| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1048 | .003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol |
ftp may be used to exfiltrate data separate from the main command and control protocol.[1][2] |
| Enterprise | T1105 | Ingress Tool Transfer |
ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.[1][2] |
|
| Enterprise | T1570 | Lateral Tool Transfer |
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.[1][2] |
|
| ID | Name | References |
|---|---|---|
| G0019 | Naikon | |
| G0049 | OilRig | |
| G0064 | APT33 | |
| G0087 | APT39 | |
| G0096 | APT41 |