ABOUT
Overview
Use Cases
Mapping Methodology
Scoring Rubric
Related Projects
ATT&CK OBJECTS
Matrix
Tactics
Techniques
MAPPING FRAMEWORKS
About Mappings
Amazon Web Services (AWS)
Azure
CSA Cloud Controls Matrix (CCM)
CRI Profile
Known Exploited Vulnerabilities
Google Cloud Platform (GCP)
Intel vPro
NIST 800-53
M365
VERIS
You're currently viewing ATT&CK Version 12.1 Enterprise and VERIS 1.3.7.
Change versions here.
Home
Mapping Frameworks
VERIS Home
Hacking actions taken through a backdoor. C2 is only used by malware.
VERIS
action.hacking.vector.Backdoor
Mappings
ATT&CK Version
12.1
ATT&CK Domain
Enterprise
VERIS
1.3.7
Change Versions
Capability ID
Capability Description
Mapping Type
ATT&CK ID
ATT&CK Name
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1053
Scheduled Task/Job
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1543
Create or Modify System Process
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1547
Boot or Logon Autostart Execution
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1098
Account Manipulation
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1037
Boot or Logon Initialization Scripts
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1554
Compromise Client Software Binary
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1136
Create Accounts
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1546
Event Triggered Execution
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1133
External Remote Services
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1525
Implant Internal Image
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1556
Modify Authentication Process
action.hacking.vector.Backdoor
Hacking actions taken through a backdoor. C2 is only used by malware.
related-to
T1078
Valid Accounts