Home >
Enterprise >
Participants >
Fidelis >
Command and Control (TA0011)
|
|
Carbanak+FIN7 |
||||||||
Step | ATT&CK Pattern |
|
||||||
1.A.10
|
Technique Application Layer Protocol (T1071) Subtechnique Application Layer Protocol: Web Protocols (T1071.001) |
|
||||||
1.A.11
|
Technique Encrypted Channel (T1573) Subtechnique Encrypted Channel: Asymmetric Cryptography (T1573.002) |
|
||||||
2.B.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
3.B.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
3.B.7
|
Technique Non-Application Layer Protocol (T1095) |
|
||||||
4.B.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
4.B.2
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
5.A.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
5.A.2
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
5.A.3
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
5.A.4
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
5.A.5
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
7.A.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
7.A.3
|
Technique Application Layer Protocol (T1071) |
|
||||||
7.C.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
7.C.3
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
8.A.2
|
Technique Application Layer Protocol (T1071) Subtechnique Application Layer Protocol: Web Protocols (T1071.001) |
|
||||||
8.A.3
|
Technique Encrypted Channel (T1573) Subtechnique Encrypted Channel: Asymmetric Cryptography (T1573.002) |
|
||||||
9.A.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
9.B.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
10.A.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
10.A.2
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
10.B.1
|
Technique Remote Access Software (T1219) |
|
||||||
12.A.3
|
Technique Application Layer Protocol (T1071) |
|
||||||
12.B.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
13.B.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
14.A.6
|
Technique Application Layer Protocol (T1071) Subtechnique Application Layer Protocol: Web Protocols (T1071.001) |
|
||||||
14.A.7
|
Technique Encrypted Channel (T1573) Subtechnique Encrypted Channel: Asymmetric Cryptography (T1573.002) |
|
||||||
15.A.2
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
15.A.3
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
16.A.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
16.A.2
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
16.A.8
|
Technique Application Layer Protocol (T1071) Subtechnique Application Layer Protocol: Web Protocols (T1071.001) |
|
||||||
16.A.9
|
Technique Encrypted Channel (T1573) Subtechnique Encrypted Channel: Asymmetric Cryptography (T1573.002) |
|
||||||
17.A.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
17.A.5
|
Technique Application Layer Protocol (T1071) Subtechnique Application Layer Protocol: Web Protocols (T1071.001) |
|
||||||
17.A.6
|
Technique Encrypted Channel (T1573) Subtechnique Encrypted Channel: Asymmetric Cryptography (T1573.002) |
|
||||||
19.A.3
|
Technique Proxy (T1090) |
|
||||||
19.B.3
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
19.B.4
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
20.A.3
|
Technique Application Layer Protocol (T1071) Subtechnique Application Layer Protocol: Web Protocols (T1071.001) |
|
||||||
20.A.4
|
Technique Encrypted Channel (T1573) Subtechnique Encrypted Channel: Asymmetric Cryptography (T1573.002) |
|
||||||
20.B.1
|
Technique Ingress Tool Transfer (T1105) |
|
||||||
20.B.3
|
Technique Ingress Tool Transfer (T1105) |
|