T1005
Collection
Data from Local System

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest …

Platforms
ESXi Linux macOS +2 more
T1025
Collection
Data from Removable Media

Adversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media …

Platforms
Linux macOS Windows
T1039
Collection
Data from Network Shared Drive

Adversaries may search network shares on computers they have compromised to find files of interest. Sensitive data can be collected from remote systems via shared …

Platforms
Linux macOS Windows
T1056
Collection
Input Capture

Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal system usage, users often provide credentials to various different …

Platforms
Linux macOS Network Devices +1 more
T1056.001
Collection
Keylogging

Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access …

Platforms
Linux macOS Network Devices +1 more
T1056.002
Collection
GUI Input Capture

Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional …

Platforms
macOS Windows Linux
T1056.003
Collection
Web Portal Capture

Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log …

Platforms
Linux macOS Windows
T1056.004
Collection
Credential API Hooking

Adversaries may hook into Windows application programming interface (API) functions and Linux system functions to collect user credentials. Malicious hooking mechanisms may capture API or …

Platforms
Windows Linux macOS
T1074
Collection
Data Staged

Adversaries may stage collected data in a central location or directory prior to Exfiltration. Data may be kept in separate files or combined into one …

Platforms
Windows IaaS Linux +2 more
T1074.001
Collection
Local Data Staging

Adversaries may stage collected data in a central location or directory on the local system prior to Exfiltration. Data may be kept in separate files …

Platforms
ESXi Linux macOS +1 more
T1074.002
Collection
Remote Data Staging

Adversaries may stage data collected from multiple systems in a central location or directory on one system prior to Exfiltration. Data may be kept in …

Platforms
Windows IaaS Linux +2 more
T1113
Collection
Screen Capture

Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included …

Platforms
Linux Windows macOS
T1114
Collection
Email Collection

Adversaries may target user email to collect sensitive information. Emails may contain sensitive data, including trade secrets or personal information, that can prove valuable to …

Platforms
Windows macOS Linux +1 more
T1114.001
Collection
Local Email Collection

Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such …

Platforms
Windows
T1114.002
Collection
Remote Email Collection

Adversaries may target an Exchange server, Office 365, or Google Workspace to collect sensitive information. Adversaries may leverage a user's credentials and interact directly with …

Platforms
Windows Office Suite
T1114.003
Collection
Email Forwarding Rule

Adversaries may setup email forwarding rules to collect sensitive information. Adversaries may abuse email forwarding rules to monitor the activities of a victim, steal information, …

Platforms
Linux macOS Office Suite +1 more
T1115
Collection
Clipboard Data

Adversaries may collect data stored in the clipboard from users copying information within or between applications. For example, on Windows adversaries can access clipboard data …

Platforms
Linux macOS Windows
T1119
Collection
Automated Collection

Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use …

Platforms
IaaS Linux macOS +3 more
T1123
Collection
Audio Capture

An adversary can leverage a computer's peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and video call services) to capture audio recordings for …

Platforms
Linux macOS Windows
T1125
Collection
Video Capture

An adversary can leverage a computer's peripheral devices (e.g., integrated cameras or webcams) or applications (e.g., video call services) to capture video recordings for the …

Platforms
Windows macOS Linux
T1185
Collection
Browser Session Hijacking

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various …

Platforms
Windows
T1213
Collection
Data from Information Repositories

Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information …

Platforms
Linux Windows macOS +3 more
T1213.001
Collection
Confluence

Adversaries may leverage Confluence repositories to mine valuable information. Often found in development environments alongside Atlassian JIRA, Confluence is generally used to store development-related documentation, …

Platforms
SaaS
T1213.002
Collection
Sharepoint

Adversaries may leverage the SharePoint repository as a source to mine valuable information. SharePoint will often contain useful information for an adversary to learn about …

Platforms
Windows Office Suite
T1213.003
Collection
Code Repositories

Adversaries may leverage code repositories to collect valuable information. Code repositories are tools/services that store source code and automate software builds. They may be hosted …

Platforms
SaaS
T1213.004
Collection
Customer Relationship Management Software

Adversaries may leverage Customer Relationship Management (CRM) software to mine valuable information. CRM software is used to assist organizations in tracking and managing customer interactions, …

Platforms
SaaS
T1213.005
Collection
Messaging Applications

Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and Slack, to mine valuable information. The following is a brief list …

Platforms
SaaS Office Suite
T1213.006
Collection
Databases

Adversaries may leverage databases to mine valuable information. These databases may be hosted on-premises or in the cloud (both in platform-as-a-service and software-as-a-service environments). Examples …

Platforms
Linux Windows macOS +2 more
T1530
Collection
Data from Cloud Storage

Adversaries may access data from cloud storage. Many IaaS providers offer solutions for online data object storage such as Amazon S3, Azure Storage, and Google …

Platforms
IaaS Office Suite SaaS
T1560
Collection
Archive Collected Data

An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize …

Platforms
Linux macOS Windows
T1560.001
Collection
Archive via Utility

Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into …

Platforms
Linux macOS Windows
T1560.002
Collection
Archive via Library

An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party libraries. Many libraries exist that can archive data, including …

Platforms
Linux macOS Windows
T1560.003
Collection
Archive via Custom Method

An adversary may compress or encrypt data that is collected prior to exfiltration using a custom method. Adversaries may choose to use custom archival methods, …

Platforms
Linux macOS Windows
T1602
Collection
Data from Configuration Repository

Adversaries may collect data related to managed devices from configuration repositories. Configuration repositories are used by management systems in order to configure, manage, and control …

Platforms
Network Devices
T1602.001
Collection
SNMP (MIB Dump)

Adversaries may target the Management Information Base (MIB) to collect and/or mine valuable information in a network managed using Simple Network Management Protocol (SNMP). The …

Platforms
Network Devices
T1602.002
Collection
Network Device Configuration Dump

Adversaries may access network configuration files to collect sensitive data about the device and the network. The network configuration is a file containing parameters that …

Platforms
Network Devices
T1001
Command and Control
Data Obfuscation

Adversaries may obfuscate command and control traffic to make it more difficult to detect.(Citation: Bitdefender FunnyDream Campaign November 2020) Command and control (C2) communications are …

Platforms
ESXi Linux macOS +1 more
T1001.001
Command and Control
Junk Data

Adversaries may add junk data to protocols used for command and control to make detection more difficult.(Citation: FireEye SUNBURST Backdoor December 2020) By adding random …

Platforms
ESXi Linux macOS +1 more
T1001.002
Command and Control
Steganography

Adversaries may use steganographic techniques to hide command and control traffic to make detection efforts more difficult. Steganographic techniques can be used to hide data …

Platforms
Linux macOS Windows +1 more
T1001.003
Command and Control
Protocol or Service Impersonation

Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thwart analysis efforts. By impersonating legitimate protocols or web …

Platforms
ESXi Linux macOS +1 more
T1008
Command and Control
Fallback Channels

Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and …

Platforms
Linux Windows macOS +1 more
T1024
Command and Control
Custom Cryptographic Protocol

Adversaries may use a custom cryptographic protocol or algorithm to hide command and control traffic. A simple scheme, such as XOR-ing the plaintext with a …

Platforms
Linux macOS Windows
T1026
Command and Control
Multiband Communication

**This technique has been deprecated and should no longer be used.** Some adversaries may split communications between different protocols. There could be one protocol for …

Platforms
Linux macOS Windows
T1032
Command and Control
Standard Cryptographic Protocol

Adversaries may explicitly employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication …

Platforms
Linux macOS Windows
T1043
Command and Control
Commonly Used Port

**This technique has been deprecated. Please use [Non-Standard Port](https://attack.mitre.org/techniques/T1571) where appropriate.** Adversaries may communicate over a commonly used port to bypass firewalls or network detection …

Platforms
Linux macOS Windows
T1065
Command and Control
Uncommonly Used Port

Adversaries may conduct C2 communications over a non-standard port to bypass proxies and firewalls that have been improperly configured.

Platforms
Linux macOS Windows
T1071
Command and Control
Application Layer Protocol

Adversaries may communicate using OSI application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often …

Platforms
Linux macOS Windows +2 more
T1071.001
Command and Control
Web Protocols

Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Commands to the remote …

Platforms
ESXi Linux macOS +2 more
T1071.002
Command and Control
File Transfer Protocols

Adversaries may communicate using application layer protocols associated with transferring files to avoid detection/network filtering by blending in with existing traffic. Commands to the remote …

Platforms
ESXi Linux macOS +2 more
T1071.003
Command and Control
Mail Protocols

Adversaries may communicate using application layer protocols associated with electronic mail delivery to avoid detection/network filtering by blending in with existing traffic. Commands to the …

Platforms
Linux macOS Network Devices +1 more
T1071.004
Command and Control
DNS

Adversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic. Commands to the …

Platforms
Linux macOS Windows +2 more
T1071.005
Command and Control
Publish/Subscribe Protocols

Adversaries may communicate using publish/subscribe (pub/sub) application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and …

Platforms
macOS Linux Windows +1 more
T1079
Command and Control
Multilayer Encryption

An adversary performs C2 communications using multiple layers of encryption, typically (but not exclusively) tunneling a custom encryption scheme within a protocol encryption scheme such …

Platforms
Linux macOS Windows
T1090
Command and Control
Proxy

Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications to a command and control …

Platforms
ESXi Linux macOS +2 more
T1090.001
Command and Control
Internal Proxy

Adversaries may use an internal proxy to direct command and control traffic between two or more systems in a compromised environment. Many tools exist that …

Platforms
Linux Network Devices Windows +2 more
T1090.002
Command and Control
External Proxy

Adversaries may use an external proxy to act as an intermediary for network communications to a command and control server to avoid direct connections to …

Platforms
ESXi Linux Network Devices +2 more
T1090.003
Command and Control
Multi-hop Proxy

Adversaries may chain together multiple proxies to disguise the source of malicious traffic. Typically, a defender will be able to identify the last proxy traffic …

Platforms
ESXi Linux macOS +2 more
T1090.004
Command and Control
Domain Fronting

Adversaries may take advantage of routing schemes in Content Delivery Networks (CDNs) and other services which host multiple domains to obfuscate the intended destination of …

Platforms
Linux macOS Windows +1 more
T1092
Command and Control
Communication Through Removable Media

Adversaries can perform command and control between compromised hosts on potentially disconnected networks using removable media to transfer commands from system to system.(Citation: ESET Sednit …

Platforms
Linux macOS Windows
T1094
Command and Control
Custom Command and Control Protocol

Adversaries may communicate using a custom command and control protocol instead of encapsulating commands/data in an existing [Application Layer Protocol](https://attack.mitre.org/techniques/T1071). Implementations include mimicking well-known protocols …

Platforms
Linux macOS Windows
T1095
Command and Control
Non-Application Layer Protocol

Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts within a network. The list of …

Platforms
ESXi Linux macOS +2 more
T1102
Command and Control
Web Service

Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites, cloud services, and social …

Platforms
ESXi Linux Windows +1 more
T1102.001
Command and Control
Dead Drop Resolver

Adversaries may use an existing, legitimate external Web service to host information that points to additional command and control (C2) infrastructure. Adversaries may post content, …

Platforms
ESXi Linux macOS +1 more
T1102.002
Command and Control
Bidirectional Communication

Adversaries may use an existing, legitimate external Web service as a means for sending commands to and receiving output from a compromised system over the …

Platforms
Linux macOS Windows +1 more
T1102.003
Command and Control
One-Way Communication

Adversaries may use an existing, legitimate external Web service as a means for sending commands to a compromised system without receiving return output over the …

Platforms
Linux macOS Windows +1 more
T1104
Command and Control
Multi-Stage Channels

Adversaries may create multiple stages for command and control that are employed under different conditions or for certain functions. Use of multiple stages may obfuscate …

Platforms
Linux macOS Windows +1 more
T1105
Command and Control
Ingress Tool Transfer

Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled …

Platforms
ESXi Linux macOS +2 more
T1132
Command and Control
Data Encoding

Adversaries may encode data to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded …

Platforms
Linux macOS Windows +1 more
T1132.001
Command and Control
Standard Encoding

Adversaries may encode data with a standard data encoding system to make the content of command and control traffic more difficult to detect. Command and …

Platforms
ESXi Linux Windows +1 more
T1132.002
Command and Control
Non-Standard Encoding

Adversaries may encode data with a non-standard data encoding system to make the content of command and control traffic more difficult to detect. Command and …

Platforms
ESXi Linux macOS +1 more
T1172
Command and Control
Domain Fronting

Domain fronting takes advantage of routing schemes in Content Delivery Networks (CDNs) and other services which host multiple domains to obfuscate the intended destination of …

Platforms
Linux macOS Windows
T1188
Command and Control
Multi-hop Proxy

To disguise the source of malicious traffic, adversaries may chain together multiple proxies. Typically, a defender will be able to identify the last proxy traffic …

Platforms
Linux macOS Windows
T1219
Command and Control
Remote Access Tools

An adversary may use legitimate remote access tools to establish an interactive command and control channel within a network. Remote access tools create a session …

Platforms
Linux macOS Windows
T1219.001
Command and Control
IDE Tunneling

Adversaries may abuse Integrated Development Environment (IDE) software with remote development features to establish an interactive command and control channel on target systems within a …

Platforms
Linux macOS Windows
T1219.002
Command and Control
Remote Desktop Software

An adversary may use legitimate desktop support software to establish an interactive command and control channel to target systems within networks. Desktop support software provides …

Platforms
Linux macOS Windows
T1219.003
Command and Control
Remote Access Hardware

An adversary may use legitimate remote access hardware to establish an interactive command and control channel to target systems within networks. These services, including IP-based …

Platforms
Linux macOS Windows
T1483
Command and Control
Domain Generation Algorithms

Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination for command and control traffic rather than relying on a list …

Platforms
Linux macOS Windows
T1568
Command and Control
Dynamic Resolution

Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares …

Platforms
Linux macOS Windows +1 more
T1568.001
Command and Control
Fast Flux DNS

Adversaries may use Fast Flux DNS to hide a command and control channel behind an array of rapidly changing IP addresses linked to a single …

Platforms
Linux macOS Windows +1 more
T1568.002
Command and Control
Domain Generation Algorithms

Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination domain for command and control traffic rather than relying on a …

Platforms
Linux macOS Windows +1 more
T1568.003
Command and Control
DNS Calculation

Adversaries may perform calculations on addresses returned in DNS results to determine which port and IP address to use for command and control, rather than …

Platforms
Linux macOS Windows +1 more
T1571
Command and Control
Non-Standard Port

Adversaries may communicate using a protocol and port pairing that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or …

Platforms
ESXi Linux macOS +1 more
T1572
Command and Control
Protocol Tunneling

Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable …

Platforms
ESXi Linux macOS +1 more
T1573
Command and Control
Encrypted Channel

Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite …

Platforms
ESXi Linux macOS +2 more
T1573.001
Command and Control
Symmetric Cryptography

Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication …

Platforms
ESXi Linux macOS +2 more
T1573.002
Command and Control
Asymmetric Cryptography

Adversaries may employ a known asymmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication …

Platforms
ESXi Linux macOS +2 more
T1665
Command and Control
Hide Infrastructure

Adversaries may manipulate network traffic in order to hide and evade detection of their C2 infrastructure. This can be accomplished by identifying and filtering traffic …

Platforms
ESXi Linux Network Devices +2 more
T1003
Credential Access
OS Credential Dumping

Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. …

Platforms
Linux macOS Windows
T1003.001
Credential Access
LSASS Memory

Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, …

Platforms
Windows
T1003.002
Credential Access
Security Account Manager

Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the …

Platforms
Windows
T1003.003
Credential Access
NTDS

Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain …

Platforms
Windows
T1003.004
Credential Access
LSA Secrets

Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, …

Platforms
Windows
T1003.005
Credential Access
Cached Domain Credentials

Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain controller is unavailable.(Citation: Microsoft - Cached …

Platforms
Windows Linux
T1003.006
Credential Access
DCSync

Adversaries may attempt to access credentials and other sensitive information by abusing a Windows Domain Controller's application programming interface (API)(Citation: Microsoft DRSR Dec 2017) (Citation: …

Platforms
Windows
T1003.007
Credential Access
Proc Filesystem

Adversaries may gather credentials from the proc filesystem or `/proc`. The proc filesystem is a pseudo-filesystem used as an interface to kernel data structures for …

Platforms
Linux
T1003.008
Credential Access
/etc/passwd and /etc/shadow

Adversaries may attempt to dump the contents of <code>/etc/passwd</code> and <code>/etc/shadow</code> to enable offline password cracking. Most modern Linux operating systems use a combination of …

Platforms
Linux
T1040
Credential Access
Network Sniffing

Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the …

Platforms
Linux macOS Windows +2 more
T1081
Credential Access
Credentials in Files

Adversaries may search local file systems and remote file shares for files containing passwords. These can be files created by users to store their own …

Platforms
Windows IaaS Linux +1 more
T1110
Credential Access
Brute Force

Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.(Citation: TrendMicro Pawn Storm Dec …

