Alternative names (2)
MITRE ATT&CK Technique • attackTechniqueRandom triples
| Subject | Object |
|---|---|
| gptkb:APT27 | supply chain compromise |
| gptkb:T1549 | T1549.037 |
| gptkb:T1549 | T1549.034 |
| gptkb:T1549 | T1549.003 |
| gptkb:T1059_(Command-Line_Interface) | T1059.008 (Network Device CLI) |
| gptkb:APT27 | data exfiltration |
| gptkb:T1549 | T1549.008 |
| gptkb:T1549 | T1549.011 |
| gptkb:T1059_(Command-Line_Interface) | T1059.004 (Unix Shell) |
| gptkb:APT27 | watering hole attacks |
| gptkb:T1549 | T1549.043 |
| gptkb:T1549 | T1549.044 |
| gptkb:T1549 | T1549.047 |
| gptkb:T1059_(Command-Line_Interface) | T1059.003 (Windows Command Shell) |
| gptkb:APT27 | spear phishing |
| gptkb:T1549 | T1549.009 |
| gptkb:T1059_(Command-Line_Interface) | T1059.002 (AppleScript) |
| gptkb:T1549 | T1549.014 |
| gptkb:T1549 | T1549.001 |
| gptkb:T1549 | T1549.029 |