Alternative names (2)
MITRE ATT&CK Technique • attackTechniqueRandom triples
| Subject | Object |
|---|---|
| gptkb:APT27 | data exfiltration |
| gptkb:T1549 | T1549.031 |
| gptkb:T1549 | T1549.009 |
| gptkb:T1549 | T1549.001 |
| gptkb:T1549 | T1549.026 |
| gptkb:T1549 | T1549.040 |
| gptkb:T1549 | T1549.045 |
| gptkb:T1059_(Command-Line_Interface) | T1059.007 (JavaScript) |
| gptkb:T1549 | T1549.002 |
| gptkb:T1549 | T1549.018 |
| gptkb:T1549 | T1549.015 |
| gptkb:T1549 | T1549.032 |
| gptkb:T1549 | T1549.038 |
| gptkb:SofacyADVSTORESHELL | gptkb:T1105_(Ingress_Tool_Transfer) |
| gptkb:APT27 | spear phishing |
| gptkb:T1549 | T1549.017 |
| gptkb:Zebrocy_backdoor | gptkb:T1105_(Ingress_Tool_Transfer) |
| gptkb:APT27 | watering hole attacks |
| gptkb:T1549 | T1549.004 |
| gptkb:T1059_(Command-Line_Interface) | T1059.005 (Visual Basic) |