:T1549 | T1549.027 |
| gptkb:T1549 | T1549.005 |
| gptkb:T1549 | T1549.001 |
| gptkb:T1549 | T1549.037 |
| gptkb:T1549 | T1549.028 |
| gptkb:T1549 | T1549.032 |
| gptkb:APT27 | web shell deployment |