Tactics and Techniques

Tactics

Collection

Mitre Description

Command and Control

Mitre Description

Credential Access

Mitre Description

Defense Evasion

Mitre Description

Discovery

Mitre Description

Execution

Mitre Description

Exfiltration

Mitre Description

Impact

Mitre Description

Initial Access

Mitre Description

Lateral Movement

Mitre Description

Persistence

Mitre Description

Privilege Escalation

Mitre Description

Reconnaissance

Mitre Description

Resource Development

Mitre Description

Techniques

Abuse Elevation Control Mechanism

Tactics: Defense Evasion, Privilege Escalation

Mitre Description

Access Token Manipulation

Tactics: Defense Evasion, Privilege Escalation

Mitre Description

Account Access Removal

Tactics: Impact

Mitre Description

Account Discovery

Tactics: Discovery

Mitre Description

Account Manipulation

Tactics: Persistence

Mitre Description

Acquire Infrastructure

Tactics: Resource Development

Mitre Description

Active Scanning

Tactics: Reconnaissance

Mitre Description

Adversary-in-the-Middle

Tactics: Collection, Credential Access

Mitre Description

Application Layer Protocol

Tactics: Command and Control

Mitre Description

Application Window Discovery

Tactics: Discovery

Mitre Description

Archive Collected Data

Tactics: Collection

Mitre Description

Audio Capture

Tactics: Collection

Mitre Description

Automated Collection

Tactics: Collection

Mitre Description

Automated Exfiltration

Tactics: Exfiltration

Mitre Description

BITS Jobs

Tactics: Defense Evasion, Persistence

Mitre Description

Boot or Logon Autostart Execution

Tactics: Persistence, Privilege Escalation

Mitre Description

Boot or Logon Initialization Scripts

Tactics: Persistence, Privilege Escalation

Mitre Description

Browser Bookmark Discovery

Tactics: Discovery

Mitre Description

Browser Extensions

Tactics: Persistence

Mitre Description

Browser Session Hijacking

Tactics: Collection

Mitre Description

Brute Force

Tactics: Credential Access

Mitre Description

Build Image on Host

Tactics: Defense Evasion

Mitre Description

Clipboard Data

Tactics: Collection

Mitre Description

Cloud Infrastructure Discovery

Tactics: Discovery

Mitre Description

Cloud Service Dashboard

Tactics: Discovery

Mitre Description

Cloud Service Discovery

Tactics: Discovery

Mitre Description

Cloud Storage Object Discovery

Tactics: Discovery

Mitre Description

Command and Scripting Interpreter

Tactics: Execution

Mitre Description

Communication Through Removable Media

Tactics: Command and Control

Mitre Description

Compromise Accounts

Tactics: Resource Development

Mitre Description

Compromise Client Software Binary

Tactics: Persistence

Mitre Description

Compromise Infrastructure

Tactics: Resource Development

Mitre Description

Container Administration Command

Tactics: Execution

Mitre Description

Container and Resource Discovery

Tactics: Discovery

Mitre Description

Create Account

Tactics: Persistence

Mitre Description

Create or Modify System Process

Tactics: Persistence, Privilege Escalation

Mitre Description

Credentials from Password Stores

Tactics: Credential Access

Mitre Description

Data Destruction

Tactics: Impact

Mitre Description

Data Encoding

Tactics: Command and Control

Mitre Description

Data Encrypted for Impact

Tactics: Impact

Mitre Description

Data Manipulation

Tactics: Impact

Mitre Description

Data Obfuscation

Tactics: Command and Control

Mitre Description

Data Staged

Tactics: Collection

Mitre Description

Data Transfer Size Limits

Tactics: Exfiltration

Mitre Description

Data from Cloud Storage

Tactics: Collection

Mitre Description

Data from Configuration Repository

Tactics: Collection

Mitre Description

Data from Information Repositories

Tactics: Collection

Mitre Description

Data from Local System

Tactics: Collection

Mitre Description

Data from Network Shared Drive

Tactics: Collection

Mitre Description

Data from Removable Media

Tactics: Collection

Mitre Description

Debugger Evasion

Tactics: Defense Evasion, Discovery

Mitre Description

Defacement

Tactics: Impact

Mitre Description

Deobfuscate/Decode Files or Information

Tactics: Defense Evasion

Mitre Description

Deploy Container

Tactics: Defense Evasion, Execution

Mitre Description

Develop Capabilities

Tactics: Resource Development

Mitre Description

Direct Volume Access

Tactics: Defense Evasion

Mitre Description

Disk Wipe

Tactics: Impact

Mitre Description

Domain Policy Modification

Tactics: Defense Evasion, Privilege Escalation

Mitre Description

Domain Trust Discovery

Tactics: Discovery

Mitre Description

Drive-by Compromise

Tactics: Initial Access

Mitre Description

