-
- T1001 |
- Data Obfuscation |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1001.001 |
- Data Obfuscation |
- Junk Data |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1001.002 |
- Data Obfuscation |
- Steganography |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1001.003 |
- Data Obfuscation |
- Protocol Impersonation |
- 0 |
- 3 |
- 0 |
- 1 |
- 4 |
-
-
- T1003 |
- OS Credential Dumping |
- n/a |
- 0 |
- 23 |
- 34 |
- 36 |
- 93 |
-
-
- T1003.001 |
- OS Credential Dumping |
- LSASS Memory |
- 5 |
- 75 |
- 10 |
- 14 |
- 104 |
-
-
- T1003.002 |
- OS Credential Dumping |
- Security Account Manager |
- 1 |
- 28 |
- 5 |
- 9 |
- 43 |
-
-
- T1003.003 |
- OS Credential Dumping |
- NTDS |
- 2 |
- 19 |
- 1 |
- 8 |
- 30 |
-
-
- T1003.004 |
- OS Credential Dumping |
- LSA Secrets |
- 0 |
- 12 |
- 1 |
- 0 |
- 13 |
-
-
- T1003.005 |
- OS Credential Dumping |
- Cached Domain Credentials |
- 0 |
- 8 |
- 0 |
- 1 |
- 9 |
-
-
- T1003.006 |
- OS Credential Dumping |
- DCSync |
- 0 |
- 8 |
- 0 |
- 0 |
- 8 |
-
-
- T1003.007 |
- OS Credential Dumping |
- Proc Filesystem |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1003.008 |
- OS Credential Dumping |
- /etc/passwd and /etc/shadow |
- 0 |
- 0 |
- 1 |
- 1 |
- 2 |
-
-
- T1005 |
- Data from Local System |
- n/a |
- 0 |
- 7 |
- 2 |
- 1 |
- 10 |
-
-
- T1006 |
- Direct Volume Access |
- n/a |
- 0 |
- 1 |
- 1 |
- 0 |
- 2 |
-
-
- T1007 |
- System Service Discovery |
- n/a |
- 2 |
- 3 |
- 0 |
- 0 |
- 5 |
-
-
- T1008 |
- Fallback Channels |
- n/a |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1010 |
- Application Window Discovery |
- n/a |
- 1 |
- 1 |
- 0 |
- 0 |
- 2 |
-
-
- T1011 |
- Exfiltration Over Other Network Medium |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1011.001 |
- Exfiltration Over Other Network Medium |
- Exfiltration Over Bluetooth |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1012 |
- Query Registry |
- n/a |
- 3 |
- 10 |
- 1 |
- 2 |
- 16 |
-
-
- T1014 |
- Rootkit |
- n/a |
- 0 |
- 1 |
- 0 |
- 3 |
- 4 |
-
-
- T1016 |
- System Network Configuration Discovery |
- n/a |
- 2 |
- 8 |
- 3 |
- 4 |
- 17 |
-
-
- T1016.001 |
- System Network Configuration Discovery |
- Internet Connection Discovery |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1018 |
- Remote System Discovery |
- n/a |
- 1 |
- 15 |
- 4 |
- 18 |
- 38 |
-
-
- T1020 |
- Automated Exfiltration |
- n/a |
- 0 |
- 5 |
- 1 |
- 6 |
- 12 |
-
-
- T1020.001 |
- Automated Exfiltration |
- Traffic Duplication |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1021 |
- Remote Services |
- n/a |
- 1 |
- 3 |
- 34 |
- 24 |
- 62 |
-
-
- T1021.001 |
- Remote Services |
- Remote Desktop Protocol |
- 3 |
- 14 |
- 1 |
- 9 |
- 27 |
-
-
- T1021.002 |
- Remote Services |
- SMB/Windows Admin Shares |
- 5 |
- 33 |
- 6 |
- 5 |
- 49 |
-
-
- T1021.003 |
- Remote Services |
- Distributed Component Object Model |
- 1 |
- 9 |
- 0 |
- 5 |
- 15 |
-
-
- T1021.004 |
- Remote Services |
- SSH |
- 0 |
- 1 |
- 1 |
- 2 |
- 4 |
-
-
- T1021.005 |
- Remote Services |
- VNC |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1021.006 |
- Remote Services |
- Windows Remote Management |
- 3 |
- 9 |
- 0 |
- 6 |
- 18 |
-
-
- T1025 |
- Data from Removable Media |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1026 |
- Multiband Communication |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1027 |
- Obfuscated Files or Information |
- n/a |
- 0 |
- 83 |
- 7 |
- 8 |
- 98 |
-
-
- T1027.001 |
- Obfuscated Files or Information |
- Binary Padding |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1027.002 |
- Obfuscated Files or Information |
- Software Packing |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1027.003 |
- Obfuscated Files or Information |
- Steganography |
- 0 |
- 5 |
- 0 |
- 0 |
- 5 |
-
-
- T1027.004 |
- Obfuscated Files or Information |
- Compile After Delivery |
- 0 |
- 5 |
- 2 |
- 1 |
- 8 |
-
-
- T1027.005 |
- Obfuscated Files or Information |
- Indicator Removal from Tools |
- 0 |
- 4 |
- 0 |
- 2 |
- 6 |
-
-
- T1027.006 |
- Obfuscated Files or Information |
- HTML Smuggling |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1029 |
- Scheduled Transfer |
- n/a |
- 1 |
- 0 |
- 0 |
- 0 |
- 1 |
-
-
- T1030 |
- Data Transfer Size Limits |
- n/a |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1033 |
- System Owner/User Discovery |
- n/a |
- 2 |
- 25 |
- 4 |
- 10 |
- 41 |
-
-
- T1034 |
- Path Interception |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1036 |
- Masquerading |
- n/a |
- 1 |
- 27 |
- 16 |
- 27 |
- 71 |
-
-
- T1036.001 |
- Masquerading |
- Invalid Code Signature |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1036.002 |
- Masquerading |
