T1505 Server Software Component Mappings

Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application. Adversaries may install malicious components to extend and abuse server applications.(Citation: volexity_0day_sophos_FW)

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CM-06 Configuration Settings mitigates T1505 Server Software Component
CM-05 Access Restrictions for Change mitigates T1505 Server Software Component
SA-10 Developer Configuration Management mitigates T1505 Server Software Component
SC-16 Transmission of Security and Privacy Attributes mitigates T1505 Server Software Component
SI-14 Non-persistence mitigates T1505 Server Software Component
CM-11 User-installed Software mitigates T1505 Server Software Component
SR-11 Component Authenticity mitigates T1505 Server Software Component
SR-04 Provenance mitigates T1505 Server Software Component
SR-05 Acquisition Strategies, Tools, and Methods mitigates T1505 Server Software Component
RA-05 Vulnerability Monitoring and Scanning mitigates T1505 Server Software Component
CM-08 System Component Inventory mitigates T1505 Server Software Component
SI-07 Software, Firmware, and Information Integrity mitigates T1505 Server Software Component
AC-16 Security and Privacy Attributes mitigates T1505 Server Software Component
CM-02 Baseline Configuration mitigates T1505 Server Software Component
CM-02 Baseline Configuration mitigates T1505 Server Software Component
SA-11 Developer Testing and Evaluation mitigates T1505 Server Software Component
IA-02 Identification and Authentication (Organizational Users) mitigates T1505 Server Software Component
SI-04 System Monitoring mitigates T1505 Server Software Component
AC-02 Account Management mitigates T1505 Server Software Component
AC-03 Access Enforcement mitigates T1505 Server Software Component
AC-05 Separation of Duties mitigates T1505 Server Software Component
AC-06 Least Privilege mitigates T1505 Server Software Component

VERIS Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.malware.variety.Backdoor Malware creates a backdoor capability for hacking. Child of 'RAT' when combined with 'Trojan'. Child of 'Backdoor or C2'. related-to T1505 Server Software Component
action.malware.variety.Backdoor or C2 Malware creates a remote control capability, but it's unclear if it's a backdoor for hacking or C2 for malware. Parent of 'C2' and 'Backdoor'. related-to T1505 Server Software Component

GCP Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
google_secops Google Security Operations technique_scores T1505 Server Software Component
Comments
Google Security Ops is able to trigger alerts based off suspicious events and command line arguments that could indicate an adversary tampering with system components. This technique was scored as minimal based on low or uncertain detection coverage factor. https://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/soc_prime_rules/threat_hunting/sysmon/detection_of_com_hijacking.yaral
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1505.002 Transport Agent 25
T1505.005 Terminal Services DLL 14
T1505.003 Web Shell 13
T1505.004 IIS Components 24
T1505.001 SQL Stored Procedures 17