Platforms
Containers ESXi IaaS +7 more
T1110.001
Credential Access
Password Guessing

Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the …

Platforms
Windows SaaS IaaS +7 more
T1110.002
Credential Access
Password Cracking

Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. [OS …

Platforms
Linux macOS Windows +3 more
T1110.003
Credential Access
Password Spraying

Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials. Password spraying …

Platforms
Containers ESXi IaaS +7 more
T1110.004
Credential Access
Credential Stuffing

Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap. Occasionally, large numbers of username …

Platforms
Windows SaaS IaaS +7 more
T1111
Credential Access
Multi-Factor Authentication Interception

Adversaries may target multi-factor authentication (MFA) mechanisms, (i.e., smart cards, token generators, etc.) to gain access to credentials that can be used to access systems, …

Platforms
Linux Windows macOS
T1139
Credential Access
Bash History

Bash keeps track of the commands users type on the command-line with the "history" utility. Once a user logs out, the history is flushed to …

Platforms
Linux macOS
T1141
Credential Access
Input Prompt

When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt …

Platforms
macOS Windows
T1142
Credential Access
Keychain

Keychains are the built-in way for macOS to keep track of users' passwords and credentials for many services and features such as WiFi passwords, websites, …

Platforms
macOS
T1145
Credential Access
Private Keys

Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures. (Citation: Wikipedia Public Key Crypto) Adversaries may gather private keys from compromised …

Platforms
Linux macOS Windows
T1167
Credential Access
Securityd Memory

In OS X prior to El Capitan, users with root access can read plaintext keychain passwords of logged-in users because Apple’s keychain implementation allows these …

Platforms
macOS
T1171
Credential Access
LLMNR/NBT-NS Poisoning and Relay

Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based …

Platforms
Windows
T1174
Credential Access
Password Filter DLL

Windows password filters are password policy enforcement mechanisms for both domain and local accounts. Filters are implemented as dynamic link libraries (DLLs) containing a method …

Platforms
Windows
T1187
Credential Access
Forced Authentication

Adversaries may gather credential material by invoking or forcing a user to automatically provide authentication information through a mechanism in which they can intercept. The …

Platforms
Windows
T1208
Credential Access
Kerberoasting

Service principal names (SPNs) are used to uniquely identify each instance of a Windows service. To enable authentication, Kerberos requires that SPNs be associated with …

Platforms
Windows
T1212
Credential Access
Exploitation for Credential Access

Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming …

Platforms
Linux Windows macOS +1 more
T1214
Credential Access
Credentials in Registry

The Windows Registry stores configuration information that can be used by the system or other programs. Adversaries may query the Registry looking for credentials and …

Platforms
Windows
T1503
Credential Access
Credentials from Web Browsers

Adversaries may acquire credentials from web browsers by reading files specific to the target browser. (Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials …

Platforms
Linux macOS Windows
T1522
Credential Access
Cloud Instance Metadata API

Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. Most cloud service providers support a Cloud Instance …

Platforms
IaaS
T1528
Credential Access
Steal Application Access Token

Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources. Application access tokens are used to make …

Platforms
SaaS Containers IaaS +2 more
T1539
Credential Access
Steal Web Session Cookie

An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated …

Platforms
Linux Office Suite SaaS +2 more
T1552
Credential Access
Unsecured Credentials

Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, …

Platforms
Windows SaaS IaaS +6 more
T1552.001
Credential Access
Credentials In Files

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store …

Platforms
Containers IaaS Linux +2 more
T1552.002
Credential Access
Credentials in Registry

Adversaries may search the Registry on compromised systems for insecurely stored credentials. The Windows Registry stores configuration information that can be used by the system …

Platforms
Windows
T1552.003
Credential Access
Shell History

Adversaries may search the command history on compromised systems for insecurely stored credentials. On Linux and macOS systems, shells such as Bash and Zsh keep …

Platforms
Linux macOS Windows
T1552.004
Credential Access
Private Keys

Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Private cryptographic keys and certificates are used for authentication, encryption/decryption, …

Platforms
Linux macOS Network Devices +1 more
T1552.005
Credential Access
Cloud Instance Metadata API

Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. Most cloud service providers support a Cloud Instance …

Platforms
IaaS
T1552.006
Credential Access
Group Policy Preferences

Adversaries may attempt to find unsecured credentials in Group Policy Preferences (GPP). GPP are tools that allow administrators to create domain policies with embedded credentials. …

Platforms
Windows
T1552.007
Credential Access
Container API

Adversaries may gather credentials via APIs within a containers environment. APIs in these environments, such as the Docker API and Kubernetes APIs, allow a user …

Platforms
Containers
T1552.008
Credential Access
Chat Messages

Adversaries may directly collect unsecured credentials stored or passed through user communication services. Credentials may be sent and stored in user chat communication applications such …

Platforms
SaaS Office Suite
T1555
Credential Access
Credentials from Password Stores

Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) Passwords are stored in several places on a system, depending …

Platforms
IaaS Linux macOS +1 more
T1555.001
Credential Access
Keychain

Adversaries may acquire credentials from Keychain. Keychain (or Keychain Services) is the macOS credential management system that stores account names, passwords, private keys, certificates, sensitive …

Platforms
macOS
T1555.002
Credential Access
Securityd Memory

An adversary with root access may gather credentials by reading `securityd`’s memory. `securityd` is a service/daemon responsible for implementing security protocols such as encryption and …

Platforms
Linux macOS
T1555.003
Credential Access
Credentials from Web Browsers

Adversaries may acquire credentials from web browsers by reading files specific to the target browser.(Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials such …

Platforms
Linux macOS Windows
T1555.004
Credential Access
Windows Credential Manager

Adversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stores credentials for signing into websites, applications, and/or devices that request authentication through …

Platforms
Windows
T1555.005
Credential Access
Password Managers

Adversaries may acquire user credentials from third-party password managers.(Citation: ise Password Manager February 2019) Password managers are applications designed to store user credentials, normally in …

Platforms
Linux macOS Windows
T1555.006
Credential Access
Cloud Secrets Management Stores

Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, and Terraform Vault. Secrets managers …

Platforms
IaaS
T1556
Credential Access
Modify Authentication Process

Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, …

Platforms
Windows Linux macOS +5 more
T1556.001
Credential Access
Domain Controller Authentication

Adversaries may patch the authentication process on a domain controller to bypass the typical authentication mechanisms and enable access to accounts. Malware may be used …

Platforms
Windows
T1556.002
Credential Access
Password Filter DLL

Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentication process to acquire user credentials as they are validated. Windows password filters …

Platforms
Windows
T1556.003
Credential Access
Pluggable Authentication Modules

Adversaries may modify pluggable authentication modules (PAM) to access user credentials or enable otherwise unwarranted access to accounts. PAM is a modular system of configuration …

Platforms
Linux macOS
T1556.004
Credential Access
Network Device Authentication

Adversaries may use [Patch System Image](https://attack.mitre.org/techniques/T1601/001) to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on …

Platforms
Network Devices
T1556.005
Credential Access
Reversible Encryption

An adversary may abuse Active Directory authentication encryption properties to gain access to credentials on Windows systems. The <code>AllowReversiblePasswordEncryption</code> property specifies whether reversible password encryption …

Platforms
Windows
T1556.006
Credential Access
Multi-Factor Authentication

Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts. Once adversaries have gained access to a network by …

Platforms
Windows SaaS IaaS +4 more
T1556.007
Credential Access
Hybrid Identity

Adversaries may patch, modify, or otherwise backdoor cloud authentication processes that are tied to on-premises user identities in order to bypass typical authentication mechanisms, access …

Platforms
Windows SaaS IaaS +2 more
T1556.008
Credential Access
Network Provider DLL

Adversaries may register malicious network provider dynamic link libraries (DLLs) to capture cleartext user credentials during the authentication process. Network provider DLLs allow Windows to …

Platforms
Windows
T1556.009
Credential Access
Conditional Access Policies

Adversaries may disable or modify conditional access policies to enable persistent access to compromised accounts. Conditional access policies are additional verifications used by identity providers …

Platforms
IaaS Identity Provider
T1557
Credential Access
Adversary-in-the-Middle

Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040), …

Platforms
Linux macOS Network Devices +1 more
T1557.001
Credential Access
LLMNR/NBT-NS Poisoning and SMB Relay

By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity …

Platforms
Windows
T1557.002
Credential Access
ARP Cache Poisoning

Adversaries may poison Address Resolution Protocol (ARP) caches to position themselves between the communication of two or more networked devices. This activity may be used …

Platforms
Linux Windows macOS
T1557.003
Credential Access
DHCP Spoofing

Adversaries may redirect network traffic to adversary-owned systems by spoofing Dynamic Host Configuration Protocol (DHCP) traffic and acting as a malicious DHCP server on the …

Platforms
Linux Windows macOS
T1557.004
Credential Access
Evil Twin

Adversaries may host seemingly genuine Wi-Fi access points to deceive users into connecting to malicious networks as a way of supporting follow-on behaviors such as …

Platforms
Network Devices
T1558
Credential Access
Steal or Forge Kerberos Tickets

Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used …

Platforms
Windows Linux macOS
T1558.001
Credential Access
Golden Ticket

Adversaries who have the KRBTGT account password hash may forge Kerberos ticket-granting tickets (TGT), also known as a golden ticket.(Citation: AdSecurity Kerberos GT Aug 2015) …

Platforms
Windows
T1558.002
Credential Access
Silver Ticket

Adversaries who have the password hash of a target service account (e.g. SharePoint, MSSQL) may forge Kerberos ticket granting service (TGS) tickets, also known as …

Platforms
Windows
T1558.003
Credential Access
Kerberoasting

Adversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to obtain a ticket-granting service (TGS) ticket that may be vulnerable to …

Platforms
Windows
T1558.004
Credential Access
AS-REP Roasting

Adversaries may reveal credentials of accounts that have disabled Kerberos preauthentication by [Password Cracking](https://attack.mitre.org/techniques/T1110/002) Kerberos messages.(Citation: Harmj0y Roasting AS-REPs Jan 2017) Preauthentication offers protection against …

Platforms
Windows
T1558.005
Credential Access
Ccache Files

Adversaries may attempt to steal Kerberos tickets stored in credential cache files (or ccache). These files are used for short term storage of a user's …

Platforms
Linux macOS
T1606
Credential Access
Forge Web Credentials

Adversaries may forge credential materials that can be used to gain access to web applications or Internet services. Web applications and services (hosted in cloud …

Platforms
SaaS Windows macOS +4 more
T1606.001
Credential Access
Web Cookies

Adversaries may forge web cookies that can be used to gain access to web applications or Internet services. Web applications and services (hosted in cloud …

Platforms
Linux macOS Windows +2 more
T1606.002
Credential Access
SAML Tokens

An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.(Citation: Microsoft SolarWinds Steps) The default …

Platforms
SaaS Windows IaaS +2 more
T1621
Credential Access
Multi-Factor Authentication Request Generation

Adversaries may attempt to bypass multi-factor authentication (MFA) mechanisms and gain access to accounts by generating MFA requests sent to users. Adversaries in possession of …

Platforms
Windows Linux macOS +4 more
T1649
Credential Access
Steal or Forge Authentication Certificates

Adversaries may steal or forge certificates used for authentication to access remote systems or resources. Digital certificates are often used to sign and encrypt messages …

Platforms
Windows Linux macOS +1 more
T1006
Defense Evasion
Direct Volume Access

Adversaries may directly access a volume to bypass file access controls and file system monitoring. Windows allows programs to have direct access to logical volumes. …

Platforms
Network Devices Windows
T1009
Defense Evasion
Binary Padding

Adversaries can use binary padding to add junk data and change the on-disk representation of malware without affecting the functionality or behavior of the binary. …

Platforms
Linux macOS Windows
T1014
Defense Evasion
Rootkit

Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the …

Platforms
Linux macOS Windows
T1027
Defense Evasion
Obfuscated Files or Information

Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system …

Platforms
ESXi Linux macOS +2 more
T1027.001
Defense Evasion
Binary Padding

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done without affecting the functionality or …

Platforms
Linux Windows macOS
T1027.002
Defense Evasion
Software Packing

Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. …

Platforms
Linux macOS Windows
T1027.003
Defense Evasion
Steganography

Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media …

Platforms
Linux macOS Windows
T1027.004
Defense Evasion
Compile After Delivery

Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled code. Text-based source code files may subvert …

Platforms
Linux macOS Windows
T1027.005
Defense Evasion
Indicator Removal from Tools

Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing …

Platforms
Linux macOS Windows
T1027.006
Defense Evasion
HTML Smuggling

Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML files. HTML documents can store large binary …

Platforms
Windows Linux macOS
T1027.007
Defense Evasion
Dynamic API Resolution

Adversaries may obfuscate then dynamically resolve API functions called by their malware in order to conceal malicious functionalities and impair defensive analysis. Malware commonly uses …

Platforms
Windows
T1027.008
Defense Evasion
Stripped Payloads

Adversaries may attempt to make a payload difficult to analyze by removing symbols, strings, and other human readable information. Scripts and executables may contain variables …

Platforms
macOS Linux Windows +1 more
T1027.009
Defense Evasion
Embedded Payloads

Adversaries may embed payloads within other files to conceal malicious content from defenses. Otherwise seemingly benign files (such as scripts and executables) may be abused …

Platforms
Linux macOS Windows
T1027.010
Defense Evasion
Command Obfuscation

Adversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of making strings and patterns within commands and scripts more …

Platforms
Linux macOS Windows
T1027.011
Defense Evasion
Fileless Storage

Adversaries may store data in "fileless" formats to conceal malicious activity from defenses. Fileless storage can be broadly defined as any format other than a …

Platforms
Windows Linux
T1027.012
Defense Evasion
LNK Icon Smuggling

Adversaries may smuggle commands to download malicious payloads past content filters by hiding them within otherwise seemingly benign windows shortcut files. Windows shortcut files (.LNK) …

Platforms
Windows
T1027.013
Defense Evasion
Encrypted/Encoded File

Adversaries may encrypt or encode files to obfuscate strings, bytes, and other specific patterns to impede detection. Encrypting and/or encoding file content aims to conceal …

Platforms
Linux macOS Windows
T1027.014
Defense Evasion
Polymorphic Code

Adversaries may utilize polymorphic code (also known as metamorphic or mutating code) to evade detection. Polymorphic code is a type of software capable of changing …

Platforms
Windows macOS Linux
T1027.015
Defense Evasion
Compression

Adversaries may use compression to obfuscate their payloads or files. Compressed file formats such as ZIP, gzip, 7z, and RAR can compress and archive multiple …

Platforms
Linux Windows macOS
T1027.016
Defense Evasion
Junk Code Insertion

Adversaries may use junk code / dead code to obfuscate a malware’s functionality. Junk code is code that either does not execute, or if it …

Platforms
Linux macOS Windows
T1027.017
Defense Evasion
SVG Smuggling

Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.(Citation: Trustwave SVG Smuggling 2025) SVGs, or …

Platforms
Linux macOS Windows
T1036
Defense Evasion
Masquerading

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the …

Platforms
Containers ESXi Linux +2 more
T1036.001
Defense Evasion
Invalid Code Signature

Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, or tool. Code signing provides a …

Platforms
Windows macOS
T1036.002
Defense Evasion
Right-to-Left Override

Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is …

Platforms
Linux macOS Windows
T1036.003
Defense Evasion
Rename Legitimate Utilities

Adversaries may rename legitimate / system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may …

Platforms
Linux macOS Windows
T1036.004
Defense Evasion
Masquerade Task or Service

Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler …

Platforms
Linux macOS Windows
T1036.005
Defense Evasion
Match Legitimate Resource Name or Location

Adversaries may match or approximate the name or location of legitimate files, Registry keys, or other resources when naming/placing them. This is done for the …

Platforms
Containers ESXi Linux +2 more
T1036.006
Defense Evasion
Space after Filename

Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does not work with .app …

Platforms
Linux macOS
T1036.007
Defense Evasion
Double File Extension

Adversaries may abuse a double extension in the filename as a means of masquerading the true file type. A file name may include a secondary …

Platforms
Windows
T1036.008
Defense Evasion
Masquerade File Type

Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, icon, and contents. Various file types …

Platforms
Linux macOS Windows
T1036.009
Defense Evasion
Break Process Trees

An adversary may attempt to evade process tree-based analysis by modifying executed malware's parent process ID (PPID). If endpoint protection software leverages the “parent-child" relationship …

Platforms
Linux macOS
T1036.010
Defense Evasion
Masquerade Account Name

Adversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This will typically occur during [Create Account](https://attack.mitre.org/techniques/T1136), although …

Platforms
Linux macOS Windows +5 more
T1036.011
Defense Evasion
Overwrite Process Arguments

Adversaries may modify a process's in-memory arguments to change its name in order to appear as a legitimate or benign process. On Linux, the operating …

Platforms
Linux
T1036.012
Defense Evasion
Browser Fingerprint

Adversaries may attempt to blend in with legitimate traffic by spoofing browser and system attributes like operating system, system language, platform, user-agent string, resolution, time …