- Right-to-Left Override |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1036.003 |
- Masquerading |
- Rename System Utilities |
- 1 |
- 21 |
- 2 |
- 22 |
- 46 |
-
-
- T1036.004 |
- Masquerading |
- Masquerade Task or Service |
- 0 |
- 2 |
- 0 |
- 1 |
- 3 |
-
-
- T1036.005 |
- Masquerading |
- Match Legitimate Name or Location |
- 1 |
- 9 |
- 1 |
- 1 |
- 12 |
-
-
- T1036.006 |
- Masquerading |
- Space after Filename |
- 0 |
- 1 |
- 1 |
- 0 |
- 2 |
-
-
- T1036.007 |
- Masquerading |
- Double File Extension |
- 0 |
- 2 |
- 1 |
- 0 |
- 3 |
-
-
- T1037 |
- Boot or Logon Initialization Scripts |
- n/a |
- 0 |
- 0 |
- 5 |
- 2 |
- 7 |
-
-
- T1037.001 |
- Boot or Logon Initialization Scripts |
- Logon Script (Windows) |
- 2 |
- 2 |
- 0 |
- 1 |
- 5 |
-
-
- T1037.002 |
- Boot or Logon Initialization Scripts |
- Login Hook |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1037.003 |
- Boot or Logon Initialization Scripts |
- Network Logon Script |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1037.004 |
- Boot or Logon Initialization Scripts |
- RC Scripts |
- 0 |
- 0 |
- 2 |
- 1 |
- 3 |
-
-
- T1037.005 |
- Boot or Logon Initialization Scripts |
- Startup Items |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1039 |
- Data from Network Shared Drive |
- n/a |
- 1 |
- 2 |
- 0 |
- 1 |
- 4 |
-
-
- T1040 |
- Network Sniffing |
- n/a |
- 1 |
- 8 |
- 2 |
- 1 |
- 12 |
-
-
- T1041 |
- Exfiltration Over C2 Channel |
- n/a |
- 0 |
- 3 |
- 0 |
- 1 |
- 4 |
-
-
- T1043 |
- Commonly Used Port |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1046 |
- Network Service Discovery |
- n/a |
- 2 |
- 11 |
- 1 |
- 0 |
- 14 |
-
-
- T1047 |
- Windows Management Instrumentation |
- n/a |
- 3 |
- 40 |
- 5 |
- 14 |
- 62 |
-
-
- T1048 |
- Exfiltration Over Alternative Protocol |
- n/a |
- 0 |
- 7 |
- 6 |
- 9 |
- 22 |
-
-
- T1048.001 |
- Exfiltration Over Alternative Protocol |
- Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1048.002 |
- Exfiltration Over Alternative Protocol |
- Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1048.003 |
- Exfiltration Over Alternative Protocol |
- Exfiltration Over Unencrypted Non-C2 Protocol |
- 0 |
- 14 |
- 0 |
- 9 |
- 23 |
-
-
- T1049 |
- System Network Connections Discovery |
- n/a |
- 1 |
- 8 |
- 1 |
- 6 |
- 16 |
-
-
- T1051 |
- Shared Webroot |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1052 |
- Exfiltration Over Physical Medium |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1052.001 |
- Exfiltration Over Physical Medium |
- Exfiltration over USB |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1053 |
- Scheduled Task/Job |
- n/a |
- 0 |
- 11 |
- 19 |
- 28 |
- 58 |
-
-
- T1053.002 |
- Scheduled Task/Job |
- At |
- 3 |
- 8 |
- 0 |
- 3 |
- 14 |
-
-
- T1053.003 |
- Scheduled Task/Job |
- Cron |
- 0 |
- 6 |
- 5 |
- 6 |
- 17 |
-
-
- T1053.004 |
- Scheduled Task/Job |
- Launchd |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1053.005 |
- Scheduled Task/Job |
- Scheduled Task |
- 6 |
- 38 |
- 9 |
- 15 |
- 68 |
-
-
- T1053.006 |
- Scheduled Task/Job |
- Systemd Timers |
- 0 |
- 0 |
- 0 |
- 3 |
- 3 |
-
-
- T1053.007 |
- Scheduled Task/Job |
- Container Orchestration Job |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055 |
- Process Injection |
- n/a |
- 0 |
- 23 |
- 13 |
- 26 |
- 62 |
-
-
- T1055.001 |
- Process Injection |
- Dynamic-link Library Injection |
- 2 |
- 8 |
- 0 |
- 4 |
- 14 |
-
-
- T1055.002 |
- Process Injection |
- Portable Executable Injection |
- 0 |
- 0 |
- 0 |
- 2 |
- 2 |
-
-
- T1055.003 |
- Process Injection |
- Thread Execution Hijacking |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1055.004 |
- Process Injection |
- Asynchronous Procedure Call |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055.005 |
- Process Injection |
- Thread Local Storage |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055.008 |
- Process Injection |
- Ptrace System Calls |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055.009 |
- Process Injection |
- Proc Memory |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055.011 |
- Process Injection |
- Extra Window Memory Injection |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055.012 |
- Process Injection |
- Process Hollowing |
- 1 |
- 2 |
- 2 |
- 0 |
- 5 |
-
-
- T1055.013 |
- Process Injection |
- Process Doppelgänging |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055.014 |
- Process Injection |
- VDSO Hijacking |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1055.015 |
- Process Injection |
- ListPlanting |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1056 |
- Input Capture |
- n/a |
- 0 |
- 0 |
- 2 |
- 1 |
- 3 |
-
-
- T1056.001 |
- Input Capture |
- Keylogging |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1056.002 |