Dynamic Resolution

Tactics: Command and Control

Mitre Description

Email Collection

Tactics: Collection

Mitre Description

Encrypted Channel

Tactics: Command and Control

Mitre Description

Endpoint Denial of Service

Tactics: Impact

Mitre Description

Escape to Host

Tactics: Privilege Escalation

Mitre Description

Establish Accounts

Tactics: Resource Development

Mitre Description

Event Triggered Execution

Tactics: Persistence, Privilege Escalation

Mitre Description

Execution Guardrails

Tactics: Defense Evasion

Mitre Description

Exfiltration Over Alternative Protocol

Tactics: Exfiltration

Mitre Description

Exfiltration Over C2 Channel

Tactics: Exfiltration

Mitre Description

Exfiltration Over Other Network Medium

Tactics: Exfiltration

Mitre Description

Exfiltration Over Physical Medium

Tactics: Exfiltration

Mitre Description

Exfiltration Over Web Service

Tactics: Exfiltration

Mitre Description

Exploit Public-Facing Application

Tactics: Initial Access

Mitre Description

Exploitation for Client Execution

Tactics: Execution

Mitre Description

Exploitation for Credential Access

Tactics: Credential Access

Mitre Description

Exploitation for Defense Evasion

Tactics: Defense Evasion

Mitre Description

Exploitation for Privilege Escalation

Tactics: Privilege Escalation

Mitre Description

Exploitation of Remote Services

Tactics: Lateral Movement

Mitre Description

External Remote Services

Tactics: Initial Access, Persistence

Mitre Description

Fallback Channels

Tactics: Command and Control

Mitre Description

File and Directory Discovery

Tactics: Discovery

Mitre Description

File and Directory Permissions Modification

Tactics: Defense Evasion

Mitre Description

Firmware Corruption

Tactics: Impact

Mitre Description

Forced Authentication

Tactics: Credential Access

Mitre Description

Forge Web Credentials

Tactics: Credential Access

Mitre Description

Gather Victim Host Information

Tactics: Reconnaissance

Mitre Description

Gather Victim Identity Information

Tactics: Reconnaissance

Mitre Description

Gather Victim Network Information

Tactics: Reconnaissance

Mitre Description

Gather Victim Org Information

Tactics: Reconnaissance

Mitre Description

Group Policy Discovery

Tactics: Discovery

Mitre Description

Hardware Additions

Tactics: Initial Access

Mitre Description

Hide Artifacts

Tactics: Defense Evasion

Mitre Description

Hijack Execution Flow

Tactics: Defense Evasion, Persistence, Privilege Escalation

Mitre Description

Impair Defenses

Tactics: Defense Evasion

Mitre Description

Implant Internal Image

Tactics: Persistence

Mitre Description

Indicator Removal

Tactics: Defense Evasion

Mitre Description

Indirect Command Execution

Tactics: Defense Evasion

Mitre Description

Ingress Tool Transfer

Tactics: Command and Control

Mitre Description

Inhibit System Recovery

Tactics: Impact

Mitre Description

Input Capture

Tactics: Collection, Credential Access

Mitre Description

Inter-Process Communication

Tactics: Execution

Mitre Description

Internal Spearphishing

Tactics: Lateral Movement

Mitre Description

Lateral Tool Transfer

Tactics: Lateral Movement

Mitre Description

Masquerading

Tactics: Defense Evasion

Mitre Description

Modify Authentication Process

Tactics: Credential Access, Defense Evasion, Persistence

Mitre Description

Modify Cloud Compute Infrastructure

Tactics: Defense Evasion

Mitre Description

Modify Registry

Tactics: Defense Evasion

Mitre Description

Modify System Image

Tactics: Defense Evasion

Mitre Description

Multi-Factor Authentication Interception

Tactics: Credential Access

Mitre Description

Multi-Factor Authentication Request Generation

Tactics: Credential Access

Mitre Description

Multi-Stage Channels

Tactics: Command and Control

Mitre Description

Native API

Tactics: Execution

Mitre Description

Network Boundary Bridging

Tactics: Defense Evasion

Mitre Description

Network Denial of Service

Tactics: Impact

Mitre Description

Network Service Discovery

Tactics: Discovery

Mitre Description

Network Share Discovery

Tactics: Discovery

Mitre Description

Network Sniffing

Tactics: Credential Access, Discovery

Mitre Description

Non-Application Layer Protocol

Tactics: Command and Control

Mitre Description

Non-Standard Port

Tactics: Command and Control

Mitre Description

OS Credential Dumping

Tactics: Credential Access

Mitre Description

Obfuscated Files or Information

Tactics: Defense Evasion

Mitre Description

Obtain Capabilities

Tactics: Resource Development

Mitre Description

Office Application Startup

Tactics: Persistence

Mitre Description

Password Policy Discovery

Tactics: Discovery

Mitre Description