Platforms
Linux macOS Windows
T1045
Defense Evasion
Software Packing

Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. …

Platforms
Windows macOS
T1054
Defense Evasion
Indicator Blocking

An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting (Citation: Microsoft …

Platforms
Windows
T1055
Defense Evasion
Process Injection

Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing …

Platforms
Linux macOS Windows
T1055.001
Defense Evasion
Dynamic-link Library Injection

Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method …

Platforms
Windows
T1055.002
Defense Evasion
Portable Executable Injection

Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method …

Platforms
Windows
T1055.003
Defense Evasion
Thread Execution Hijacking

Adversaries may inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. Thread Execution Hijacking is a …

Platforms
Windows
T1055.004
Defense Evasion
Asynchronous Procedure Call

Adversaries may inject malicious code into processes via the asynchronous procedure call (APC) queue in order to evade process-based defenses as well as possibly elevate …

Platforms
Windows
T1055.005
Defense Evasion
Thread Local Storage

Adversaries may inject malicious code into processes via thread local storage (TLS) callbacks in order to evade process-based defenses as well as possibly elevate privileges. …

Platforms
Windows
T1055.008
Defense Evasion
Ptrace System Calls

Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. …

Platforms
Linux
T1055.009
Defense Evasion
Proc Memory

Adversaries may inject malicious code into processes via the /proc filesystem in order to evade process-based defenses as well as possibly elevate privileges. Proc memory …

Platforms
Linux
T1055.011
Defense Evasion
Extra Window Memory Injection

Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges. EWM …

Platforms
Windows
T1055.012
Defense Evasion
Process Hollowing

Adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. Process hollowing is a method of executing arbitrary code …

Platforms
Windows
T1055.013
Defense Evasion
Process Doppelgänging

Adversaries may inject malicious code into process via process doppelgänging in order to evade process-based defenses as well as possibly elevate privileges. Process doppelgänging is …

Platforms
Windows
T1055.014
Defense Evasion
VDSO Hijacking

Adversaries may inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges. Virtual dynamic shared …

Platforms
Linux
T1055.015
Defense Evasion
ListPlanting

Adversaries may abuse list-view controls to inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. ListPlanting …

Platforms
Windows
T1064
Defense Evasion
Scripting

**This technique has been deprecated. Please use [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) where appropriate.** Adversaries may use scripts to aid in operations and perform multiple actions …

Platforms
Linux macOS Windows
T1066
Defense Evasion
Indicator Removal from Tools

If a malicious tool is detected and quarantined or otherwise curtailed, an adversary may be able to determine why the malicious tool was detected (the …

Platforms
Linux macOS Windows
T1070
Defense Evasion
Indicator Removal

Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an …

Platforms
Containers ESXi Linux +4 more
T1070.001
Defense Evasion
Clear Windows Event Logs

Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Windows Event Logs are a record of a computer's alerts and notifications. …

Platforms
Windows
T1070.002
Defense Evasion
Clear Linux or Mac System Logs

Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. …

Platforms
Linux macOS
T1070.003
Defense Evasion
Clear Command History

In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. …

Platforms
ESXi Linux macOS +2 more
T1070.004
Defense Evasion
File Deletion

Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system …

Platforms
ESXi Linux macOS +1 more
T1070.005
Defense Evasion
Network Share Connection Removal

Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation. Windows shared drive and [SMB/Windows Admin …

Platforms
Windows
T1070.006
Defense Evasion
Timestomp

Adversaries may modify file time attributes to hide new files or changes to existing files. Timestomping is a technique that modifies the timestamps of a …

Platforms
ESXi Linux macOS +1 more
T1070.007
Defense Evasion
Clear Network Connection History and Configurations

Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operations. Configuration settings as well as various …

Platforms
Linux macOS Windows +1 more
T1070.008
Defense Evasion
Clear Mailbox Data

Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete …

Platforms
Linux macOS Office Suite +1 more
T1070.009
Defense Evasion
Clear Persistence

Adversaries may clear artifacts associated with previously established persistence on a host system to remove evidence of their activity. This may involve various actions, such …

Platforms
ESXi Linux Windows +1 more
T1070.010
Defense Evasion
Relocate Malware

Once a payload is delivered, adversaries may reproduce copies of the same malware on the victim system to remove evidence of their presence and/or avoid …

Platforms
Linux macOS Windows +1 more
T1073
Defense Evasion
DLL Side-Loading

Programs may specify DLLs that are loaded at runtime. Programs that improperly or vaguely specify a required DLL may be open to a vulnerability in …

Platforms
Windows
T1078
Defense Evasion
Valid Accounts

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may …

Platforms
Containers ESXi IaaS +7 more
T1078.001
Defense Evasion
Default Accounts

Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts …

Platforms
Windows SaaS IaaS +7 more
T1078.002
Defense Evasion
Domain Accounts

Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.(Citation: TechNet Credential …

Platforms
ESXi Linux macOS +1 more
T1078.003
Defense Evasion
Local Accounts

Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts …

Platforms
Linux macOS Windows +3 more
T1078.004
Defense Evasion
Cloud Accounts

Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those …

Platforms
IaaS Identity Provider Office Suite +1 more
T1085
Defense Evasion
Rundll32

The rundll32.exe program can be called to execute an arbitrary binary. Adversaries may take advantage of this functionality to proxy execution of code to avoid …

Platforms
Windows
T1088
Defense Evasion
Bypass User Account Control

Windows User Account Control (UAC) allows a program to elevate its privileges to perform a task under administrator-level permissions by prompting the user for confirmation. …

Platforms
Windows
T1089
Defense Evasion
Disabling Security Tools

Adversaries may disable security tools to avoid possible detection of their tools and activities. This can take the form of killing security software or event …

Platforms
Linux macOS Windows
T1093
Defense Evasion
Process Hollowing

Process hollowing occurs when a process is created in a suspended state then its memory is unmapped and replaced with malicious code. Similar to [Process …

Platforms
Windows
T1096
Defense Evasion
NTFS File Attributes

Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record for every file/directory on the partition. (Citation: …

Platforms
Windows
T1099
Defense Evasion
Timestomp

Adversaries may take actions to hide the deployment of new, or modification of existing files to obfuscate their activities. Timestomping is a technique that modifies …

Platforms
Linux Windows macOS
T1107
Defense Evasion
File Deletion

Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system …

Platforms
Linux macOS Windows
T1108
Defense Evasion
Redundant Access

**This technique has been deprecated. Please use [Create Account](https://attack.mitre.org/techniques/T1136), [Web Shell](https://attack.mitre.org/techniques/T1505/003), and [External Remote Services](https://attack.mitre.org/techniques/T1133) where appropriate.** Adversaries may use more than one remote access …

Platforms
Windows SaaS IaaS +4 more
T1109
Defense Evasion
Component Firmware

Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and …

Platforms
Windows
T1112
Defense Evasion
Modify Registry

Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution. Access to …

Platforms
Windows
T1116
Defense Evasion
Code Signing

Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: …

Platforms
macOS Windows
T1117
Defense Evasion
Regsvr32

Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, including dynamic link libraries (DLLs), on Windows systems. Regsvr32.exe can …

Platforms
Windows
T1118
Defense Evasion
InstallUtil

InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) …

Platforms
Windows
T1121
Defense Evasion
Regsvcs/Regasm

Regsvcs and Regasm are Windows command-line utilities that are used to register .NET Component Object Model (COM) assemblies. Both are digitally signed by Microsoft. (Citation: …

Platforms
Windows
T1122
Defense Evasion
Component Object Model Hijacking

The Component Object Model (COM) is a system within Windows to enable interaction between software components through the operating system. (Citation: Microsoft Component Object Model) …

Platforms
Windows
T1126
Defense Evasion
Network Share Connection Removal

Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation. Windows shared drive and [Windows Admin …

Platforms
Windows
T1127
Defense Evasion
Trusted Developer Utilities Proxy Execution

Adversaries may take advantage of trusted developer utilities to proxy execution of malicious payloads. There are many utilities used for software development related tasks that …

Platforms
Windows
T1127.001
Defense Evasion
MSBuild

Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility. MSBuild.exe (Microsoft Build Engine) is a software build platform used by …

Platforms
Windows
T1127.002
Defense Evasion
ClickOnce

Adversaries may use ClickOnce applications (.appref-ms and .application files) to proxy execution of code through a trusted Windows utility.(Citation: Burke/CISA ClickOnce BlackHat) ClickOnce is a …

Platforms
Windows
T1127.003
Defense Evasion
JamPlus

Adversaries may use `JamPlus` to proxy the execution of a malicious script. `JamPlus` is a build utility tool for code and data build systems. It …

Platforms
Windows
T1130
Defense Evasion
Install Root Certificate

Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application …

Platforms
Linux Windows macOS
T1134
Defense Evasion
Access Token Manipulation

Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access …

Platforms
Windows
T1134.001
Defense Evasion
Token Impersonation/Theft

Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls. For example, an adversary can duplicate an existing token …

Platforms
Windows
T1134.002
Defense Evasion
Create Process with Token

Adversaries may create a new process with an existing token to escalate privileges and bypass access controls. Processes can be created with the token and …

Platforms
Windows
T1134.003
Defense Evasion
Make and Impersonate Token

Adversaries may make new tokens and impersonate users to escalate privileges and bypass access controls. For example, if an adversary has a username and password …

Platforms
Windows
T1134.004
Defense Evasion
Parent PID Spoofing

Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. New processes are typically spawned …

Platforms
Windows
T1134.005
Defense Evasion
SID-History Injection

Adversaries may use SID-History Injection to escalate privileges and bypass access controls. The Windows security identifier (SID) is a unique value that identifies a user …

Platforms
Windows
T1140
Defense Evasion
Deobfuscate/Decode Files or Information

Adversaries may use [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to hide artifacts of an intrusion from analysis. They may require separate mechanisms to decode or deobfuscate that …

Platforms
ESXi Linux macOS +1 more
T1143
Defense Evasion
Hidden Window

Adversaries may implement hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when …

Platforms
macOS Windows
T1144
Defense Evasion
Gatekeeper Bypass

In macOS and OS X, when applications or programs are downloaded from the internet, there is a special attribute set on the file called <code>com.apple.quarantine</code>. …

Platforms
macOS
T1146
Defense Evasion
Clear Command History

In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. …

Platforms
Linux macOS
T1147
Defense Evasion
Hidden Users

Every user account in macOS has a userID associated with it. When creating a user, you can specify the userID for that account. There is …

Platforms
macOS
T1148
Defense Evasion
HISTCONTROL

The <code>HISTCONTROL</code> environment variable keeps track of what should be saved by the <code>history</code> command and eventually into the <code>~/.bash_history</code> file when a user logs …

Platforms
Linux macOS
T1149
Defense Evasion
LC_MAIN Hijacking

**This technique has been deprecated and should no longer be used.** As of OS X 10.8, mach-O binaries introduced a new header called LC_MAIN that …

Platforms
macOS
T1150
Defense Evasion
Plist Modification

Property list (plist) files contain all of the information that macOS and OS X uses to configure applications and services. These files are UTF-8 encoded …

Platforms
macOS
T1151
Defense Evasion
Space after Filename

Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does not work with .app …

Platforms
Linux macOS
T1152
Defense Evasion
Launchctl

Launchctl controls the macOS launchd process which handles things like launch agents and launch daemons, but can execute other commands or programs itself. Launchctl supports …

Platforms
macOS
T1158
Defense Evasion
Hidden Files and Directories

To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of a ‘hidden’ file. These files don’t …

Platforms
Linux macOS Windows
T1170
Defense Evasion
Mshta

Mshta.exe is a utility that executes Microsoft HTML Applications (HTA). HTA files have the file extension <code>.hta</code>. (Citation: Wikipedia HTML Application) HTAs are standalone applications …

Platforms
Windows
T1181
Defense Evasion
Extra Window Memory Injection

Before creating a window, graphical Windows-based processes must prescribe to or register a windows class, which stipulate appearance and behavior (via windows procedures, which are …

Platforms
Windows
T1186
Defense Evasion
Process Doppelgänging

Windows Transactional NTFS (TxF) was introduced in Vista as a method to perform safe file operations. (Citation: Microsoft TxF) To ensure data integrity, TxF enables …

Platforms
Windows
T1191
Defense Evasion
CMSTP

The Microsoft Connection Manager Profile Installer (CMSTP.exe) is a command-line program used to install Connection Manager service profiles. (Citation: Microsoft Connection Manager Oct 2009) CMSTP.exe …

Platforms
Windows
T1196
Defense Evasion
Control Panel Items

Windows Control Panel items are utilities that allow users to view and adjust computer settings. Control Panel items are registered executable (.exe) or Control Panel …

Platforms
Windows
T1197
Defense Evasion
BITS Jobs

Adversaries may abuse BITS jobs to persistently execute code and perform various background tasks. Windows Background Intelligent Transfer Service (BITS) is a low-bandwidth, asynchronous file …

Platforms
Windows
T1198
Defense Evasion
SIP and Trust Provider Hijacking

In user mode, Windows Authenticode (Citation: Microsoft Authenticode) digital signatures are used to verify a file's origin and integrity, variables that may be used to …

Platforms
Windows
T1202
Defense Evasion
Indirect Command Execution

Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be …

Platforms
Windows
T1205
Defense Evasion
Traffic Signaling

Adversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or command and control. Traffic signaling involves the use …

Platforms
Linux macOS Network Devices +1 more
T1205.001
Defense Evasion
Port Knocking

Adversaries may use port knocking to hide open ports used for persistence or command and control. To enable a port, an adversary sends a series …

Platforms
Linux macOS Windows +1 more
T1205.002
Defense Evasion
Socket Filters

Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command and control. With elevated permissions, adversaries can …

Platforms
Linux macOS Windows
T1207
Defense Evasion
Rogue Domain Controller

Adversaries may register a rogue Domain Controller to enable manipulation of Active Directory data. DCShadow may be used to create a rogue Domain Controller (DC). …

Platforms
Windows
T1211
Defense Evasion
Exploitation for Defense Evasion

Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming …

Platforms
Linux Windows macOS +2 more
T1216
Defense Evasion
System Script Proxy Execution

Adversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several Microsoft signed scripts that have been downloaded from …

Platforms
Windows
T1216.001
Defense Evasion
PubPrn

Adversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a [Visual Basic](https://attack.mitre.org/techniques/T1059/005) script that publishes a printer to Active Directory Domain …

Platforms
Windows
T1216.002
Defense Evasion
SyncAppvPublishingServer

Adversaries may abuse SyncAppvPublishingServer.vbs to proxy execution of malicious [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands. SyncAppvPublishingServer.vbs is a Visual Basic script associated with how Windows virtualizes applications (Microsoft Application …

Platforms
Windows
T1218
Defense Evasion
System Binary Proxy Execution

Adversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed, or otherwise trusted, binaries. Binaries used in this technique are …

Platforms
Windows Linux macOS
T1218.001
Defense Evasion
Compiled HTML File

Adversaries may abuse Compiled HTML files (.chm) to conceal malicious code. CHM files are commonly distributed as part of the Microsoft HTML Help system. CHM …

Platforms
Windows
T1218.002
Defense Evasion
Control Panel

Adversaries may abuse control.exe to proxy execution of malicious payloads. The Windows Control Panel process binary (control.exe) handles execution of Control Panel items, which are …

Platforms
Windows
T1218.003
Defense Evasion
CMSTP

Adversaries may abuse CMSTP to proxy execution of malicious code. The Microsoft Connection Manager Profile Installer (CMSTP.exe) is a command-line program used to install Connection …

Platforms
Windows
T1218.004
Defense Evasion
InstallUtil

Adversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil is a command-line utility that allows for installation and uninstallation …

Platforms
Windows
T1218.005
Defense Evasion
Mshta

Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility. There are several examples of …

Platforms
Windows
T1218.007
Defense Evasion
Msiexec

Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with …

Platforms
Windows
T1218.008
Defense Evasion
Odbcconf

Adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allows you to configure Open Database Connectivity (ODBC) drivers …

Platforms
Windows
T1218.009
Defense Evasion
Regsvcs/Regasm

Adversaries may abuse Regsvcs and Regasm to proxy execution of code through a trusted Windows utility. Regsvcs and Regasm are Windows command-line utilities that are …

Platforms
Windows
T1218.010
Defense Evasion
Regsvr32

Adversaries may abuse Regsvr32.exe to proxy execution of malicious code. Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, …

Platforms
Windows
T1218.011
Defense Evasion
Rundll32

Adversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. [Shared Modules](https://attack.mitre.org/techniques/T1129)), may avoid triggering security tools that may …

Platforms
Windows
T1218.012
Defense Evasion
Verclsid

Adversaries may abuse verclsid.exe to proxy execution of malicious code. Verclsid.exe is known as the Extension CLSID Verification Host and is responsible for verifying each …

Platforms
Windows
T1218.013
Defense Evasion
Mavinject

Adversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Virtualization Injector, a Windows utility that can inject code into …