- Input Capture |
- GUI Input Capture |
- 0 |
- 3 |
- 1 |
- 1 |
- 5 |
-
-
- T1056.003 |
- Input Capture |
- Web Portal Capture |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1056.004 |
- Input Capture |
- Credential API Hooking |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1057 |
- Process Discovery |
- n/a |
- 2 |
- 5 |
- 2 |
- 0 |
- 9 |
-
-
- T1059 |
- Command and Scripting Interpreter |
- n/a |
- 1 |
- 51 |
- 64 |
- 57 |
- 173 |
-
-
- T1059.001 |
- Command and Scripting Interpreter |
- PowerShell |
- 3 |
- 181 |
- 7 |
- 32 |
- 223 |
-
-
- T1059.002 |
- Command and Scripting Interpreter |
- AppleScript |
- 0 |
- 2 |
- 2 |
- 0 |
- 4 |
-
-
- T1059.003 |
- Command and Scripting Interpreter |
- Windows Command Shell |
- 2 |
- 21 |
- 0 |
- 9 |
- 32 |
-
-
- T1059.004 |
- Command and Scripting Interpreter |
- Unix Shell |
- 0 |
- 8 |
- 18 |
- 3 |
- 29 |
-
-
- T1059.005 |
- Command and Scripting Interpreter |
- Visual Basic |
- 1 |
- 18 |
- 0 |
- 4 |
- 23 |
-
-
- T1059.006 |
- Command and Scripting Interpreter |
- Python |
- 0 |
- 2 |
- 2 |
- 0 |
- 4 |
-
-
- T1059.007 |
- Command and Scripting Interpreter |
- JavaScript |
- 0 |
- 13 |
- 3 |
- 4 |
- 20 |
-
-
- T1059.008 |
- Command and Scripting Interpreter |
- Network Device CLI |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1061 |
- Graphical User Interface |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1062 |
- Hypervisor |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1064 |
- Scripting |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1068 |
- Exploitation for Privilege Escalation |
- n/a |
- 1 |
- 25 |
- 18 |
- 10 |
- 54 |
-
-
- T1069 |
- Permission Groups Discovery |
- n/a |
- 0 |
- 1 |
- 5 |
- 25 |
- 31 |
-
-
- T1069.001 |
- Permission Groups Discovery |
- Local Groups |
- 3 |
- 14 |
- 1 |
- 11 |
- 29 |
-
-
- T1069.002 |
- Permission Groups Discovery |
- Domain Groups |
- 3 |
- 10 |
- 2 |
- 18 |
- 33 |
-
-
- T1069.003 |
- Permission Groups Discovery |
- Cloud Groups |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1070 |
- Indicator Removal on Host |
- n/a |
- 0 |
- 13 |
- 14 |
- 23 |
- 50 |
-
-
- T1070.001 |
- Indicator Removal on Host |
- Clear Windows Event Logs |
- 2 |
- 8 |
- 3 |
- 6 |
- 19 |
-
-
- T1070.002 |
- Indicator Removal on Host |
- Clear Linux or Mac System Logs |
- 0 |
- 3 |
- 1 |
- 0 |
- 4 |
-
-
- T1070.003 |
- Indicator Removal on Host |
- Clear Command History |
- 1 |
- 7 |
- 2 |
- 0 |
- 10 |
-
-
- T1070.004 |
- Indicator Removal on Host |
- File Deletion |
- 0 |
- 12 |
- 4 |
- 12 |
- 28 |
-
-
- T1070.005 |
- Indicator Removal on Host |
- Network Share Connection Removal |
- 1 |
- 3 |
- 0 |
- 1 |
- 5 |
-
-
- T1070.006 |
- Indicator Removal on Host |
- Timestomp |
- 0 |
- 5 |
- 1 |
- 0 |
- 6 |
-
-
- T1071 |
- Application Layer Protocol |
- n/a |
- 0 |
- 6 |
- 11 |
- 10 |
- 27 |
-
-
- T1071.001 |
- Application Layer Protocol |
- Web Protocols |
- 0 |
- 29 |
- 3 |
- 2 |
- 34 |
-
-
- T1071.002 |
- Application Layer Protocol |
- File Transfer Protocols |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1071.003 |
- Application Layer Protocol |
- Mail Protocols |
- 0 |
- 0 |
- 0 |
- 3 |
- 3 |
-
-
- T1071.004 |
- Application Layer Protocol |
- DNS |
- 0 |
- 17 |
- 0 |
- 4 |
- 21 |
-
-
- T1072 |
- Software Deployment Tools |
- n/a |
- 0 |
- 3 |
- 0 |
- 2 |
- 5 |
-
-
- T1074 |
- Data Staged |
- n/a |
- 0 |
- 2 |
- 2 |
- 1 |
- 5 |
-
-
- T1074.001 |
- Data Staged |
- Local Data Staging |
- 0 |
- 4 |
- 0 |
- 0 |
- 4 |
-
-
- T1074.002 |
- Data Staged |
- Remote Data Staging |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1078 |
- Valid Accounts |
- n/a |
- 0 |
- 42 |
- 40 |
- 51 |
- 133 |
-
-
- T1078.001 |
- Valid Accounts |
- Default Accounts |
- 0 |
- 1 |
- 2 |
- 8 |
- 11 |
-
-
- T1078.002 |
- Valid Accounts |
- Domain Accounts |
- 5 |
- 1 |
- 2 |
- 6 |
- 14 |
-
-
- T1078.003 |
- Valid Accounts |
- Local Accounts |
- 5 |
- 1 |
- 5 |
- 2 |
- 13 |
-
-
- T1078.004 |
- Valid Accounts |
- Cloud Accounts |
- 0 |
- 3 |
- 1 |
- 28 |
- 32 |
-
-
- T1080 |
- Taint Shared Content |
- n/a |
- 0 |
- 0 |
- 2 |
- 0 |
- 2 |
-
-
- T1082 |
- System Information Discovery |
- n/a |
- 2 |
- 14 |
- 7 |
- 5 |
- 28 |
-
-
- T1083 |
- File and Directory Discovery |
- n/a |
- 0 |
- 12 |
- 2 |
- 1 |
- 15 |
-
-
- T1087 |
- Account Discovery |
- n/a |
- 0 |
- 12 |
- 4 |
- 27 |
- 43 |
-
-
- T1087.001 |
- Account Discovery |
- Local Account |
- 2 |
- 11 |
- 0 |
- 11 |
- 24 |
-
-
- T1087.002 |
- Account Discovery |
- Domain Account |
- 2 |
- 15 |
- 1 |
- 19 |
- 37 |
-
-
- T1087.003 |
- Account Discovery |
- Email Account |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1087.004 |
- Account Discovery |
- Cloud Account |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1090 |