Peripheral Device Discovery

Tactics: Discovery

Mitre Description

Permission Groups Discovery

Tactics: Discovery

Mitre Description

Phishing

Tactics: Initial Access

Mitre Description

Phishing for Information

Tactics: Reconnaissance

Mitre Description

Plist File Modification

Tactics: Defense Evasion

Mitre Description

Pre-OS Boot

Tactics: Defense Evasion, Persistence

Mitre Description

Process Discovery

Tactics: Discovery

Mitre Description

Process Injection

Tactics: Defense Evasion, Privilege Escalation

Mitre Description

Protocol Tunneling

Tactics: Command and Control

Mitre Description

Proxy

Tactics: Command and Control

Mitre Description

Query Registry

Tactics: Discovery

Mitre Description

Reflective Code Loading

Tactics: Defense Evasion

Mitre Description

Remote Access Software

Tactics: Command and Control

Mitre Description

Remote Service Session Hijacking

Tactics: Lateral Movement

Mitre Description

Remote Services

Tactics: Lateral Movement

Mitre Description

Remote System Discovery

Tactics: Discovery

Mitre Description

Replication Through Removable Media

Tactics: Initial Access, Lateral Movement

Mitre Description

Resource Hijacking

Tactics: Impact

Mitre Description

Rogue Domain Controller

Tactics: Defense Evasion

Mitre Description

Rootkit

Tactics: Defense Evasion

Mitre Description

Scheduled Task/Job

Tactics: Execution, Persistence, Privilege Escalation

Mitre Description

Scheduled Transfer

Tactics: Exfiltration

Mitre Description

Screen Capture

Tactics: Collection

Mitre Description

Search Closed Sources

Tactics: Reconnaissance

Mitre Description

Search Open Technical Databases

Tactics: Reconnaissance

Mitre Description

Search Open Websites/Domains

Tactics: Reconnaissance

Mitre Description

Search Victim-Owned Websites

Tactics: Reconnaissance

Mitre Description

Server Software Component

Tactics: Persistence

Mitre Description

Serverless Execution

Tactics: Execution

Mitre Description

Service Stop

Tactics: Impact

Mitre Description

Shared Modules

Tactics: Execution

Mitre Description

Software Deployment Tools

Tactics: Execution, Lateral Movement

Mitre Description

Software Discovery

Tactics: Discovery

Mitre Description

Stage Capabilities

Tactics: Resource Development

Mitre Description

Steal Application Access Token

Tactics: Credential Access

Mitre Description

Steal or Forge Authentication Certificates

Tactics: Credential Access

Mitre Description

Steal or Forge Kerberos Tickets

Tactics: Credential Access

Mitre Description

Subvert Trust Controls

Tactics: Defense Evasion

Mitre Description

Supply Chain Compromise

Tactics: Initial Access

Mitre Description

System Binary Proxy Execution

Tactics: Defense Evasion

Mitre Description

System Information Discovery

Tactics: Discovery

Mitre Description

System Location Discovery

Tactics: Discovery

Mitre Description

System Network Configuration Discovery

Tactics: Discovery

Mitre Description

System Network Connections Discovery

Tactics: Discovery

Mitre Description

System Owner/User Discovery

Tactics: Discovery

Mitre Description

System Script Proxy Execution

Tactics: Defense Evasion

Mitre Description

System Service Discovery

Tactics: Discovery

Mitre Description

System Services

Tactics: Execution

Mitre Description

System Shutdown/Reboot

Tactics: Impact

Mitre Description

System Time Discovery

Tactics: Discovery

Mitre Description

Taint Shared Content

Tactics: Lateral Movement

Mitre Description

Template Injection

Tactics: Defense Evasion

Mitre Description

Traffic Signaling

Tactics: Command and Control, Defense Evasion, Persistence

Mitre Description

Transfer Data to Cloud Account

Tactics: Exfiltration

Mitre Description

Trusted Developer Utilities Proxy Execution

Tactics: Defense Evasion

Mitre Description

Trusted Relationship

Tactics: Initial Access

Mitre Description

Unsecured Credentials

Tactics: Credential Access

Mitre Description

Unused/Unsupported Cloud Regions

Tactics: Defense Evasion

Mitre Description

Use Alternate Authentication Material

Tactics: Defense Evasion, Lateral Movement

Mitre Description

User Execution

Tactics: Execution

Mitre Description

Valid Accounts

Tactics: Defense Evasion, Initial Access, Persistence, Privilege Escalation

Mitre Description

Video Capture

Tactics: Collection

Mitre Description

Virtualization/Sandbox Evasion

Tactics: Defense Evasion, Discovery

Mitre Description

Weaken Encryption

Tactics: Defense Evasion

Mitre Description

Web Service

Tactics: Command and Control

Mitre Description

Windows Management Instrumentation

Tactics: Execution

Mitre Description

XSL Script Processing

Tactics: Defense Evasion

Mitre Description