Platforms
Windows
T1218.014
Defense Evasion
MMC

Adversaries may abuse mmc.exe to proxy execution of malicious .msc files. Microsoft Management Console (MMC) is a binary that may be signed by Microsoft and …

Platforms
Windows
T1218.015
Defense Evasion
Electron Applications

Adversaries may abuse components of the Electron framework to execute malicious code. The Electron framework hosts many common applications such as Signal, Slack, and Microsoft …

Platforms
Linux macOS Windows
T1220
Defense Evasion
XSL Script Processing

Adversaries may bypass application control and obscure execution of code by embedding scripts inside XSL files. Extensible Stylesheet Language (XSL) files are commonly used to …

Platforms
Windows
T1221
Defense Evasion
Template Injection

Adversaries may create or modify references in user document templates to conceal malicious code or force authentication attempts. For example, Microsoft’s Office Open XML (OOXML) …

Platforms
Windows
T1222
Defense Evasion
File and Directory Permissions Modification

Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 …

Platforms
ESXi Linux macOS +1 more
T1222.001
Defense Evasion
Windows File and Directory Permissions Modification

Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 …

Platforms
Windows
T1222.002
Defense Evasion
Linux and Mac File and Directory Permissions Modification

Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 …

Platforms
macOS Linux
T1223
Defense Evasion
Compiled HTML File

Compiled HTML files (.chm) are commonly distributed as part of the Microsoft HTML Help system. CHM files are compressed compilations of various content such as …

Platforms
Windows
T1480
Defense Evasion
Execution Guardrails

Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on …

Platforms
ESXi Linux macOS +1 more
T1480.001
Defense Evasion
Environmental Keying

Adversaries may environmentally key payloads or other features of malware to evade defenses and constraint execution to a specific target environment. Environmental keying uses cryptography …

Platforms
Linux Windows macOS
T1480.002
Defense Evasion
Mutual Exclusion

Adversaries may constrain execution or actions based on the presence of a mutex associated with malware. A mutex is a locking mechanism used to synchronize …

Platforms
Linux macOS Windows
T1484
Defense Evasion
Domain or Tenant Policy Modification

Adversaries may modify the configuration settings of a domain or identity tenant to evade defenses and/or escalate privileges in centrally managed environments. Such services provide …

Platforms
Windows Identity Provider
T1484.001
Defense Evasion
Group Policy Modification

Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on …

Platforms
Windows
T1484.002
Defense Evasion
Trust Modification

Adversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants …

Platforms
Identity Provider Windows
T1497
Defense Evasion
Virtualization/Sandbox Evasion

Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for …

Platforms
Linux macOS Windows
T1497.001
Defense Evasion
System Checks

Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks …

Platforms
Linux macOS Windows
T1497.002
Defense Evasion
User Activity Based Checks

Adversaries may employ various user activity checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of …

Platforms
Linux Windows macOS
T1497.003
Defense Evasion
Time Based Checks

Adversaries may employ various time-based methods to detect virtualization and analysis environments, particularly those that attempt to manipulate time mechanisms to simulate longer elapses of …

Platforms
Linux macOS Windows
T1500
Defense Evasion
Compile After Delivery

Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled code. Similar to [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027), …

Platforms
Linux macOS Windows
T1502
Defense Evasion
Parent PID Spoofing

Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. New processes are typically spawned …

Platforms
Windows
T1506
Defense Evasion
Web Session Cookie

Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some multi-factor authentication protocols since the session is already …

Platforms
Office 365 SaaS
T1527
Defense Evasion
Application Access Token

Adversaries may use application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are …

Platforms
SaaS Office 365
T1535
Defense Evasion
Unused/Unsupported Cloud Regions

Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage …

Platforms
IaaS
T1536
Defense Evasion
Revert Cloud Instance

An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of …

Platforms
IaaS
T1542
Defense Evasion
Pre-OS Boot

Adversaries may abuse Pre-OS Boot mechanisms as a way to establish persistence on a system. During the booting process of a computer, firmware and various …

Platforms
Linux Network Devices Windows +1 more
T1542.004
Defense Evasion
ROMMONkit

Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary code to provide persistent access and manipulate device behavior that is …

Platforms
Network Devices
T1542.005
Defense Evasion
TFTP Boot

Adversaries may abuse netbooting to load an unauthorized network device operating system from a Trivial File Transfer Protocol (TFTP) server. TFTP boot (netbooting) is commonly …

Platforms
Network Devices
T1548.006
Defense Evasion
TCC Manipulation

Adversaries can manipulate or abuse the Transparency, Consent, & Control (TCC) service or database to grant malicious executables elevated permissions. TCC is a Privacy & …

Platforms
macOS
T1550
Defense Evasion
Use Alternate Authentication Material

Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and …

Platforms
Windows SaaS IaaS +4 more
T1550.001
Defense Evasion
Application Access Token

Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens …

Platforms
SaaS Containers IaaS +2 more
T1550.002
Defense Evasion
Pass the Hash

Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment, bypassing normal system access controls. Pass the hash (PtH) is …

Platforms
Windows
T1550.003
Defense Evasion
Pass the Ticket

Adversaries may “pass the ticket” using stolen Kerberos tickets to move laterally within an environment, bypassing normal system access controls. Pass the ticket (PtT) is …

Platforms
Windows
T1550.004
Defense Evasion
Web Session Cookie

Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some multi-factor authentication protocols since the session is already …

Platforms
SaaS IaaS Office Suite
T1553
Defense Evasion
Subvert Trust Controls

Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs. Operating systems and security products may …

Platforms
Windows macOS Linux
T1553.001
Defense Evasion
Gatekeeper Bypass

Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act …

Platforms
macOS
T1553.002
Defense Evasion
Code Signing

Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary …

Platforms
macOS Windows
T1553.003
Defense Evasion
SIP and Trust Provider Hijacking

Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks. In user …

Platforms
Windows
T1553.004
Defense Evasion
Install Root Certificate

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers. Root certificates are used in …

Platforms
Linux macOS Windows
T1553.005
Defense Evasion
Mark-of-the-Web Bypass

Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, when files are downloaded from the Internet, they are tagged with a …

Platforms
Windows
T1553.006
Defense Evasion
Code Signing Policy Modification

Adversaries may modify code signing policies to enable execution of unsigned or self-signed code. Code signing provides a level of authenticity on a program from …

Platforms
Windows macOS
T1562
Defense Evasion
Impair Defenses

Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such …

Platforms
Windows IaaS Linux +6 more
T1562.001
Defense Evasion
Disable or Modify Tools

Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security …

Platforms
Containers IaaS Linux +3 more
T1562.002
Defense Evasion
Disable Windows Event Logging

Adversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. Windows event logs record user and system activity …

Platforms
Windows
T1562.003
Defense Evasion
Impair Command History Logging

Adversaries may impair command history logging to hide commands they run on a compromised system. Various command interpreters keep track of the commands users type …

Platforms
ESXi Linux macOS +2 more
T1562.004
Defense Evasion
Disable or Modify System Firewall

Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as …

Platforms
ESXi Linux macOS +2 more
T1562.006
Defense Evasion
Indicator Blocking

An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting(Citation: Microsoft Lamin …

Platforms
Windows macOS Linux +1 more
T1562.007
Defense Evasion
Disable or Modify Cloud Firewall

Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud firewalls are separate from …

Platforms
IaaS
T1562.008
Defense Evasion
Disable or Modify Cloud Logs

An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments …

Platforms
IaaS SaaS Office Suite +1 more
T1562.009
Defense Evasion
Safe Mode Boot

Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and …

Platforms
Windows
T1562.010
Defense Evasion
Downgrade Attack

Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls. Downgrade attacks typically …

Platforms
Windows Linux macOS
T1562.011
Defense Evasion
Spoof Security Alerting

Adversaries may spoof security alerting from tools, presenting false evidence to impair defenders’ awareness of malicious activity.(Citation: BlackBasta) Messages produced by defensive tools contain information …

Platforms
Windows macOS Linux
T1562.012
Defense Evasion
Disable or Modify Linux Audit System

Adversaries may disable or modify the Linux audit system to hide malicious activity and avoid detection. Linux admins use the Linux Audit system to track …

Platforms
Linux
T1562.013
Defense Evasion
Disable or Modify Network Device Firewall

Adversaries may disable network device-based firewall mechanisms entirely or add, delete, or modify particular rules in order to bypass controls limiting network usage. Modifying or …

Platforms
Network Devices
T1564
Defense Evasion
Hide Artifacts

Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important …

Platforms
Linux Office Suite Windows +2 more
T1564.001
Defense Evasion
Hidden Files and Directories

Adversaries may set files and directories to be hidden to evade detection mechanisms. To prevent normal users from accidentally changing special files on a system, …

Platforms
Linux Windows macOS
T1564.002
Defense Evasion
Hidden Users

Adversaries may use hidden users to hide the presence of user accounts they create or modify. Administrators may want to hide users when there are …

Platforms
macOS Windows Linux
T1564.003
Defense Evasion
Hidden Window

Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when …

Platforms
Linux macOS Windows
T1564.004
Defense Evasion
NTFS File Attributes

Adversaries may use NTFS file attributes to hide their malicious data in order to evade detection. Every New Technology File System (NTFS) formatted partition contains …

Platforms
Windows
T1564.005
Defense Evasion
Hidden File System

Adversaries may use a hidden file system to conceal malicious activity from users and security tools. File systems provide a structure to store and access …

Platforms
Linux macOS Windows
T1564.006
Defense Evasion
Run Virtual Instance

Adversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualization technologies exist that allow for the emulation …

Platforms
Linux macOS Windows +1 more
T1564.007
Defense Evasion
VBA Stomping

Adversaries may hide malicious Visual Basic for Applications (VBA) payloads embedded within MS Office documents by replacing the VBA source code with benign data.(Citation: FireEye …

Platforms
Linux Windows macOS
T1564.008
Defense Evasion
Email Hiding Rules

Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various …

Platforms
Windows Linux macOS +1 more
T1564.009
Defense Evasion
Resource Forking

Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured …

Platforms
macOS
T1564.010
Defense Evasion
Process Argument Spoofing

Adversaries may attempt to hide process command-line arguments by overwriting process memory. Process command-line arguments are stored in the process environment block (PEB), a data …

Platforms
Windows
T1564.011
Defense Evasion
Ignore Process Interrupts

Adversaries may evade defensive mechanisms by executing commands that hide from process interrupt signals. Many operating systems use signals to deliver messages to control process …

Platforms
Linux macOS Windows
T1564.012
Defense Evasion
File/Path Exclusions

Adversaries may attempt to hide their file-based artifacts by writing them to specific folders or file names excluded from antivirus (AV) scanning and other defensive …

Platforms
Linux macOS Windows
T1564.013
Defense Evasion
Bind Mounts

Adversaries may abuse bind mounts on file structures to hide their activity and artifacts from native utilities. A bind mount maps a directory or file …

Platforms
Linux
T1564.014
Defense Evasion
Extended Attributes

Adversaries may abuse extended attributes (xattrs) on macOS and Linux to hide their malicious data in order to evade detection. Extended attributes are key-value pairs …

Platforms
Linux macOS
T1578
Defense Evasion
Modify Cloud Compute Infrastructure

An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the …

Platforms
IaaS
T1578.001
Defense Evasion
Create Snapshot

An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing …

Platforms
IaaS
T1578.002
Defense Evasion
Create Cloud Instance

An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new …

Platforms
IaaS
T1578.003
Defense Evasion
Delete Cloud Instance

An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. …

Platforms
IaaS
T1578.004
Defense Evasion
Revert Cloud Instance

An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of …

Platforms
IaaS
T1578.005
Defense Evasion
Modify Cloud Compute Configurations

Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may …

Platforms
IaaS
T1599
Defense Evasion
Network Boundary Bridging

Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation. Breaching these devices may enable an adversary to …

Platforms
Network Devices
T1599.001
Defense Evasion
Network Address Translation Traversal

Adversaries may bridge network boundaries by modifying a network device’s Network Address Translation (NAT) configuration. Malicious modifications to NAT may enable an adversary to bypass …

Platforms
Network Devices
T1600
Defense Evasion
Weaken Encryption

Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution) Encryption …

Platforms
Network Devices
T1600.001
Defense Evasion
Reduce Key Space

Adversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.(Citation: Cisco Synful …

Platforms
Network Devices
T1600.002
Defense Evasion
Disable Crypto Hardware

Adversaries disable a network device’s dedicated hardware encryption, which may enable them to leverage weaknesses in software encryption in order to reduce the effort involved …

Platforms
Network Devices
T1601
Defense Evasion
Modify System Image

Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves. On such devices, the …

Platforms
Network Devices
T1601.001
Defense Evasion
Patch System Image

Adversaries may modify the operating system of a network device to introduce new capabilities or weaken existing defenses.(Citation: Killing the myth of Cisco IOS rootkits) …

Platforms
Network Devices
T1601.002
Defense Evasion
Downgrade System Image

Adversaries may install an older version of the operating system of a network device to weaken security. Older operating system versions on network devices often …

Platforms
Network Devices
T1610
Defense Evasion
Deploy Container

Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute …

Platforms
Containers
T1612
Defense Evasion
Build Image on Host

Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. …

Platforms
Containers
T1620
Defense Evasion
Reflective Code Loading

Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflective loading involves allocating then executing payloads directly …

Platforms
Linux macOS Windows
T1622
Defense Evasion
Debugger Evasion

Adversaries may employ various means to detect and avoid debuggers. Debuggers are typically used by defenders to trace and/or analyze the execution of potential malware …

Platforms
Linux macOS Windows
T1647
Defense Evasion
Plist File Modification

Adversaries may modify property list files (plist files) to enable other malicious activity, while also potentially evading and bypassing system defenses. macOS applications use plist …

Platforms
macOS
T1656
Defense Evasion
Impersonation

Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, …

Platforms
Linux macOS Office Suite +2 more
T1666
Defense Evasion
Modify Cloud Resource Hierarchy

Adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to evade defenses. IaaS environments often group resources into a hierarchy, enabling …

Platforms
IaaS
T1672
Defense Evasion
Email Spoofing

Adversaries may fake, or spoof, a sender’s identity by modifying the value of relevant email headers in order to establish contact with victims under false …

Platforms
Office Suite Windows macOS +1 more
T1678
Defense Evasion
Delay Execution

Adversaries may employ various time-based methods to evade detection and analysis. These techniques often exploit system clocks, delays, or timing mechanisms to obscure malicious activity, …

Platforms
Linux macOS Windows
T1679
Defense Evasion
Selective Exclusion

Adversaries may intentionally exclude certain files, folders, directories, file types, or system components from encryption or tampering during a ransomware or malicious payload execution. Some …

Platforms
Windows
T1007
Discovery
System Service Discovery

Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands …

Platforms
Linux macOS Windows
T1010
Discovery
Application Window Discovery

Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used.(Citation: Prevailion DarkWatchman 2021) …

Platforms
Linux Windows macOS
T1012
Discovery
Query Registry

Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. The Registry contains a significant amount of information …

Platforms
Windows
T1016
Discovery
System Network Configuration Discovery

Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery …

Platforms
ESXi Linux macOS +2 more
T1016.001
Discovery
Internet Connection Discovery

Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as …

Platforms
Windows Linux macOS +1 more
T1016.002
Discovery
Wi-Fi Discovery

Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems. Adversaries may use Wi-Fi information as part of …

Platforms
Linux Windows macOS
T1018
Discovery
Remote System Discovery

Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used …

Platforms
ESXi Linux macOS +2 more
T1033
Discovery
System Owner/User Discovery

Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is …

Platforms
Linux macOS Network Devices +1 more
T1046
Discovery
Network Service Discovery

Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to …

Platforms
Containers IaaS Linux +3 more
T1049
Discovery
System Network Connections Discovery

Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by …

Platforms
Windows IaaS Linux +3 more
T1057
Discovery
Process Discovery

Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running …

Platforms
ESXi Linux macOS +2 more
T1063
Discovery
Security Software Discovery

Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on the system. This may include things …

Platforms
macOS Windows
T1069
Discovery
Permission Groups Discovery

Adversaries may attempt to discover group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of …

Platforms
Containers IaaS Identity Provider +5 more
T1069.001
Discovery
Local Groups

Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist …

Platforms
Linux macOS Windows
T1069.002
Discovery
Domain Groups

Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which …

Platforms
Linux macOS Windows
T1069.003
Discovery
Cloud Groups

Adversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users …

Platforms
SaaS IaaS Office Suite +1 more
T1082
Discovery
System Information Discovery

An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use …

Platforms
ESXi IaaS Linux +3 more
T1083
Discovery
File and Directory Discovery

Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. …

Platforms
ESXi Linux macOS +2 more
T1087
Discovery
Account Discovery

Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. This information can …

Platforms
ESXi IaaS Identity Provider +5 more
T1087.001
Discovery
Local Account

Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to …

Platforms
ESXi Linux macOS +1 more
T1087.002
Discovery
Domain Account

Adversaries may attempt to get a listing of domain accounts. This information can help adversaries determine which domain accounts exist to aid in follow-on behavior …