- Proxy |
- n/a |
- 0 |
- 11 |
- 1 |
- 3 |
- 15 |
-
-
- T1090.001 |
- Proxy |
- Internal Proxy |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1090.002 |
- Proxy |
- External Proxy |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1090.003 |
- Proxy |
- Multi-hop Proxy |
- 0 |
- 2 |
- 1 |
- 0 |
- 3 |
-
-
- T1090.004 |
- Proxy |
- Domain Fronting |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1091 |
- Replication Through Removable Media |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1092 |
- Communication Through Removable Media |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1095 |
- Non-Application Layer Protocol |
- n/a |
- 0 |
- 4 |
- 1 |
- 2 |
- 7 |
-
-
- T1098 |
- Account Manipulation |
- n/a |
- 1 |
- 22 |
- 35 |
- 10 |
- 68 |
-
-
- T1098.001 |
- Account Manipulation |
- Additional Cloud Credentials |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1098.002 |
- Account Manipulation |
- Additional Email Delegate Permissions |
- 0 |
- 0 |
- 2 |
- 0 |
- 2 |
-
-
- T1098.003 |
- Account Manipulation |
- Additional Cloud Roles |
- 0 |
- 1 |
- 3 |
- 2 |
- 6 |
-
-
- T1098.004 |
- Account Manipulation |
- SSH Authorized Keys |
- 0 |
- 0 |
- 1 |
- 3 |
- 4 |
-
-
- T1098.005 |
- Account Manipulation |
- Device Registration |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1102 |
- Web Service |
- n/a |
- 0 |
- 3 |
- 1 |
- 2 |
- 6 |
-
-
- T1102.001 |
- Web Service |
- Dead Drop Resolver |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1102.002 |
- Web Service |
- Bidirectional Communication |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1102.003 |
- Web Service |
- One-Way Communication |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1104 |
- Multi-Stage Channels |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1105 |
- Ingress Tool Transfer |
- n/a |
- 4 |
- 47 |
- 9 |
- 23 |
- 83 |
-
-
- T1106 |
- Native API |
- n/a |
- 0 |
- 12 |
- 6 |
- 0 |
- 18 |
-
-
- T1108 |
- Redundant Access |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1110 |
- Brute Force |
- n/a |
- 0 |
- 10 |
- 19 |
- 25 |
- 54 |
-
-
- T1110.001 |
- Brute Force |
- Password Guessing |
- 0 |
- 3 |
- 6 |
- 3 |
- 12 |
-
-
- T1110.002 |
- Brute Force |
- Password Cracking |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1110.003 |
- Brute Force |
- Password Spraying |
- 0 |
- 8 |
- 6 |
- 15 |
- 29 |
-
-
- T1110.004 |
- Brute Force |
- Credential Stuffing |
- 0 |
- 0 |
- 0 |
- 5 |
- 5 |
-
-
- T1111 |
- Multi-Factor Authentication Interception |
- n/a |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1112 |
- Modify Registry |
- n/a |
- 8 |
- 62 |
- 5 |
- 25 |
- 100 |
-
-
- T1113 |
- Screen Capture |
- n/a |
- 0 |
- 6 |
- 1 |
- 3 |
- 10 |
-
-
- T1114 |
- Email Collection |
- n/a |
- 0 |
- 4 |
- 3 |
- 8 |
- 15 |
-
-
- T1114.001 |
- Email Collection |
- Local Email Collection |
- 0 |
- 1 |
- 0 |
- 2 |
- 3 |
-
-
- T1114.002 |
- Email Collection |
- Remote Email Collection |
- 0 |
- 0 |
- 1 |
- 3 |
- 4 |
-
-
- T1114.003 |
- Email Collection |
- Email Forwarding Rule |
- 0 |
- 0 |
- 1 |
- 2 |
- 3 |
-
-
- T1115 |
- Clipboard Data |
- n/a |
- 0 |
- 6 |
- 0 |
- 2 |
- 8 |
-
-
- T1119 |
- Automated Collection |
- n/a |
- 0 |
- 5 |
- 0 |
- 0 |
- 5 |
-
-
- T1120 |
- Peripheral Device Discovery |
- n/a |
- 0 |
- 2 |
- 1 |
- 0 |
- 3 |
-
-
- T1123 |
- Audio Capture |
- n/a |
- 0 |
- 6 |
- 1 |
- 0 |
- 7 |
-
-
- T1124 |
- System Time Discovery |
- n/a |
- 0 |
- 3 |
- 0 |
- 1 |
- 4 |
-
-
- T1125 |
- Video Capture |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1127 |
- Trusted Developer Utilities Proxy Execution |
- n/a |
- 0 |
- 17 |
- 8 |
- 9 |
- 34 |
-
-
- T1127.001 |
- Trusted Developer Utilities Proxy Execution |
- MSBuild |
- 1 |
- 1 |
- 3 |
- 6 |
- 11 |
-
-
- T1129 |
- Shared Modules |
- n/a |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1132 |
- Data Encoding |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1132.001 |
- Data Encoding |
- Standard Encoding |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1132.002 |
- Data Encoding |
- Non-Standard Encoding |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1133 |
- External Remote Services |
- n/a |
- 0 |
- 7 |
- 5 |
- 0 |
- 12 |
-
-
- T1134 |
- Access Token Manipulation |
- n/a |
- 0 |
- 0 |
- 12 |
- 5 |
- 17 |
-
-
- T1134.001 |
- Access Token Manipulation |
- Token Impersonation/Theft |
- 0 |
- 7 |
- 1 |
- 3 |
- 11 |
-
-
- T1134.002 |
- Access Token Manipulation |
- Create Process with Token |
- 0 |
- 5 |
- 3 |
- 1 |
- 9 |
-
-
- T1134.003 |
- Access Token Manipulation |
- Make and Impersonate Token |
- 0 |
- 1 |
- 1 |
- 0 |
- 2 |
-
-
- T1134.004 |
- Access Token Manipulation |
- Parent PID Spoofing |
- 0 |
- 1 |
- 2 |
- 1 |
- 4 |
