ABOUT
Overview
Use Cases
Mapping Methodology
Scoring Rubric
Related Projects
ATT&CK OBJECTS
Matrix
Tactics
Techniques
MAPPING FRAMEWORKS
About Mappings
Amazon Web Services (AWS)
Azure
CSA Cloud Controls Matrix (CCM)
CRI Profile
Known Exploited Vulnerabilities
Google Cloud Platform (GCP)
Intel vPro
NIST 800-53
M365
VERIS
You're currently viewing ATT&CK Version 9.0 Enterprise and VERIS 1.3.5.
Change versions here.
Home
Mapping Frameworks
VERIS Home
Use of Backdoor or C2 channel
VERIS
action.hacking.variety.Use of backdoor or C2
Mappings
ATT&CK Version
9.0
ATT&CK Domain
Enterprise
VERIS
1.3.5
Change Versions
Capability ID
Capability Description
Mapping Type
ATT&CK ID
ATT&CK Name
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1505.001
Server Software Component: SQL Stored Procedures
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1505.002
Server Software Component: Transport Agent
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1543
Create or Modify System Process
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1001
Data Obfuscation
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1008
Fallback Channels
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1071
Application Layer Protocol
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1078
Valid Accounts
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1090
Proxy
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1095
Non-Application Layer Protocol
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1102
Web Service
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1104
Multi-Stage Channels
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1105
Ingress Tool Transfer
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1132
Data Encoding
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1133
External Remote Services
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1205
Traffic Signaling
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1505
Server Software Component
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1505.003
Server Software Component: Web Shell
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1525
Implant Container Image
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1568
Dynamic Resolution
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1571
Non-Standard Port
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1572
Protocol Tunneling
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1573
Encrypted Channels
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1573.001
Encrypted Channels: Symmetric Cryptography
action.hacking.variety.Use of backdoor or C2
Use of Backdoor or C2 channel
related-to
T1573.002
Encrypted Channels: Asymmetric Cryptography