Platforms
Linux macOS Windows
T1087.003
Discovery
Email Account

Adversaries may attempt to get a listing of email addresses and accounts. Adversaries may try to dump Exchange address lists such as global address lists …

Platforms
Windows Office Suite
T1087.004
Discovery
Cloud Account

Adversaries may attempt to get a listing of cloud accounts. Cloud accounts are those created and configured by an organization for use by users, remote …

Platforms
IaaS Identity Provider Office Suite +1 more
T1120
Discovery
Peripheral Device Discovery

Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.(Citation: Peripheral Discovery Linux)(Citation: Peripheral Discovery macOS) Peripheral devices …

Platforms
Linux Windows macOS
T1124
Discovery
System Time Discovery

An adversary may gather the system time and/or time zone settings from a local or remote system. The system time is set and stored by …

Platforms
ESXi Linux macOS +2 more
T1135
Discovery
Network Share Discovery

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for …

Platforms
Linux macOS Windows
T1201
Discovery
Password Policy Discovery

Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to …

Platforms
Windows Linux macOS +5 more
T1217
Discovery
Browser Information Discovery

Adversaries may enumerate information about browsers to learn more about compromised environments. Data saved by browsers (such as bookmarks, accounts, and browsing history) may reveal …

Platforms
Linux macOS Windows
T1482
Discovery
Domain Trust Discovery

Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in Windows multi-domain/forest environments. Domain trusts …

Platforms
Windows
T1518
Discovery
Software Discovery

Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may …

Platforms
ESXi IaaS Linux +2 more
T1518.001
Discovery
Security Software Discovery

Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud …

Platforms
IaaS Linux macOS +1 more
T1518.002
Discovery
Backup Software Discovery

Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape …

Platforms
Windows macOS Linux
T1526
Discovery
Cloud Service Discovery

An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service …

Platforms
IaaS Identity Provider Office Suite +1 more
T1538
Discovery
Cloud Service Dashboard

An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, …

Platforms
IaaS SaaS Office Suite +1 more
T1580
Discovery
Cloud Infrastructure Discovery

An adversary may attempt to discover infrastructure and resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, …

Platforms
IaaS
T1613
Discovery
Container and Resource Discovery

Adversaries may attempt to discover containers and other resources that are available within a containers environment. Other resources may include images, deployments, pods, nodes, and …

Platforms
Containers
T1614
Discovery
System Location Discovery

Adversaries may gather information in an attempt to calculate the geographical location of a victim host. Adversaries may use the information from [System Location Discovery](https://attack.mitre.org/techniques/T1614) …

Platforms
IaaS Linux macOS +1 more
T1614.001
Discovery
System Language Discovery

Adversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host. This information …

Platforms
Linux macOS Windows
T1615
Discovery
Group Policy Discovery

Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in …

Platforms
Windows
T1619
Discovery
Cloud Storage Object Discovery

Adversaries may enumerate objects in cloud storage infrastructure. Adversaries may use this information during automated discovery to shape follow-on behaviors, including requesting all or specific …

Platforms
IaaS
T1652
Discovery
Device Driver Discovery

Adversaries may attempt to enumerate local device drivers on a victim host. Information about device drivers may highlight various insights that shape follow-on behaviors, such …

Platforms
Linux macOS Windows
T1654
Discovery
Log Enumeration

Adversaries may enumerate system and service logs to find useful data. These logs may highlight various types of valuable insights for an adversary, such as …

Platforms
ESXi IaaS Linux +2 more
T1673
Discovery
Virtual Machine Discovery

An adversary may attempt to enumerate running virtual machines (VMs) after gaining access to a host or hypervisor. For example, adversaries may enumerate a list …

Platforms
ESXi Linux macOS +1 more
T1680
Discovery
Local Storage Discovery

Adversaries may enumerate local drives, disks, and/or volumes and their attributes like total or free space and volume serial number. This can be done to …

Platforms
ESXi IaaS Linux +2 more
T1028
Execution
Windows Remote Management

Windows Remote Management (WinRM) is the name of both a Windows service and a protocol that allows a user to interact with a remote system …

Platforms
Windows
T1035
Execution
Service Execution

Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service Control Manager. This can be …

Platforms
Windows
T1047
Execution
Windows Management Instrumentation

Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is designed for programmers and is the infrastructure for management data …

Platforms
Windows
T1053
Execution
Scheduled Task/Job

Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs …

Platforms
Windows Linux macOS +2 more
T1053.001
Execution
At (Linux)

Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial, recurring, or future execution of malicious code. The [at](https://attack.mitre.org/software/S0110) command within Linux operating …

Platforms
Linux
T1053.002
Execution
At

Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial or recurring execution of malicious code. The [at](https://attack.mitre.org/software/S0110) utility exists as an executable …

Platforms
Windows Linux macOS
T1053.003
Execution
Cron

Adversaries may abuse the <code>cron</code> utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The …

Platforms
Linux macOS ESXi
T1053.004
Execution
Launchd

This technique is deprecated due to the inaccurate usage. The report cited did not provide technical detail as to how the malware interacted directly with …

Platforms
macOS
T1053.005
Execution
Scheduled Task

Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access …

Platforms
Windows
T1053.006
Execution
Systemd Timers

Adversaries may abuse systemd timers to perform task scheduling for initial or recurring execution of malicious code. Systemd timers are unit files with file extension …

Platforms
Linux
T1053.007
Execution
Container Orchestration Job

Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container …

Platforms
Containers
T1059
Execution
Command and Scripting Interpreter

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and …

Platforms
ESXi IaaS Identity Provider +5 more
T1059.001
Execution
PowerShell

Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system.(Citation: …

Platforms
Windows
T1059.002
Execution
AppleScript

Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called …

Platforms
macOS
T1059.003
Execution
Windows Command Shell

Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org/software/S0106)) is the primary command prompt on Windows systems. The Windows command …

Platforms
Windows
T1059.004
Execution
Unix Shell

Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the primary command prompt on Linux, macOS, and ESXi systems, though many …

Platforms
ESXi Linux macOS +1 more
T1059.005
Execution
Visual Basic

Adversaries may abuse Visual Basic (VB) for execution. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as [Component …

Platforms
Linux macOS Windows
T1059.006
Execution
Python

Adversaries may abuse Python commands and scripts for execution. Python is a very popular scripting/programming language, with capabilities to perform many functions. Python can be …

Platforms
ESXi Linux macOS +1 more
T1059.007
Execution
JavaScript

Adversaries may abuse various implementations of JavaScript for execution. JavaScript (JS) is a platform-independent scripting language (compiled just-in-time at runtime) commonly associated with scripts in …

Platforms
Linux macOS Windows
T1059.008
Execution
Network Device CLI

Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads. The CLI is the primary means …

Platforms
Network Devices
T1059.009
Execution
Cloud API

Adversaries may abuse cloud APIs to execute malicious commands. APIs available in cloud environments provide various functionalities and are a feature-rich method for programmatic access …

Platforms
IaaS Identity Provider Office Suite +1 more
T1059.010
Execution
AutoHotKey & AutoIT

Adversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts. AutoIT and AutoHotkey (AHK) are scripting languages that enable users to …

Platforms
Windows
T1059.011
Execution
Lua

Adversaries may abuse Lua commands and scripts for execution. Lua is a cross-platform scripting and programming language primarily designed for embedded use in applications. Lua …

Platforms
Linux Network Devices Windows +1 more
T1059.012
Execution
Hypervisor CLI

Adversaries may abuse hypervisor command line interpreters (CLIs) to execute malicious commands. Hypervisor CLIs typically enable a wide variety of functionality for managing both the …

Platforms
ESXi
T1059.013
Execution
Container CLI/API

Adversaries may abuse built-in CLI tools or API calls to execute malicious commands in containerized environments. The Docker CLI is used for managing containers via …

Platforms
Containers
T1061
Execution
Graphical User Interface

**This technique has been deprecated. Please use [Remote Services](https://attack.mitre.org/techniques/T1021) where appropriate.** The Graphical User Interfaces (GUI) is a common way to interact with an operating …

Platforms
Linux macOS Windows
T1072
Execution
Software Deployment Tools

Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network. Configuration management …

Platforms
Linux macOS Network Devices +2 more
T1086
Execution
PowerShell

PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform …

Platforms
Windows
T1106
Execution
Native API

Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services …

Platforms
Linux macOS Windows
T1129
Execution
Shared Modules

Adversaries may execute malicious payloads via loading shared modules. Shared modules are executable files that are loaded into processes to provide access to reusable code, …

Platforms
Linux macOS Windows
T1153
Execution
Source

**This technique has been deprecated and should no longer be used.** The <code>source</code> command loads functions into the current shell or executes files in the …

Platforms
Linux macOS
T1154
Execution
Trap

The <code>trap</code> command allows programs and shells to specify commands that will be executed upon receiving interrupt signals. A common situation is a script allowing …

Platforms
Linux macOS
T1155
Execution
AppleScript

macOS and OS X applications send AppleEvent messages to each other for interprocess communications (IPC). These messages can be easily scripted with AppleScript for local …

Platforms
macOS
T1173
Execution
Dynamic Data Exchange

Windows Dynamic Data Exchange (DDE) is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can …

Platforms
Windows
T1177
Execution
LSASS Driver

The Windows security subsystem is a set of components that manage and enforce the security policy for a computer or domain. The Local Security Authority …

Platforms
Windows
T1203
Execution
Exploitation for Client Execution

Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to unsecure coding practices that can lead to …

Platforms
Linux macOS Windows
T1204
Execution
User Execution

An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them …

Platforms
Linux Windows macOS +2 more
T1204.001
Execution
Malicious Link

An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social engineering to get …

Platforms
Linux macOS Windows
T1204.002
Execution
Malicious File

An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get …

Platforms
Linux macOS Windows
T1204.003
Execution
Malicious Image

Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) …

Platforms
IaaS Containers
T1204.004
Execution
Malicious Copy and Paste

An adversary may rely upon a user copying and pasting code in order to gain execution. Users may be subjected to social engineering to get …

Platforms
Linux macOS Windows
T1204.005
Execution
Malicious Library

Adversaries may rely on a user installing a malicious library to facilitate execution. Threat actors may [Upload Malware](https://attack.mitre.org/techniques/T1608/001) to package managers such as NPM and …

Platforms
Linux macOS Windows
T1559
Execution
Inter-Process Communication

Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each …

Platforms
Linux macOS Windows
T1559.001
Execution
Component Object Model

Adversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communication (IPC) component of the native Windows application …

Platforms
Windows
T1559.002
Execution
Dynamic Data Exchange

Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between …

Platforms
Windows
T1559.003
Execution
XPC Services

Adversaries can provide malicious content to an XPC service daemon for local code execution. macOS uses XPC services for basic inter-process communication between various processes, …

Platforms
macOS
T1569
Execution
System Services

Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally …

Platforms
Windows macOS Linux
T1569.001
Execution
Launchctl

Adversaries may abuse launchctl to execute commands or programs. Launchctl interfaces with launchd, the service management framework for macOS. Launchctl supports taking subcommands on the …

Platforms
macOS
T1569.002
Execution
Service Execution

Adversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service control manager (<code>services.exe</code>) is an interface to manage …

Platforms
Windows
T1569.003
Execution
Systemctl

Adversaries may abuse systemctl to execute commands or programs. Systemctl is the primary interface for systemd, the Linux init system and service manager. Typically invoked …

Platforms
Linux
T1609
Execution
Container Administration Command

Adversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API …

Platforms
Containers
T1648
Execution
Serverless Execution

Adversaries may abuse serverless computing, integration, and automation services to execute arbitrary code in cloud environments. Many cloud providers offer a variety of serverless resources, …

Platforms
SaaS IaaS Office Suite
T1651
Execution
Cloud Administration Command

Adversaries may abuse cloud management services to execute commands within virtual machines. Resources such as AWS Systems Manager, Azure RunCommand, and Runbooks allow users to …

Platforms
IaaS
T1674
Execution
Input Injection

Adversaries may simulate keystrokes on a victim’s computer by various means to perform any type of action on behalf of the user, such as launching …

Platforms
Windows macOS Linux
T1675
Execution
ESXi Administration Command

Adversaries may abuse ESXi administration services to execute commands on guest machines hosted within an ESXi virtual environment. Persistent background services on ESXi-hosted VMs, such …

Platforms
ESXi
T1677
Execution
Poisoned Pipeline Execution

Adversaries may manipulate continuous integration / continuous development (CI/CD) processes by injecting malicious code into the build process. There are several mechanisms for poisoning pipelines: …

Platforms
SaaS
T1002
Exfiltration
Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of …

Platforms
Linux Windows macOS
T1011
Exfiltration
Exfiltration Over Other Network Medium

Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a …

Platforms
Linux macOS Windows
T1011.001
Exfiltration
Exfiltration Over Bluetooth

Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet …

Platforms
Linux macOS Windows
T1020
Exfiltration
Automated Exfiltration

Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.(Citation: ESET Gamaredon June 2020) When automated …

Platforms
Linux macOS Network Devices +1 more
T1020.001
Exfiltration
Traffic Duplication

Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised infrastructure. Traffic mirroring is a native feature for some devices, often used …

Platforms
Network Devices IaaS
T1022
Exfiltration
Data Encrypted

Data is encrypted before being exfiltrated in order to hide the information that is being exfiltrated from detection or to make the exfiltration less conspicuous …

Platforms
Linux macOS Windows
T1029
Exfiltration
Scheduled Transfer

Adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals. This could be done to blend traffic …

Platforms
Linux macOS Windows
T1030
Exfiltration
Data Transfer Size Limits

An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used …

Platforms
Linux macOS Windows +1 more
T1041
Exfiltration
Exfiltration Over C2 Channel

Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the …

Platforms
ESXi Linux macOS +1 more
T1048
Exfiltration
Exfiltration Over Alternative Protocol

Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be …

Platforms
ESXi IaaS Linux +5 more
T1048.001
Exfiltration
Exfiltration Over Symmetric Encrypted Non-C2 Protocol

Adversaries may steal data by exfiltrating it over a symmetrically encrypted network protocol other than that of the existing command and control channel. The data …

Platforms
Linux macOS Windows +1 more
T1048.002
Exfiltration
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

Adversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data …

Platforms
Linux macOS Windows +1 more
T1048.003
Exfiltration
Exfiltration Over Unencrypted Non-C2 Protocol

Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may …

Platforms
ESXi Linux macOS +2 more
T1052
Exfiltration
Exfiltration Over Physical Medium

Adversaries may attempt to exfiltrate data via a physical medium, such as a removable drive. In certain circumstances, such as an air-gapped network compromise, exfiltration …

Platforms
Linux macOS Windows
T1052.001
Exfiltration
Exfiltration over USB

Adversaries may attempt to exfiltrate data over a USB connected physical device. In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via …

Platforms
Linux Windows macOS
T1537
Exfiltration
Transfer Data to Cloud Account

Adversaries may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the …

Platforms
IaaS Office Suite SaaS
T1567
Exfiltration
Exfiltration Over Web Service

Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as …

Platforms
ESXi Linux macOS +3 more
T1567.001
Exfiltration
Exfiltration to Code Repository

Adversaries may exfiltrate data to a code repository rather than over their primary command and control channel. Code repositories are often accessible via an API …

Platforms
Linux macOS Windows +1 more
T1567.002
Exfiltration
Exfiltration to Cloud Storage

Adversaries may exfiltrate data to a cloud storage service rather than over their primary command and control channel. Cloud storage services allow for the storage, …

Platforms
ESXi Linux macOS +1 more
T1567.003
Exfiltration
Exfiltration to Text Storage Sites

Adversaries may exfiltrate data to text storage sites instead of their primary command and control channel. Text storage sites, such as <code>pastebin[.]com</code>, are commonly used …

Platforms
Linux macOS Windows +1 more
T1567.004
Exfiltration
Exfiltration Over Webhook

Adversaries may exfiltrate data to a webhook endpoint rather than over their primary command and control channel. Webhooks are simple mechanisms for allowing a server …

Platforms
Windows macOS Linux +3 more
T1485
Impact
Data Destruction

Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. …

Platforms
Containers ESXi IaaS +3 more
T1485.001
Impact
Lifecycle-Triggered Deletion

Adversaries may modify the lifecycle policies of a cloud storage bucket to destroy all objects stored within. Cloud storage buckets often allow users to set …

Platforms
IaaS
T1486
Impact
Data Encrypted for Impact

Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They …

Platforms
ESXi IaaS Linux +2 more
T1487
Impact
Disk Structure Wipe

Adversaries may corrupt or wipe the disk data structures on hard drive necessary to boot systems; targeting specific critical systems as well as a large …

Platforms
Windows macOS Linux
T1488
Impact
Disk Content Wipe

Adversaries may erase the contents of storage devices on specific systems as well as large numbers of systems in a network to interrupt availability to …

Platforms
Linux macOS Windows
T1489
Impact
Service Stop

Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or …

Platforms
ESXi IaaS Linux +2 more
T1490
Impact
Inhibit System Recovery

Adversaries may delete or remove built-in data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.(Citation: Talos …