-
-
- T1134.005 |
- Access Token Manipulation |
- SID-History Injection |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1135 |
- Network Share Discovery |
- n/a |
- 0 |
- 7 |
- 3 |
- 0 |
- 10 |
-
-
- T1136 |
- Create Account |
- n/a |
- 0 |
- 1 |
- 7 |
- 14 |
- 22 |
-
-
- T1136.001 |
- Create Account |
- Local Account |
- 1 |
- 12 |
- 2 |
- 5 |
- 20 |
-
-
- T1136.002 |
- Create Account |
- Domain Account |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1136.003 |
- Create Account |
- Cloud Account |
- 0 |
- 2 |
- 2 |
- 10 |
- 14 |
-
-
- T1137 |
- Office Application Startup |
- n/a |
- 0 |
- 6 |
- 2 |
- 0 |
- 8 |
-
-
- T1137.001 |
- Office Application Startup |
- Office Template Macros |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1137.002 |
- Office Application Startup |
- Office Test |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1137.003 |
- Office Application Startup |
- Outlook Forms |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1137.004 |
- Office Application Startup |
- Outlook Home Page |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1137.005 |
- Office Application Startup |
- Outlook Rules |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1137.006 |
- Office Application Startup |
- Add-ins |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1140 |
- Deobfuscate/Decode Files or Information |
- n/a |
- 1 |
- 13 |
- 6 |
- 2 |
- 22 |
-
-
- T1149 |
- LC_MAIN Hijacking |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1153 |
- Source |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1175 |
- Component Object Model and Distributed COM |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1176 |
- Browser Extensions |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1185 |
- Browser Session Hijacking |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1187 |
- Forced Authentication |
- n/a |
- 1 |
- 3 |
- 0 |
- 1 |
- 5 |
-
-
- T1189 |
- Drive-by Compromise |
- n/a |
- 0 |
- 2 |
- 1 |
- 5 |
- 8 |
-
-
- T1190 |
- Exploit Public-Facing Application |
- n/a |
- 0 |
- 74 |
- 15 |
- 31 |
- 120 |
-
-
- T1195 |
- Supply Chain Compromise |
- n/a |
- 0 |
- 1 |
- 4 |
- 3 |
- 8 |
-
-
- T1195.001 |
- Supply Chain Compromise |
- Compromise Software Dependencies and Development Tools |
- 0 |
- 1 |
- 0 |
- 2 |
- 3 |
-
-
- T1195.002 |
- Supply Chain Compromise |
- Compromise Software Supply Chain |
- 0 |
- 0 |
- 4 |
- 1 |
- 5 |
-
-
- T1195.003 |
- Supply Chain Compromise |
- Compromise Hardware Supply Chain |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1197 |
- BITS Jobs |
- n/a |
- 2 |
- 16 |
- 1 |
- 6 |
- 25 |
-
-
- T1199 |
- Trusted Relationship |
- n/a |
- 0 |
- 1 |
- 0 |
- 2 |
- 3 |
-
-
- T1200 |
- Hardware Additions |
- n/a |
- 0 |
- 2 |
- 0 |
- 5 |
- 7 |
-
-
- T1201 |
- Password Policy Discovery |
- n/a |
- 0 |
- 4 |
- 0 |
- 7 |
- 11 |
-
-
- T1202 |
- Indirect Command Execution |
- n/a |
- 0 |
- 28 |
- 0 |
- 4 |
- 32 |
-
-
- T1203 |
- Exploitation for Client Execution |
- n/a |
- 0 |
- 21 |
- 2 |
- 4 |
- 27 |
-
-
- T1204 |
- User Execution |
- n/a |
- 0 |
- 8 |
- 7 |
- 15 |
- 30 |
-
-
- T1204.001 |
- User Execution |
- Malicious Link |
- 0 |
- 2 |
- 0 |
- 1 |
- 3 |
-
-
- T1204.002 |
- User Execution |
- Malicious File |
- 1 |
- 26 |
- 3 |
- 4 |
- 34 |
-
-
- T1204.003 |
- User Execution |
- Malicious Image |
- 0 |
- 0 |
- 0 |
- 7 |
- 7 |
-
-
- T1205 |
- Traffic Signaling |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1205.001 |
- Traffic Signaling |
- Port Knocking |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1207 |
- Rogue Domain Controller |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1210 |
- Exploitation of Remote Services |
- n/a |
- 0 |
- 8 |
- 1 |
- 3 |
- 12 |
-
-
- T1211 |
- Exploitation for Defense Evasion |
- n/a |
- 0 |
- 3 |
- 1 |
- 0 |
- 4 |
-
-
- T1212 |
- Exploitation for Credential Access |
- n/a |
- 0 |
- 8 |
- 1 |
- 2 |
- 11 |
-
-
- T1213 |
- Data from Information Repositories |
- n/a |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1213.001 |
- Data from Information Repositories |
- Confluence |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1213.002 |
- Data from Information Repositories |
- Sharepoint |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1213.003 |
- Data from Information Repositories |
- Code Repositories |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1216 |
- System Script Proxy Execution |
- n/a |
- 0 |
- 17 |
- 0 |
- 1 |
- 18 |
-
-
- T1216.001 |
- System Script Proxy Execution |
- PubPrn |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1217 |
- Browser Bookmark Discovery |
- n/a |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1218 |
- System Binary Proxy Execution |
- n/a |
- 0 |
- 94 |
- 18 |
- 70 |
- 182 |
-
-
- T1218.001 |
- System Binary Proxy Execution |
- Compiled HTML File |
- 1 |
- 5 |
- 1 |
- 8 |
- 15 |
-
-
- T1218.002 |
- System Binary Proxy Execution |
- Control Panel |
- 0 |
- 1 |
- 1 |
- 1 |
- 3 |
-
-
- T1218.003 |
- System Binary Proxy Execution |
- CMSTP |
- 1 |
- 7 |
- 0 |
- 3 |
- 11 |
-
-
- T1218.004 |
- System Binary Proxy Execution |
- InstallUtil |
- 0 |
- 0 |
- 1 |
- 9 |
- 10 |
-
-
- T1218.005 |
- System Binary Proxy Execution |
- Mshta |
- 0 |
- 8 |
- 4 |
- 12 |
- 24 |
-
-
- T1218.007 |
- System Binary Proxy Execution |
- Msiexec |
- 0 |
- 9 |
- 0 |
- 9 |
- 18 |
-
-
- T1218.008 |
- System Binary Proxy Execution |
- Odbcconf |
- 0 |
- 1 |
- 0 |
- 4 |
- 5 |
-
-
- T1218.009 |
- System Binary Proxy Execution |
- Regsvcs/Regasm |
- 0 |
- 1 |
- 1 |
- 6 |
- 8 |
-
-
- T1218.010 |
- System Binary Proxy Execution |
- Regsvr32 |
- 2 |
- 16 |
- 2 |
- 6 |
- 26 |
-
-
- T1218.011 |
- System Binary Proxy Execution |
- Rundll32 |
- 1 |
- 32 |
- 3 |
- 16 |
- 52 |
-
-
- T1218.012 |
- System Binary Proxy Execution |
- Verclsid |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1218.013 |
- System Binary Proxy Execution |
- Mavinject |
- 0 |
- 2 |
- 0 |
- 1 |
- 3 |
-
-
- T1218.014 |
- System Binary Proxy Execution |
- MMC |
- 0 |
- 0 |
- 0 |
- 3 |
- 3 |
-
-
- T1219 |
- Remote Access Software |
- n/a |
- 0 |
- 28 |
- 3 |
- 3 |
- 34 |
-
-
- T1220 |
- XSL Script Processing |
- n/a |
- 0 |
- 3 |
- 3 |
- 2 |
- 8 |
-
-
- T1221 |
- Template Injection |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1222 |
- File and Directory Permissions Modification |
- n/a |
- 0 |
- 0 |
- 4 |
- 11 |
- 15 |
-
-
- T1222.001 |
- File and Directory Permissions Modification |
- Windows File and Directory Permissions Modification |
- 1 |
- 4 |
- 0 |
- 2 |
- 7 |
-
-
- T1222.002 |
- File and Directory Permissions Modification |
- Linux and Mac File and Directory Permissions Modification |
- 1 |
- 4 |
- 1 |
- 1 |
- 7 |
-
-
- T1480 |
- Execution Guardrails |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1480.001 |
- Execution Guardrails |
- Environmental Keying |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1482 |
- Domain Trust Discovery |
- n/a |
- 0 |
- 13 |
- 2 |
- 11 |
- 26 |
-
-
- T1484 |
- Domain Policy Modification |
- n/a |
- 0 |
- 2 |
- 4 |
- 2 |
- 8 |
-
-
- T1484.001 |
- Domain Policy Modification |
- Group Policy Modification |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1484.002 |
- Domain Policy Modification |
- Domain Trust Modification |
- 0 |
- 0 |
- 1 |
- 2 |
- 3 |
-
-
- T1485 |
- Data Destruction |
- n/a |
- 0 |
- 10 |
- 8 |
- 19 |
- 37 |
-
-
- T1486 |
- Data Encrypted for Impact |
- n/a |
- 0 |
- 10 |
- 1 |
- 7 |
- 18 |
-
-
- T1489 |
- Service Stop |
- n/a |
- 0 |
- 7 |
- 6 |
- 14 |
- 27 |
-
-
- T1490 |
- Inhibit System Recovery |
- n/a |
- 2 |
- 18 |
- 6 |
- 12 |
- 38 |
-
-
- T1491 |
- Defacement |
- n/a |
- 0 |
- 0 |
- 0 |
- 2 |
- 2 |
-
-
- T1491.001 |
- Defacement |
- Internal Defacement |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1491.002 |
- Defacement |
- External Defacement |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1495 |
- Firmware Corruption |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1496 |
- Resource Hijacking |
- n/a |
- 0 |
- 4 |
- 1 |
- 0 |
- 5 |
-
-
- T1497 |
- Virtualization/Sandbox Evasion |
- n/a |
- 0 |
- 0 |
- 1 |
- 1 |
- 2 |
-
-
- T1497.001 |
- Virtualization/Sandbox Evasion |
- System Checks |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1497.002 |
- Virtualization/Sandbox Evasion |
- User Activity Based Checks |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1497.003 |
- Virtualization/Sandbox Evasion |
- Time Based Evasion |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1498 |
- Network Denial of Service |
- n/a |
- 0 |
- 0 |
- 1 |
- 7 |
- 8 |
-
-
- T1498.001 |
- Network Denial of Service |
- Direct Network Flood |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1498.002 |
- Network Denial of Service |
- Reflection Amplification |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1499 |
- Endpoint Denial of Service |
- n/a |
- 0 |
- 1 |
- 1 |
- 1 |
- 3 |
-
-
- T1499.001 |
- Endpoint Denial of Service |
- OS Exhaustion Flood |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1499.002 |
- Endpoint Denial of Service |
- Service Exhaustion Flood |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1499.003 |
- Endpoint Denial of Service |
- Application Exhaustion Flood |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1499.004 |
- Endpoint Denial of Service |
- Application or System Exploitation |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1505 |
- Server Software Component |
- n/a |
- 0 |
- 1 |
- 2 |
- 7 |
- 10 |
-
-