Platforms
Containers ESXi IaaS +4 more
T1491
Impact
Defacement

Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content. Reasons for [Defacement](https://attack.mitre.org/techniques/T1491) include …

Platforms
Windows IaaS Linux +2 more
T1491.001
Impact
Internal Defacement

An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users, thus discrediting the integrity of the systems. This …

Platforms
ESXi Linux macOS +1 more
T1491.002
Impact
External Defacement

An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. [External Defacement](https://attack.mitre.org/techniques/T1491/002) …

Platforms
Windows IaaS Linux +1 more
T1492
Impact
Stored Data Manipulation

Adversaries may insert, delete, or manipulate data at rest in order to manipulate external outcomes or hide activity.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony …

Platforms
Linux macOS Windows
T1493
Impact
Transmitted Data Manipulation

Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ …

Platforms
Linux macOS Windows
T1494
Impact
Runtime Data Manipulation

Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ …

Platforms
Linux macOS Windows
T1495
Impact
Firmware Corruption

Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system in order to render …

Platforms
Linux macOS Network Devices +1 more
T1496
Impact
Resource Hijacking

Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. Resource hijacking may take a …

Platforms
Windows IaaS Linux +3 more
T1496.001
Impact
Compute Hijacking

Adversaries may leverage the compute resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. One common purpose for …

Platforms
Windows IaaS Linux +2 more
T1496.002
Impact
Bandwidth Hijacking

Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. Adversaries may also …

Platforms
Linux Windows macOS +2 more
T1496.003
Impact
SMS Pumping

Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted service availability.(Citation: Twilio SMS Pumping) SMS pumping is a type of …

Platforms
SaaS
T1496.004
Impact
Cloud Service Hijacking

Adversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-intensive tasks, which may impact hosted service availability. For example, adversaries may leverage email and messaging …

Platforms
SaaS
T1498
Impact
Network Denial of Service

Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed …

Platforms
Windows IaaS Linux +2 more
T1498.001
Impact
Direct Network Flood

Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target. This DoS attack may …

Platforms
Windows IaaS Linux +1 more
T1498.002
Impact
Reflection Amplification

Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS …

Platforms
Windows IaaS Linux +1 more
T1499
Impact
Endpoint Denial of Service

Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by …

Platforms
Windows Linux macOS +2 more
T1499.001
Impact
OS Exhaustion Flood

Adversaries may launch a denial of service (DoS) attack targeting an endpoint's operating system (OS). A system's OS is responsible for managing the finite resources …

Platforms
Linux macOS Windows
T1499.002
Impact
Service Exhaustion Flood

Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and …

Platforms
Windows IaaS Linux +1 more
T1499.003
Impact
Application Exhaustion Flood

Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in …

Platforms
Windows IaaS Linux +1 more
T1499.004
Impact
Application or System Exploitation

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some …

Platforms
Windows IaaS Linux +1 more
T1529
Impact
System Shutdown/Reboot

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot …

Platforms
ESXi Linux macOS +2 more
T1531
Impact
Account Access Removal

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated …

Platforms
Linux macOS Windows +4 more
T1561
Impact
Disk Wipe

Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network …

Platforms
Linux macOS Windows +1 more
T1561.001
Impact
Disk Content Wipe

Adversaries may erase the contents of storage devices on specific systems or in large numbers in a network to interrupt availability to system and network …

Platforms
Linux Network Devices Windows +1 more
T1561.002
Impact
Disk Structure Wipe

Adversaries may corrupt or wipe the disk data structures on a hard drive necessary to boot a system; targeting specific critical systems or in large …

Platforms
Linux macOS Windows +1 more
T1565
Impact
Data Manipulation

Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: Sygnia Elephant …

Platforms
Linux macOS Windows
T1565.001
Impact
Stored Data Manipulation

Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: …

Platforms
Linux macOS Windows
T1565.002
Impact
Transmitted Data Manipulation

Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of …

Platforms
Linux macOS Windows
T1565.003
Impact
Runtime Data Manipulation

Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of …

Platforms
Linux macOS Windows
T1657
Impact
Financial Theft

Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense …

Platforms
Linux macOS Office Suite +2 more
T1667
Impact
Email Bombing

Adversaries may flood targeted email addresses with an overwhelming volume of messages. This may bury legitimate emails in a flood of spam and disrupt business …

Platforms
Linux Office Suite Windows +1 more
T1189
Initial Access
Drive-by Compromise

Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. Multiple ways of delivering exploit code …

Platforms
Identity Provider Linux macOS +1 more
T1190
Initial Access
Exploit Public-Facing Application

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be …

Platforms
Containers ESXi IaaS +4 more
T1192
Initial Access
Spearphishing Link

Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of …

Platforms
Windows macOS Linux +2 more
T1193
Initial Access
Spearphishing Attachment

Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware …

Platforms
Windows macOS Linux
T1194
Initial Access
Spearphishing via Service

Spearphishing via service is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of third …

Platforms
Windows macOS Linux
T1195
Initial Access
Supply Chain Compromise

Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain …

Platforms
Linux Windows macOS +1 more
T1195.001
Initial Access
Compromise Software Dependencies and Development Tools

Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often …

Platforms
Linux macOS Windows
T1195.002
Initial Access
Compromise Software Supply Chain

Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software …

Platforms
Linux Windows macOS
T1195.003
Initial Access
Compromise Hardware Supply Chain

Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware …

Platforms
Linux macOS Windows
T1199
Initial Access
Trusted Relationship

Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may …

Platforms
Windows SaaS IaaS +4 more
T1200
Initial Access
Hardware Additions

Adversaries may physically introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to …

Platforms
Windows Linux macOS
T1566
Initial Access
Phishing

Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known …

Platforms
Identity Provider Linux macOS +3 more
T1566.001
Initial Access
Spearphishing Attachment

Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of …

Platforms
Linux macOS Windows
T1566.002
Initial Access
Spearphishing Link

Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific …

Platforms
Identity Provider Linux macOS +3 more
T1566.003
Initial Access
Spearphishing via Service

Adversaries may send spearphishing messages via third-party services in an attempt to gain access to victim systems. Spearphishing via service is a specific variant of …

Platforms
Linux macOS Windows
T1566.004
Initial Access
Spearphishing Voice

Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other …

Platforms
Linux macOS Windows +1 more
T1659
Initial Access
Content Injection

Adversaries may gain access and continuously communicate with victims by injecting malicious content into systems through online network traffic. Rather than luring victims to malicious …

Platforms
Linux macOS Windows
T1669
Initial Access
Wi-Fi Networks

Adversaries may gain initial access to target systems by connecting to wireless networks. They may accomplish this by exploiting open Wi-Fi networks used by target …

Platforms
Linux Network Devices Windows +1 more
T1017
Lateral Movement
Application Deployment Software

Adversaries may deploy malicious software to systems within a network using application deployment systems employed by enterprise administrators. The permissions required for this action vary …

Platforms
Linux macOS Windows
T1021
Lateral Movement
Remote Services

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a service that accepts remote connections, such as telnet, SSH, and VNC. The adversary may then perform …

Platforms
Linux macOS Windows +2 more
T1021.001
Lateral Movement
Remote Desktop Protocol

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on …

Platforms
Windows
T1021.002
Lateral Movement
SMB/Windows Admin Shares

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the …

Platforms
Windows
T1021.003
Lateral Movement
Distributed Component Object Model

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions …

Platforms
Windows
T1021.004
Lateral Movement
SSH

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user. SSH …

Platforms
ESXi Linux macOS
T1021.005
Lateral Movement
VNC

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB …

Platforms
Linux Windows macOS
T1021.006
Lateral Movement
Windows Remote Management

Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user. …

Platforms
Windows
T1021.007
Lateral Movement
Cloud Services

Adversaries may log into accessible cloud services within a compromised environment using [Valid Accounts](https://attack.mitre.org/techniques/T1078) that are synchronized with or federated to on-premises user identities. The …

Platforms
IaaS Identity Provider Office Suite +1 more
T1021.008
Lateral Movement
Direct Cloud VM Connections

Adversaries may leverage [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log directly into accessible cloud hosted compute infrastructure through cloud native methods. Many cloud providers offer interactive connections to …

Platforms
IaaS
T1051
Lateral Movement
Shared Webroot

**This technique has been deprecated and should no longer be used.** Adversaries may add malicious content to an internally accessible website through an open network …

Platforms
Windows
T1075
Lateral Movement
Pass the Hash

Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This method bypasses standard authentication …

Platforms
Windows
T1076
Lateral Movement
Remote Desktop Protocol

Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user …

Platforms
Windows
T1077
Lateral Movement
Windows Admin Shares

Windows systems have hidden network shares that are accessible only to administrators and provide the ability for remote file copy and other administrative functions. Example …

Platforms
Windows
T1080
Lateral Movement
Taint Shared Content

Adversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on …

Platforms
Windows SaaS Linux +2 more
T1091
Lateral Movement
Replication Through Removable Media

Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when …

Platforms
Windows
T1097
Lateral Movement
Pass the Ticket

Pass the ticket (PtT) is a method of authenticating to a system using Kerberos tickets without having access to an account's password. Kerberos authentication can …

Platforms
Windows
T1175
Lateral Movement
Component Object Model and Distributed COM

**This technique has been deprecated. Please use [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) and [Component Object Model](https://attack.mitre.org/techniques/T1559/001).** Adversaries may use the Windows Component Object Model (COM) and …

Platforms
Windows
T1184
Lateral Movement
SSH Hijacking

Secure Shell (SSH) is a standard means of remote access on Linux and macOS systems. It allows a user to connect to another system via …

Platforms
Linux macOS
T1210
Lateral Movement
Exploitation of Remote Services

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an …

Platforms
Linux Windows macOS +1 more
T1534
Lateral Movement
Internal Spearphishing

After they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise …

Platforms
Windows macOS Linux +2 more
T1563
Lateral Movement
Remote Service Session Hijacking

Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a …

Platforms
Linux macOS Windows
T1563.001
Lateral Movement
SSH Hijacking

Adversaries may hijack a legitimate user's SSH session to move laterally within an environment. Secure Shell (SSH) is a standard means of remote access on …

Platforms
Linux macOS
T1563.002
Lateral Movement
RDP Hijacking

Adversaries may hijack a legitimate user’s remote desktop session to move laterally within an environment. Remote desktop is a common feature in operating systems. It …

Platforms
Windows
T1570
Lateral Movement
Lateral Tool Transfer

Adversaries may transfer tools or other files between systems in a compromised environment. Once brought into the victim environment (i.e., [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) files may …

Platforms
ESXi Linux macOS +1 more
T1004
Persistence
Winlogon Helper DLL

Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in <code>HKLM\Software\[Wow6432Node\]Microsoft\Windows …

Platforms
Windows
T1013
Persistence
Port Monitors

A port monitor can be set through the (Citation: AddMonitor) API call to set a DLL to be loaded at startup. (Citation: AddMonitor) This DLL …

Platforms
Windows
T1015
Persistence
Accessibility Features

Windows contains accessibility features that may be launched with a key combination before a user has logged in (for example, when the user is on …

Platforms
Windows
T1019
Persistence
System Firmware

The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as …

Platforms
Windows
T1023
Persistence
Shortcut Modification

Shortcuts or symbolic links are ways of referencing other files or programs that will be opened or executed when the shortcut is clicked or executed …

Platforms
Windows
T1031
Persistence
Modify Existing Service

Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Registry. Service configurations can be modified …

Platforms
Windows
T1034
Persistence
Path Interception

**This technique has been deprecated. Please use [Path Interception by PATH Environment Variable](https://attack.mitre.org/techniques/T1574/007), [Path Interception by Search Order Hijacking](https://attack.mitre.org/techniques/T1574/008), and/or [Path Interception by Unquoted Path](https://attack.mitre.org/techniques/T1574/009).** …

Platforms
Windows
T1037
Persistence
Boot or Logon Initialization Scripts

Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence.(Citation: Mandiant APT29 Eye Spy Email Nov 22)(Citation: Anomali Rocke March 2019) …

Platforms
macOS Windows Linux +2 more
T1037.001
Persistence
Logon Script (Windows)

Adversaries may use Windows logon scripts automatically executed at logon initialization to establish persistence. Windows allows logon scripts to be run whenever a specific user …

Platforms
Windows
T1037.002
Persistence
Login Hook

Adversaries may use a Login Hook to establish persistence executed upon user logon. A login hook is a plist file that points to a specific …

Platforms
macOS
T1037.003
Persistence
Network Logon Script

Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. Network logon scripts can be assigned using Active Directory or Group …

Platforms
Windows
T1037.004
Persistence
RC Scripts

Adversaries may establish persistence by modifying RC scripts, which are executed during a Unix-like system’s startup. These files allow system administrators to map and start …

Platforms
macOS Linux Network Devices +1 more
T1037.005
Persistence
Startup Items

Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and …

Platforms
macOS
T1038
Persistence
DLL Search Order Hijacking

Windows systems use a common method to look for required DLLs to load into a program. (Citation: Microsoft DLL Search) Adversaries may take advantage of …

Platforms
Windows
T1042
Persistence
Change Default File Association

When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections …

Platforms
Windows
T1044
Persistence
File System Permissions Weakness

Processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing …

Platforms
Windows Linux macOS
T1050
Persistence
New Service

When operating systems boot up, they can start programs or applications called services that perform background system functions. (Citation: TechNet Services) A service's configuration information, …

Platforms
Windows
T1058
Persistence
Service Registry Permissions Weakness

Windows stores local service configuration information in the Registry under <code>HKLM\SYSTEM\CurrentControlSet\Services</code>. The information stored under a service's Registry keys can be manipulated to modify a …

Platforms
Windows
T1060
Persistence
Registry Run Keys / Startup Folder

Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. Adding an entry to the …

Platforms
Windows
T1062
Persistence
Hypervisor

**This technique has been deprecated and should no longer be used.** A type-1 hypervisor is a software layer that sits between the guest operating systems …

Platforms
Windows
T1067
Persistence
Bootkit

A bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record …

Platforms
Linux Windows
T1084
Persistence
Windows Management Instrumentation Event Subscription

Windows Management Instrumentation (WMI) can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. Adversaries may …

Platforms
Windows
T1098
Persistence
Account Manipulation

Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account manipulation may consist of any action that preserves or modifies adversary access …

Platforms
Containers ESXi IaaS +7 more
T1098.001
Persistence
Additional Cloud Credentials

Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment. For example, adversaries may …

Platforms
IaaS Identity Provider SaaS
T1098.002
Persistence
Additional Email Delegate Permissions

Adversaries may grant additional permission levels to maintain persistent access to an adversary-controlled email account. For example, the <code>Add-MailboxPermission</code> [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlet, available in on-premises Exchange …

Platforms
Windows Office Suite
T1098.003
Persistence
Additional Cloud Roles

An adversary may add additional roles or permissions to an adversary-controlled cloud account to maintain persistent access to a tenant. For example, adversaries may update …

Platforms
IaaS Identity Provider Office Suite +1 more
T1098.004
Persistence
SSH Authorized Keys

Adversaries may modify the SSH <code>authorized_keys</code> file to maintain persistence on a victim host. Linux distributions, macOS, and ESXi hypervisors commonly use key-based authentication to …

Platforms
Linux macOS IaaS +2 more
T1098.005
Persistence
Device Registration

Adversaries may register a device to an adversary-controlled account. Devices may be registered in a multifactor authentication (MFA) system, which handles authentication to the network, …

Platforms
Windows Identity Provider
T1098.006
Persistence
Additional Container Cluster Roles

An adversary may add additional roles or permissions to an adversary-controlled user or service account to maintain persistent access to a container orchestration system. For …

Platforms
Containers
T1098.007
Persistence
Additional Local or Domain Groups

An adversary may add additional local or domain groups to an adversary-controlled account to maintain persistent access to a system or domain. On Windows, accounts …

Platforms
Windows macOS Linux
T1100
Persistence
Web Shell

A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server …

Platforms
Linux Windows macOS
T1101
Persistence
Security Support Provider

Windows Security Support Provider (SSP) DLLs are loaded into the Local Security Authority (LSA) process at system start. Once loaded into the LSA, SSP DLLs …

Platforms
Windows
T1103
Persistence
AppInit DLLs

Dynamic-link libraries (DLLs) that are specified in the AppInit_DLLs value in the Registry keys <code>HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows</code> or <code>HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code> are loaded by user32.dll into every …

Platforms
Windows
T1128
Persistence
Netsh Helper DLL

Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functionality to …

Platforms
Windows
T1131
Persistence
Authentication Package

Windows Authentication Package DLLs are loaded by the Local Security Authority (LSA) process at system start. They provide support for multiple logon processes and multiple …

Platforms
Windows
T1133
Persistence
External Remote Services

Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow …

Platforms
Containers Linux macOS +1 more
T1136
Persistence
Create Account

Adversaries may create an account to maintain access to victim systems.(Citation: Symantec WastedLocker June 2020) With a sufficient level of access, creating such accounts may …