- T1505.001 |
- Server Software Component |
- SQL Stored Procedures |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1505.002 |
- Server Software Component |
- Transport Agent |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1505.003 |
- Server Software Component |
- Web Shell |
- 1 |
- 27 |
- 2 |
- 7 |
- 37 |
-
-
- T1505.004 |
- Server Software Component |
- IIS Components |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1505.005 |
- Server Software Component |
- Terminal Services DLL |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1518 |
- Software Discovery |
- n/a |
- 0 |
- 2 |
- 3 |
- 0 |
- 5 |
-
-
- T1518.001 |
- Software Discovery |
- Security Software Discovery |
- 1 |
- 4 |
- 2 |
- 0 |
- 7 |
-
-
- T1525 |
- Implant Internal Image |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1526 |
- Cloud Service Discovery |
- n/a |
- 0 |
- 2 |
- 1 |
- 7 |
- 10 |
-
-
- T1528 |
- Steal Application Access Token |
- n/a |
- 0 |
- 10 |
- 3 |
- 0 |
- 13 |
-
-
- T1529 |
- System Shutdown/Reboot |
- n/a |
- 0 |
- 6 |
- 0 |
- 3 |
- 9 |
-
-
- T1530 |
- Data from Cloud Storage Object |
- n/a |
- 0 |
- 0 |
- 5 |
- 6 |
- 11 |
-
-
- T1531 |
- Account Access Removal |
- n/a |
- 0 |
- 3 |
- 9 |
- 4 |
- 16 |
-
-
- T1534 |
- Internal Spearphishing |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1535 |
- Unused/Unsupported Cloud Regions |
- n/a |
- 0 |
- 0 |
- 0 |
- 8 |
- 8 |
-
-
- T1537 |
- Transfer Data to Cloud Account |
- n/a |
- 0 |
- 4 |
- 6 |
- 2 |
- 12 |
-
-
- T1538 |
- Cloud Service Dashboard |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1539 |
- Steal Web Session Cookie |
- n/a |
- 0 |
- 2 |
- 3 |
- 0 |
- 5 |
-
-
- T1542 |
- Pre-OS Boot |
- n/a |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1542.001 |
- Pre-OS Boot |
- System Firmware |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1542.002 |
- Pre-OS Boot |
- Component Firmware |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1542.003 |
- Pre-OS Boot |
- Bootkit |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1542.004 |
- Pre-OS Boot |
- ROMMONkit |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1542.005 |
- Pre-OS Boot |
- TFTP Boot |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1543 |
- Create or Modify System Process |
- n/a |
- 0 |
- 9 |
- 28 |
- 16 |
- 53 |
-
-
- T1543.001 |
- Create or Modify System Process |
- Launch Agent |
- 0 |
- 0 |
- 3 |
- 2 |
- 5 |
-
-
- T1543.002 |
- Create or Modify System Process |
- Systemd Service |
- 0 |
- 2 |
- 1 |
- 0 |
- 3 |
-
-
- T1543.003 |
- Create or Modify System Process |
- Windows Service |
- 6 |
- 40 |
- 10 |
- 14 |
- 70 |
-
-
- T1543.004 |
- Create or Modify System Process |
- Launch Daemon |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1546 |
- Event Triggered Execution |
- n/a |
- 0 |
- 9 |
- 15 |
- 15 |
- 39 |
-
-
- T1546.001 |
- Event Triggered Execution |
- Change Default File Association |
- 1 |
- 3 |
- 0 |
- 3 |
- 7 |
-
-
- T1546.002 |
- Event Triggered Execution |
- Screensaver |
- 1 |
- 4 |
- 1 |
- 1 |
- 7 |
-
-
- T1546.003 |
- Event Triggered Execution |
- Windows Management Instrumentation Event Subscription |
- 1 |
- 12 |
- 1 |
- 3 |
- 17 |
-
-
- T1546.004 |
- Event Triggered Execution |
- Unix Shell Configuration Modification |
- 0 |
- 1 |
- 1 |
- 2 |
- 4 |
-
-
- T1546.005 |
- Event Triggered Execution |
- Trap |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1546.006 |
- Event Triggered Execution |
- LC_LOAD_DYLIB Addition |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1546.007 |
- Event Triggered Execution |
- Netsh Helper DLL |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1546.008 |
- Event Triggered Execution |
- Accessibility Features |
- 3 |
- 7 |
- 1 |
- 1 |
- 12 |
-
-
- T1546.009 |
- Event Triggered Execution |
- AppCert DLLs |
- 0 |
- 2 |
- 1 |
- 0 |
- 3 |
-
-
- T1546.010 |
- Event Triggered Execution |
- AppInit DLLs |
- 2 |
- 1 |
- 1 |
- 0 |
- 4 |
-
-
- T1546.011 |
- Event Triggered Execution |
- Application Shimming |
- 0 |
- 2 |
- 2 |
- 3 |
- 7 |
-
-
- T1546.012 |
- Event Triggered Execution |
- Image File Execution Options Injection |
- 0 |
- 2 |
- 1 |
- 2 |
- 5 |
-
-
- T1546.013 |
- Event Triggered Execution |
- PowerShell Profile |
- 0 |
- 3 |
- 1 |
- 0 |
- 4 |
-
-
- T1546.014 |
- Event Triggered Execution |
- Emond |
- 0 |
- 1 |
- 2 |
- 0 |
- 3 |
-
-
- T1546.015 |
- Event Triggered Execution |
- Component Object Model Hijacking |
- 1 |
- 9 |
- 1 |
- 4 |
- 15 |
-
-
- T1547 |
- Boot or Logon Autostart Execution |
- n/a |
- 0 |
- 6 |
- 24 |
- 16 |
- 46 |
-
-
- T1547.001 |
- Boot or Logon Autostart Execution |
- Registry Run Keys / Startup Folder |
- 4 |
- 31 |
- 9 |
- 2 |
- 46 |
-
-
- T1547.002 |
- Boot or Logon Autostart Execution |