Platforms
Windows IaaS Linux +7 more
T1136.001
Persistence
Local Account

Adversaries may create a local account to maintain access to victim systems. Local accounts are those configured by an organization for use by users, remote …

Platforms
Linux macOS Windows +3 more
T1136.002
Persistence
Domain Account

Adversaries may create a domain account to maintain access to victim systems. Domain accounts are those managed by Active Directory Domain Services where access and …

Platforms
Linux macOS Windows
T1136.003
Persistence
Cloud Account

Adversaries may create a cloud account to maintain access to victim systems. With a sufficient level of access, such accounts may be used to establish …

Platforms
IaaS SaaS Office Suite +1 more
T1137
Persistence
Office Application Startup

Adversaries may leverage Microsoft Office-based applications for persistence between startups. Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise …

Platforms
Windows Office Suite
T1137.001
Persistence
Office Template Macros

Adversaries may abuse Microsoft Office templates to obtain persistence on a compromised system. Microsoft Office contains templates that are part of common Office applications and …

Platforms
Windows Office Suite
T1137.002
Persistence
Office Test

Adversaries may abuse the Microsoft Office "Office Test" Registry key to obtain persistence on a compromised system. An Office Test Registry location exists that allows …

Platforms
Windows Office Suite
T1137.003
Persistence
Outlook Forms

Adversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. Outlook forms are used as templates for presentation and functionality in Outlook …

Platforms
Windows Office Suite
T1137.004
Persistence
Outlook Home Page

Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. Outlook Home Page is a legacy feature used to customize …

Platforms
Windows Office Suite
T1137.005
Persistence
Outlook Rules

Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email …

Platforms
Windows Office Suite
T1137.006
Persistence
Add-ins

Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs. (Citation: …

Platforms
Windows Office Suite
T1138
Persistence
Application Shimming

The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time. …

Platforms
Windows
T1156
Persistence
Malicious Shell Modification

Adversaries may establish persistence through executing malicious commands triggered by a user’s shell. User shells execute several configuration scripts at different points throughout the session …

Platforms
Linux macOS
T1157
Persistence
Dylib Hijacking

macOS and OS X use a common method to look for required dynamic libraries (dylib) to load into a program based on search paths. Adversaries …

Platforms
macOS
T1159
Persistence
Launch Agent

Per Apple’s developer documentation, when a user logs in, a per-user launchd process is started which loads the parameters for each launch-on-demand user agent from …

Platforms
macOS
T1160
Persistence
Launch Daemon

Per Apple’s developer documentation, when macOS and OS X boot up, launchd is run to finish system initialization. This process loads the parameters for each …

Platforms
macOS
T1161
Persistence
LC_LOAD_DYLIB Addition

Mach-O binaries have a series of headers that are used to perform certain operations when a binary is loaded. The LC_LOAD_DYLIB header in a Mach-O …

Platforms
macOS
T1162
Persistence
Login Item

MacOS provides the option to list specific applications to run when a user logs in. These applications run under the logged in user's context, and …

Platforms
macOS
T1163
Persistence
Rc.common

During the boot process, macOS executes <code>source /etc/rc.common</code>, which is a shell script containing various utility functions. This file also defines routines for processing command-line …

Platforms
macOS
T1164
Persistence
Re-opened Applications

Starting in Mac OS X 10.7 (Lion), users can specify certain applications to be re-opened when a user reboots their machine. While this is usually …

Platforms
macOS
T1165
Persistence
Startup Items

Per Apple’s documentation, startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration …

Platforms
macOS
T1168
Persistence
Local Job Scheduling

On Linux and macOS systems, multiple methods are supported for creating pre-scheduled and periodic background jobs: cron, (Citation: Die.net Linux crontab Man Page) at, (Citation: …

Platforms
Linux macOS
T1176
Persistence
Software Extensions

Adversaries may abuse software extensions to establish persistent access to victim systems. Software extensions are modular components that enhance or customize the functionality of software …

Platforms
Linux macOS Windows
T1176.001
Persistence
Browser Extensions

Adversaries may abuse internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality to …

Platforms
Linux Windows macOS
T1176.002
Persistence
IDE Extensions

Adversaries may abuse an integrated development environment (IDE) extension to establish persistent access to victim systems.(Citation: Mnemonic misuse visual studio) IDEs such as Visual Studio …

Platforms
Linux macOS Windows
T1179
Persistence
Hooking

Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Windows API functions are typically stored in dynamic-link …

Platforms
Windows
T1180
Persistence
Screensaver

Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension.(Citation: Wikipedia …

Platforms
Windows
T1182
Persistence
AppCert DLLs

Dynamic-link libraries (DLLs) that are specified in the AppCertDLLs Registry key under <code>HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager</code> are loaded into every process that calls the ubiquitously used application …

Platforms
Windows
T1209
Persistence
Time Providers

The Windows Time service (W32Time) enables time synchronization across and within domains. (Citation: Microsoft W32Time Feb 2018) W32Time time providers are responsible for retrieving time …

Platforms
Windows
T1215
Persistence
Kernel Modules and Extensions

Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of …

Platforms
Linux macOS
T1501
Persistence
Systemd Service

Systemd services can be used to establish persistence on a Linux system. The systemd service manager is commonly used for managing background daemon processes (also …

Platforms
Linux
T1504
Persistence
PowerShell Profile

Adversaries may gain persistence and elevate privileges in certain situations by abusing [PowerShell](https://attack.mitre.org/techniques/T1086) profiles. A PowerShell profile (<code>profile.ps1</code>) is a script that runs when PowerShell …

Platforms
Windows
T1505
Persistence
Server Software Component

Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to …

Platforms
Windows Linux macOS +2 more
T1505.001
Persistence
SQL Stored Procedures

Adversaries may abuse SQL stored procedures to establish persistent access to systems. SQL Stored Procedures are code that can be saved and reused so that …

Platforms
Windows Linux
T1505.002
Persistence
Transport Agent

Adversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsoft Exchange transport agents can operate on email messages passing through the transport …

Platforms
Linux Windows
T1505.003
Persistence
Web Shell

Adversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web script that is placed on …

Platforms
Linux macOS Network Devices +1 more
T1505.004
Persistence
IIS Components

Adversaries may install malicious components that run on Internet Information Services (IIS) web servers to establish persistence. IIS provides several mechanisms to extend the functionality …

Platforms
Windows
T1505.005
Persistence
Terminal Services DLL

Adversaries may abuse components of Terminal Services to enable persistent access to systems. Microsoft Terminal Services, renamed to Remote Desktop Services in some Windows Server …

Platforms
Windows
T1505.006
Persistence
vSphere Installation Bundles

Adversaries may abuse vSphere Installation Bundles (VIBs) to establish persistent access to ESXi hypervisors. VIBs are collections of files used for software distribution and virtual …

Platforms
ESXi
T1519
Persistence
Emond

Adversaries may use Event Monitor Daemon (emond) to establish persistence by scheduling malicious commands to run on predictable event triggers. Emond is a [Launch Daemon](https://attack.mitre.org/techniques/T1160) …

Platforms
macOS
T1525
Persistence
Implant Internal Image

Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Amazon Web Services (AWS) Amazon Machine …

Platforms
IaaS Containers
T1542.001
Persistence
System Firmware

Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) …

Platforms
Windows Network Devices
T1542.002
Persistence
Component Firmware

Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will …

Platforms
Windows Linux macOS
T1542.003
Persistence
Bootkit

Adversaries may use bootkits to persist on systems. A bootkit is a malware variant that modifies the boot sectors of a hard drive, allowing malicious …

Platforms
Linux Windows
T1543
Persistence
Create or Modify System Process

Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes …

Platforms
Windows macOS Linux +1 more
T1543.001
Persistence
Launch Agent

Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence. When a user logs in, a per-user launchd process …

Platforms
macOS
T1543.002
Persistence
Systemd Service

Adversaries may create or modify systemd services to repeatedly execute malicious payloads as part of persistence. Systemd is a system and service manager commonly used …

Platforms
Linux
T1543.003
Persistence
Windows Service

Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications …

Platforms
Windows
T1543.004
Persistence
Launch Daemon

Adversaries may create or modify Launch Daemons to execute malicious payloads as part of persistence. Launch Daemons are plist files used to interact with Launchd, …

Platforms
macOS
T1543.005
Persistence
Container Service

Adversaries may create or modify container or container cluster management tools that run as daemons, agents, or services on individual hosts. These include software for …

Platforms
Containers
T1546.017
Persistence
Udev Rules

Adversaries may maintain persistence through executing malicious content triggered using udev rules. Udev is the Linux kernel device manager that dynamically manages device nodes, handles …

Platforms
Linux
T1546.018
Persistence
Python Startup Hooks

Adversaries may achieve persistence by leveraging Python’s startup mechanisms, including path configuration (`.pth`) files and the `sitecustomize.py` or `usercustomize.py` modules. These files are automatically processed …

Platforms
Linux macOS Windows
T1547
Persistence
Boot or Logon Autostart Execution

Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. …

Platforms
Linux macOS Windows +1 more
T1547.001
Persistence
Registry Run Keys / Startup Folder

Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. Adding an entry to the …

Platforms
Windows
T1547.002
Persistence
Authentication Package

Adversaries may abuse authentication packages to execute DLLs when the system boots. Windows authentication package DLLs are loaded by the Local Security Authority (LSA) process …

Platforms
Windows
T1547.003
Persistence
Time Providers

Adversaries may abuse time providers to execute DLLs when the system boots. The Windows Time service (W32Time) enables time synchronization across and within domains.(Citation: Microsoft …

Platforms
Windows
T1547.004
Persistence
Winlogon Helper DLL

Adversaries may abuse features of Winlogon to execute DLLs and/or executables when a user logs in. Winlogon.exe is a Windows component responsible for actions at …

Platforms
Windows
T1547.005
Persistence
Security Support Provider

Adversaries may abuse security support providers (SSPs) to execute DLLs when the system boots. Windows SSP DLLs are loaded into the Local Security Authority (LSA) …

Platforms
Windows
T1547.006
Persistence
Kernel Modules and Extensions

Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and …

Platforms
macOS Linux
T1547.007
Persistence
Re-opened Applications

Adversaries may modify plist files to automatically run an application when a user logs in. When a user logs out or restarts via the macOS …

Platforms
macOS
T1547.008
Persistence
LSASS Driver

Adversaries may modify or add LSASS drivers to obtain persistence on compromised systems. The Windows security subsystem is a set of components that manage and …

Platforms
Windows
T1547.009
Persistence
Shortcut Modification

Adversaries may create or modify shortcuts that can execute a program during system boot or user login. Shortcuts or symbolic links are used to reference …

Platforms
Windows
T1547.010
Persistence
Port Monitors

Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set …

Platforms
Windows
T1547.011
Persistence
Plist Modification

Adversaries can modify property list files (plist files) to execute their code as part of establishing persistence. Plist files are used by macOS applications to …

Platforms
macOS
T1547.012
Persistence
Print Processors

Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation. Print processors are DLLs that are loaded by …

Platforms
Windows
T1547.013
Persistence
XDG Autostart Entries

Adversaries may add or modify XDG Autostart Entries to execute malicious programs or commands when a user’s desktop environment is loaded at login. XDG Autostart …

Platforms
Linux
T1547.014
Persistence
Active Setup

Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine. Active Setup is a Windows mechanism that is …

Platforms
Windows
T1547.015
Persistence
Login Items

Adversaries may add login items to execute upon user login to gain persistence or escalate privileges. Login items are applications, documents, folders, or server connections …

Platforms
macOS
T1554
Persistence
Compromise Host Software Binary

Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables provide a wide range of system commands or services, programs, and …

Platforms
Linux macOS Windows +1 more
T1574
Persistence
Hijack Execution Flow

Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, …

Platforms
Linux macOS Windows
T1574.001
Persistence
DLL

Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses. DLLs are libraries that contain code and data …

Platforms
Windows
T1574.002
Persistence
DLL Side-Loading

Adversaries may execute their own malicious payloads by side-loading DLLs. Similar to [DLL](https://attack.mitre.org/techniques/T1574/001), side-loading involves hijacking which DLL a program loads. But rather than just …

Platforms
Windows
T1574.004
Persistence
Dylib Hijacking

Adversaries may execute their own payloads by placing a malicious dynamic library (dylib) with an expected name in a path a victim application searches at …

Platforms
macOS
T1574.005
Persistence
Executable Installer File Permissions Weakness

Adversaries may execute their own malicious payloads by hijacking the binaries used by an installer. These processes may automatically execute specific binaries as part of …

Platforms
Windows
T1574.006
Persistence
Dynamic Linker Hijacking

Adversaries may execute their own malicious payloads by hijacking environment variables the dynamic linker uses to load shared libraries. During the execution preparation phase of …

Platforms
Linux macOS
T1574.007
Persistence
Path Interception by PATH Environment Variable

Adversaries may execute their own malicious payloads by hijacking environment variables used to load libraries. The PATH environment variable contains a list of directories (User …

Platforms
Windows macOS Linux
T1574.008
Persistence
Path Interception by Search Order Hijacking

Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs. Because some programs do not call other programs …

Platforms
Windows
T1574.009
Persistence
Path Interception by Unquoted Path

Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing …

Platforms
Windows
T1574.010
Persistence
Services File Permissions Weakness

Adversaries may execute their own malicious payloads by hijacking the binaries used by services. Adversaries may use flaws in the permissions of Windows services to …

Platforms
Windows
T1574.011
Persistence
Services Registry Permissions Weakness

Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Flaws in the permissions for Registry keys related to services …

Platforms
Windows
T1574.012
Persistence
COR_PROFILER

Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework …

Platforms
Windows
T1574.013
Persistence
KernelCallbackTable

Adversaries may abuse the <code>KernelCallbackTable</code> of a process to hijack its execution flow in order to run their own payloads.(Citation: Lazarus APT January 2022)(Citation: FinFisher …

Platforms
Windows
T1574.014
Persistence
AppDomainManager

Adversaries may execute their own malicious payloads by hijacking how the .NET `AppDomainManager` loads assemblies. The .NET framework uses the `AppDomainManager` class to create and …

Platforms
Windows
T1653
Persistence
Power Settings

Adversaries may impair a system's ability to hibernate, reboot, or shut down in order to extend access to infected machines. When a computer enters a …

Platforms
Windows Linux macOS +1 more
T1668
Persistence
Exclusive Control

Adversaries who successfully compromise a system may attempt to maintain persistence by “closing the door” behind them – in other words, by preventing other threat …

Platforms
Linux macOS Windows
T1671
Persistence
Cloud Application Integration

Adversaries may achieve persistence by leveraging OAuth application integrations in a software-as-a-service environment. Adversaries may create a custom application, add a legitimate application into the …

Platforms
Office Suite SaaS
T1068
Privilege Escalation
Exploitation for Privilege Escalation

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming …

Platforms
Containers Linux macOS +1 more
T1166
Privilege Escalation
Setuid and Setgid

When the setuid or setgid bits are set on Linux or macOS for an application, this means that the application will run with the privileges …

Platforms
Linux macOS
T1169
Privilege Escalation
Sudo

The sudoers file, <code>/etc/sudoers</code>, describes which users can run which commands and from which terminals. This also describes which commands users can run as other …

Platforms
Linux macOS
T1178
Privilege Escalation
SID-History Injection

The Windows security identifier (SID) is a unique value that identifies a user or group account. SIDs are used by Windows security in both security …

Platforms
Windows
T1183
Privilege Escalation
Image File Execution Options Injection

Image File Execution Options (IFEO) enable a developer to attach a debugger to an application. When a process is created, a debugger present in an …

Platforms
Windows
T1206
Privilege Escalation
Sudo Caching

The <code>sudo</code> command "allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) …

Platforms
Linux macOS
T1514
Privilege Escalation
Elevated Execution with Prompt

Adversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompting the user for credentials.(Citation: AppleDocs AuthorizationExecuteWithPrivileges) The purpose of this API is to give …

Platforms
macOS
T1546
Privilege Escalation
Event Triggered Execution

Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and …

Platforms
Linux macOS Windows +3 more
T1546.001
Privilege Escalation
Change Default File Association

Adversaries may establish persistence by executing malicious content triggered by a file type association. When a file is opened, the default program used to open …

Platforms
Windows
T1546.002
Privilege Escalation
Screensaver

Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and …

Platforms
Windows
T1546.003
Privilege Escalation
Windows Management Instrumentation Event Subscription

Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription. WMI can be used to …

Platforms
Windows
T1546.004
Privilege Escalation
Unix Shell Configuration Modification

Adversaries may establish persistence through executing malicious commands triggered by a user’s shell. User [Unix Shell](https://attack.mitre.org/techniques/T1059/004)s execute several configuration scripts at different points throughout the …

Platforms
Linux macOS
T1546.005
Privilege Escalation
Trap

Adversaries may establish persistence by executing malicious content triggered by an interrupt signal. The <code>trap</code> command allows programs and shells to specify commands that will …

Platforms
macOS Linux
T1546.006
Privilege Escalation
LC_LOAD_DYLIB Addition

Adversaries may establish persistence by executing malicious content triggered by the execution of tainted binaries. Mach-O binaries have a series of headers that are used …

Platforms
macOS
T1546.007
Privilege Escalation
Netsh Helper DLL

Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also referred to as Netshell) is a command-line scripting utility used …

Platforms
Windows
T1546.008
Privilege Escalation
Accessibility Features

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by accessibility features. Windows contains accessibility features that may be launched with a …

Platforms
Windows
T1546.009
Privilege Escalation
AppCert DLLs

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes. Dynamic-link libraries (DLLs) that are specified in …

Platforms
Windows
T1546.010
Privilege Escalation
AppInit DLLs

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes. Dynamic-link libraries (DLLs) that are specified in …

Platforms
Windows
T1546.011
Privilege Escalation
Application Shimming

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created …

Platforms
Windows
T1546.012
Privilege Escalation
Image File Execution Options Injection

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach …

Platforms
Windows
T1546.013
Privilege Escalation
PowerShell Profile

Adversaries may gain persistence and elevate privileges by executing malicious content triggered by PowerShell profiles. A PowerShell profile (<code>profile.ps1</code>) is a script that runs when …

Platforms
Windows
T1546.014
Privilege Escalation
Emond

Adversaries may gain persistence and elevate privileges by executing malicious content triggered by the Event Monitor Daemon (emond). Emond is a [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) that accepts …

Platforms
macOS
T1546.015
Privilege Escalation
Component Object Model Hijacking

Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects. COM is a system within Windows to …

Platforms
Windows
T1546.016
Privilege Escalation
Installer Packages

Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Installer packages are OS specific and contain …

Platforms
Linux Windows macOS
T1548
Privilege Escalation
Abuse Elevation Control Mechanism

Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to …

Platforms
Linux macOS Windows +3 more
T1548.001
Privilege Escalation
Setuid and Setgid

An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and …

Platforms
Linux macOS
T1548.002
Privilege Escalation
Bypass User Account Control

Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as …

Platforms
Windows
T1548.003
Privilege Escalation
Sudo and Sudo Caching

Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries may do this to execute commands as other users or spawn …

Platforms
Linux macOS
T1548.004
Privilege Escalation
Elevated Execution with Prompt

Adversaries may leverage the <code>AuthorizationExecuteWithPrivileges</code> API to escalate privileges by prompting the user for credentials.(Citation: AppleDocs AuthorizationExecuteWithPrivileges) The purpose of this API is to give …

Platforms
macOS
T1548.005
Privilege Escalation
Temporary Elevated Cloud Access

Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources. Many cloud environments allow administrators to grant user or …

Platforms
IaaS Office Suite Identity Provider
T1611
Privilege Escalation
Escape to Host

Adversaries may break out of a container or virtualized environment to gain access to the underlying host. This can allow an adversary access to other …

Platforms
Windows Linux Containers +1 more
T1589
Reconnaissance
Gather Victim Identity Information

Adversaries may gather information about the victim's identity that can be used during targeting. Information about identities may include a variety of details, including personal …

Platforms
PRE
T1589.001
Reconnaissance
Credentials

Adversaries may gather credentials that can be used during targeting. Account credentials gathered by adversaries may be those directly associated with the target victim organization …

Platforms
PRE
T1589.002
Reconnaissance
Email Addresses

Adversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for …

Platforms
PRE
T1589.003
Reconnaissance
Employee Names

Adversaries may gather employee names that can be used during targeting. Employee names be used to derive email addresses as well as to help guide …

Platforms
PRE
T1590
Reconnaissance
Gather Victim Network Information

Adversaries may gather information about the victim's networks that can be used during targeting. Information about networks may include a variety of details, including administrative …

Platforms
PRE
T1590.001
Reconnaissance
Domain Properties

Adversaries may gather information about the victim's network domain(s) that can be used during targeting. Information about domains and their properties may include a variety …

Platforms
PRE
T1590.002
Reconnaissance
DNS

Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name …

Platforms
PRE
T1590.003
Reconnaissance
Network Trust Dependencies

Adversaries may gather information about the victim's network trust dependencies that can be used during targeting. Information about network trusts may include a variety of …

Platforms
PRE
T1590.004
Reconnaissance
Network Topology

Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, …

Platforms
PRE
T1590.005
Reconnaissance
IP Addresses

Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a …

Platforms
PRE
T1590.006
Reconnaissance
Network Security Appliances

Adversaries may gather information about the victim's network security appliances that can be used during targeting. Information about network security appliances may include a variety …

Platforms
PRE
T1591
Reconnaissance
Gather Victim Org Information

Adversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include a variety of details, including …

Platforms
PRE
T1591.001
Reconnaissance
Determine Physical Locations

Adversaries may gather the victim's physical location(s) that can be used during targeting. Information about physical locations of a target organization may include a variety …

Platforms
PRE
T1591.002
Reconnaissance
Business Relationships

Adversaries may gather information about the victim's business relationships that can be used during targeting. Information about an organization’s business relationships may include a variety …

Platforms
PRE
T1591.003
Reconnaissance
Identify Business Tempo

Adversaries may gather information about the victim's business tempo that can be used during targeting. Information about an organization’s business tempo may include a variety …

Platforms
PRE
T1591.004
Reconnaissance
Identify Roles

Adversaries may gather information about identities and roles within the victim organization that can be used during targeting. Information about business roles may reveal a …

Platforms
PRE
T1592
Reconnaissance
Gather Victim Host Information

Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative …

Platforms
PRE
T1592.001
Reconnaissance
Hardware

Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details …

Platforms
PRE
T1592.002
Reconnaissance
Software

Adversaries may gather information about the victim's host software that can be used during targeting. Information about installed software may include a variety of details …

Platforms
PRE
T1592.003
Reconnaissance
Firmware

Adversaries may gather information about the victim's host firmware that can be used during targeting. Information about host firmware may include a variety of details …

Platforms
PRE
T1592.004
Reconnaissance
Client Configurations

Adversaries may gather information about the victim's client configurations that can be used during targeting. Information about client configurations may include a variety of details …

Platforms
PRE
T1593
Reconnaissance
Search Open Websites/Domains

Adversaries may search freely available websites and/or domains for information about victims that can be used during targeting. Information about victims may be available in …

Platforms
PRE
T1593.001
Reconnaissance
Social Media

Adversaries may search social media for information about victims that can be used during targeting. Social media sites may contain various information about a victim …

Platforms
PRE
T1593.002
Reconnaissance
Search Engines

Adversaries may use search engines to collect information about victims that can be used during targeting. Search engine services typical crawl online sites to index …

Platforms
PRE
T1593.003
Reconnaissance
Code Repositories

Adversaries may search public code repositories for information about victims that can be used during targeting. Victims may store code in repositories on various third-party …

Platforms
PRE
T1594
Reconnaissance
Search Victim-Owned Websites

Adversaries may search websites owned by the victim for information that can be used during targeting. Victim-owned websites may contain a variety of details, including …

Platforms
PRE
T1595
Reconnaissance
Active Scanning

Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure …

Platforms
PRE
T1595.001
Reconnaissance
Scanning IP Blocks

Adversaries may scan victim IP blocks to gather information that can be used during targeting. Public IP addresses may be allocated to organizations by block, …

Platforms
PRE
T1595.002
Reconnaissance
Vulnerability Scanning

Adversaries may scan victims for vulnerabilities that can be used during targeting. Vulnerability scans typically check if the configuration of a target host/application (ex: software …

Platforms
PRE
T1595.003
Reconnaissance
Wordlist Scanning

Adversaries may iteratively probe infrastructure using brute-forcing and crawling techniques. While this technique employs similar methods to [Brute Force](https://attack.mitre.org/techniques/T1110), its goal is the identification of …

Platforms
PRE
T1596
Reconnaissance
Search Open Technical Databases

Adversaries may search freely available technical databases for information about victims that can be used during targeting. Information about victims may be available in online …

Platforms
PRE
T1596.001
Reconnaissance
DNS/Passive DNS

Adversaries may search DNS data for information about victims that can be used during targeting. DNS information may include a variety of details, including registered …

Platforms
PRE
T1596.002
Reconnaissance
WHOIS

Adversaries may search public WHOIS data for information about victims that can be used during targeting. WHOIS data is stored by regional Internet registries (RIR) …

Platforms
PRE
T1596.003
Reconnaissance
Digital Certificates

Adversaries may search public digital certificate data for information about victims that can be used during targeting. Digital certificates are issued by a certificate authority …

Platforms
PRE
T1596.004
Reconnaissance
CDNs

Adversaries may search content delivery network (CDN) data about victims that can be used during targeting. CDNs allow an organization to host content from a …

Platforms
PRE
T1596.005
Reconnaissance
Scan Databases

Adversaries may search within public scan databases for information about victims that can be used during targeting. Various online services continuously publish the results of …

Platforms
PRE
T1597
Reconnaissance
Search Closed Sources

Adversaries may search and gather information about victims from closed (e.g., paid, private, or otherwise not freely available) sources that can be used during targeting. …

Platforms
PRE
T1597.001
Reconnaissance
Threat Intel Vendors

Adversaries may search private data from threat intelligence vendors for information that can be used during targeting. Threat intelligence vendors may offer paid feeds or …

Platforms
PRE
T1597.002
Reconnaissance
Purchase Technical Data

Adversaries may purchase technical information about victims that can be used during targeting. Information about victims may be available for purchase within reputable private sources …

Platforms
PRE
T1598
Reconnaissance
Phishing for Information

Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into …

Platforms
PRE
T1598.001
Reconnaissance
Spearphishing Service

Adversaries may send spearphishing messages via third-party services to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to …

Platforms
PRE
T1598.002
Reconnaissance
Spearphishing Attachment

Adversaries may send spearphishing messages with a malicious attachment to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt …

Platforms
PRE
T1598.003
Reconnaissance
Spearphishing Link

Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt …

Platforms
PRE
T1598.004
Reconnaissance
Spearphishing Voice

Adversaries may use voice communications to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into …

Platforms
PRE
T1681
Reconnaissance
Search Threat Vendor Data

Threat actors may seek information/indicators from closed or open threat intelligence sources gathered about their own campaigns, as well as those conducted by other adversaries …

Platforms
PRE
T1583
Resource Development
Acquire Infrastructure

Adversaries may buy, lease, rent, or obtain infrastructure that can be used during targeting. A wide variety of infrastructure exists for hosting and orchestrating adversary …

Platforms
PRE
T1583.001
Resource Development
Domains

Adversaries may acquire domains that can be used during targeting. Domain names are the human readable names used to represent one or more IP addresses. …

Platforms
PRE
T1583.002
Resource Development
DNS Server

Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic …

Platforms
PRE
T1583.003
Resource Development
Virtual Private Server

Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. There exist a variety of cloud service providers that will sell virtual …

Platforms
PRE
T1583.004
Resource Development
Server

Adversaries may buy, lease, rent, or obtain physical servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and …

Platforms
PRE
T1583.005
Resource Development
Botnet

Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems …

Platforms
PRE
T1583.006
Resource Development
Web Services

Adversaries may register for web services that can be used during targeting. A variety of popular websites exist for adversaries to register for a web-based …

Platforms
PRE
T1583.007
Resource Development
Serverless

Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers, AWS Lambda functions, or Google Apps Scripts, that can be used during targeting. …

Platforms
PRE
T1583.008
Resource Development
Malvertising

Adversaries may purchase online advertisements that can be abused to distribute malware to victims. Ads can be purchased to plant as well as favorably position …

Platforms
PRE
T1584
Resource Development
Compromise Infrastructure

Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions include physical or cloud servers, domains, network devices, and third-party web and …

Platforms
PRE
T1584.001
Resource Development
Domains

Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the act of changing the registration of a domain …

Platforms
PRE
T1584.002
Resource Development
DNS Server

Adversaries may compromise third-party DNS servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for …

Platforms
PRE
T1584.003
Resource Development
Virtual Private Server

Adversaries may compromise third-party Virtual Private Servers (VPSs) that can be used during targeting. There exist a variety of cloud service providers that will sell …

Platforms
PRE
T1584.004
Resource Development
Server

Adversaries may compromise third-party servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During …

Platforms
PRE
T1584.005
Resource Development
Botnet

Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that …

Platforms
PRE
T1584.006
Resource Development
Web Services

Adversaries may compromise access to third-party web services that can be used during targeting. A variety of popular websites exist for legitimate users to register …

Platforms
PRE
T1584.007
Resource Development
Serverless

Adversaries may compromise serverless cloud infrastructure, such as Cloudflare Workers, AWS Lambda functions, or Google Apps Scripts, that can be used during targeting. By utilizing …

Platforms
PRE
T1584.008
Resource Development
Network Devices

Adversaries may compromise third-party network devices that can be used during targeting. Network devices, such as small office/home office (SOHO) routers, may be compromised where …

Platforms
PRE
T1585
Resource Development
Establish Accounts

Adversaries may create and cultivate accounts with services that can be used during targeting. Adversaries can create accounts that can be used to build a …

Platforms
PRE
T1585.001
Resource Development
Social Media Accounts

Adversaries may create and cultivate social media accounts that can be used during targeting. Adversaries can create social media accounts that can be used to …

Platforms
PRE
T1585.002
Resource Development
Email Accounts

Adversaries may create email accounts that can be used during targeting. Adversaries can use accounts created with email providers to further their operations, such as …

Platforms
PRE
T1585.003
Resource Development
Cloud Accounts

Adversaries may create accounts with cloud providers that can be used during targeting. Adversaries can use cloud accounts to further their operations, including leveraging cloud …

Platforms
PRE
T1586
Resource Development
Compromise Accounts

Adversaries may compromise accounts with services that can be used during targeting. For operations incorporating social engineering, the utilization of an online persona may be …

Platforms
PRE
T1586.001
Resource Development
Social Media Accounts

Adversaries may compromise social media accounts that can be used during targeting. For operations incorporating social engineering, the utilization of an online persona may be …

Platforms
PRE
T1586.002
Resource Development
Email Accounts

Adversaries may compromise email accounts that can be used during targeting. Adversaries can use compromised email accounts to further their operations, such as leveraging them …

Platforms
PRE
T1586.003
Resource Development
Cloud Accounts

Adversaries may compromise cloud accounts that can be used during targeting. Adversaries can use compromised cloud accounts to further their operations, including leveraging cloud storage …

Platforms
PRE
T1587
Resource Development
Develop Capabilities

Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely downloading, or stealing capabilities, adversaries may develop their own capabilities in-house. …

Platforms
PRE
T1587.001
Resource Development
Malware

Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, …

Platforms
PRE
T1587.002
Resource Development
Code Signing Certificates

Adversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to …

Platforms
PRE
T1587.003
Resource Development
Digital Certificates

Adversaries may create self-signed SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, …

Platforms
PRE
T1587.004
Resource Development
Exploits

Adversaries may develop exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or …

Platforms
PRE
T1588
Resource Development
Obtain Capabilities

Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than developing their own capabilities in-house, adversaries may purchase, freely download, or …

Platforms
PRE
T1588.001
Resource Development
Malware

Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, packers, and C2 …

Platforms
PRE
T1588.002
Resource Development
Tool

Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A …

Platforms
PRE
T1588.003
Resource Development
Code Signing Certificates

Adversaries may buy and/or steal code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts …

Platforms
PRE
T1588.004
Resource Development
Digital Certificates

Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the …

Platforms
PRE
T1588.005
Resource Development
Exploits

Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to …

Platforms
PRE
T1588.006
Resource Development
Vulnerabilities

Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, …

Platforms
PRE
T1588.007
Resource Development
Artificial Intelligence

Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be …

Platforms
PRE
T1608
Resource Development
Stage Capabilities

Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take …

Platforms
PRE
T1608.001
Resource Development
Upload Malware

Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, …

Platforms
PRE
T1608.002
Resource Development
Upload Tool

Adversaries may upload tools to third-party or adversary controlled infrastructure to make it accessible during targeting. Tools can be open or closed source, free or …

Platforms
PRE
T1608.003
Resource Development
Install Digital Certificate

Adversaries may install SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are files that can be installed on servers to enable secure communications …

Platforms
PRE
T1608.004
Resource Development
Drive-by Target

Adversaries may prepare an operational environment to infect systems that visit a website over the normal course of browsing. Endpoint systems may be compromised through …

Platforms
PRE
T1608.005
Resource Development
Link Target

Adversaries may put in place resources that are referenced by a link that can be used during targeting. An adversary may rely upon a user …

Platforms
PRE
T1608.006
Resource Development
SEO Poisoning

Adversaries may poison mechanisms that influence search engine optimization (SEO) to further lure staged capabilities towards potential victims. Search engines typically display results to users …

Platforms
PRE
T1650
Resource Development
Acquire Access

Adversaries may purchase or otherwise acquire an existing access to a target system or network. A variety of online services and initial access broker networks …

Platforms
PRE
TTP Statistics

835

Total TTPs

14

Tactics

With Detection Rules

With Mitigations