- Authentication Package |
- 0 |
- 1 |
- 2 |
- 0 |
- 3 |
-
-
- T1547.003 |
- Boot or Logon Autostart Execution |
- Time Providers |
- 0 |
- 1 |
- 1 |
- 1 |
- 3 |
-
-
- T1547.004 |
- Boot or Logon Autostart Execution |
- Winlogon Helper DLL |
- 2 |
- 3 |
- 0 |
- 0 |
- 5 |
-
-
- T1547.005 |
- Boot or Logon Autostart Execution |
- Security Support Provider |
- 0 |
- 1 |
- 1 |
- 1 |
- 3 |
-
-
- T1547.006 |
- Boot or Logon Autostart Execution |
- Kernel Modules and Extensions |
- 0 |
- 1 |
- 4 |
- 3 |
- 8 |
-
-
- T1547.007 |
- Boot or Logon Autostart Execution |
- Re-opened Applications |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1547.008 |
- Boot or Logon Autostart Execution |
- LSASS Driver |
- 0 |
- 1 |
- 0 |
- 1 |
- 2 |
-
-
- T1547.009 |
- Boot or Logon Autostart Execution |
- Shortcut Modification |
- 0 |
- 4 |
- 0 |
- 0 |
- 4 |
-
-
- T1547.010 |
- Boot or Logon Autostart Execution |
- Port Monitors |
- 1 |
- 4 |
- 1 |
- 1 |
- 7 |
-
-
- T1547.012 |
- Boot or Logon Autostart Execution |
- Print Processors |
- 0 |
- 0 |
- 0 |
- 7 |
- 7 |
-
-
- T1547.013 |
- Boot or Logon Autostart Execution |
- XDG Autostart Entries |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1547.014 |
- Boot or Logon Autostart Execution |
- Active Setup |
- 0 |
- 1 |
- 0 |
- 1 |
- 2 |
-
-
- T1547.015 |
- Boot or Logon Autostart Execution |
- Login Items |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1548 |
- Abuse Elevation Control Mechanism |
- n/a |
- 1 |
- 17 |
- 23 |
- 51 |
- 92 |
-
-
- T1548.001 |
- Abuse Elevation Control Mechanism |
- Setuid and Setgid |
- 0 |
- 1 |
- 2 |
- 3 |
- 6 |
-
-
- T1548.002 |
- Abuse Elevation Control Mechanism |
- Bypass User Account Control |
- 3 |
- 48 |
- 11 |
- 13 |
- 75 |
-
-
- T1548.003 |
- Abuse Elevation Control Mechanism |
- Sudo and Sudo Caching |
- 0 |
- 2 |
- 4 |
- 32 |
- 38 |
-
-
- T1548.004 |
- Abuse Elevation Control Mechanism |
- Elevated Execution with Prompt |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1550 |
- Use Alternate Authentication Material |
- n/a |
- 0 |
- 3 |
- 6 |
- 9 |
- 18 |
-
-
- T1550.001 |
- Use Alternate Authentication Material |
- Application Access Token |
- 0 |
- 3 |
- 5 |
- 0 |
- 8 |
-
-
- T1550.002 |
- Use Alternate Authentication Material |
- Pass the Hash |
- 1 |
- 5 |
- 0 |
- 3 |
- 9 |
-
-
- T1550.003 |
- Use Alternate Authentication Material |
- Pass the Ticket |
- 0 |
- 3 |
- 1 |
- 3 |
- 7 |
-
-
- T1550.004 |
- Use Alternate Authentication Material |
- Web Session Cookie |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1552 |
- Unsecured Credentials |
- n/a |
- 0 |
- 5 |
- 7 |
- 5 |
- 17 |
-
-
- T1552.001 |
- Unsecured Credentials |
- Credentials In Files |
- 1 |
- 14 |
- 2 |
- 1 |
- 18 |
-
-
- T1552.002 |
- Unsecured Credentials |
- Credentials in Registry |
- 1 |
- 3 |
- 0 |
- 3 |
- 7 |
-
-
- T1552.003 |
- Unsecured Credentials |
- Bash History |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1552.004 |
- Unsecured Credentials |
- Private Keys |
- 0 |
- 5 |
- 1 |
- 1 |
- 7 |
-
-
- T1552.005 |
- Unsecured Credentials |
- Cloud Instance Metadata API |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1552.006 |
- Unsecured Credentials |
- Group Policy Preferences |
- 0 |
- 4 |
- 0 |
- 0 |
- 4 |
-
-
- T1552.007 |
- Unsecured Credentials |
- Container API |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1553 |
- Subvert Trust Controls |
- n/a |
- 0 |
- 2 |
- 5 |
- 2 |
- 9 |
-
-
- T1553.001 |
- Subvert Trust Controls |
- Gatekeeper Bypass |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1553.002 |
- Subvert Trust Controls |
- Code Signing |
- 0 |
- 1 |
- 1 |
- 0 |
- 2 |
-
-
- T1553.003 |
- Subvert Trust Controls |
- SIP and Trust Provider Hijacking |
- 0 |
- 1 |
- 1 |
- 0 |
- 2 |
-
-
- T1553.004 |
- Subvert Trust Controls |
- Install Root Certificate |
- 1 |
- 5 |
- 2 |
- 2 |
- 10 |
-
-
- T1553.005 |
- Subvert Trust Controls |
- Mark-of-the-Web Bypass |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1553.006 |
- Subvert Trust Controls |
- Code Signing Policy Modification |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1554 |
- Compromise Client Software Binary |
- n/a |
- 0 |
- 3 |
- 2 |
- 2 |
- 7 |
-
-
- T1555 |
- Credentials from Password Stores |
- n/a |
- 0 |
- 4 |
- 9 |
- 4 |
- 17 |
-
-
- T1555.001 |
- Credentials from Password Stores |
- Keychain |
- 0 |
- 1 |
- 4 |
- 0 |
- 5 |
-
-
- T1555.002 |
- Credentials from Password Stores |
- Securityd Memory |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1555.003 |
- Credentials from Password Stores |
- Credentials from Web Browsers |
- 0 |
- 2 |
- 2 |
- 3 |
- 7 |
-
-
- T1555.004 |
- Credentials from Password Stores |
- Windows Credential Manager |
- 0 |
- 4 |
- 2 |
- 0 |
- 6 |
-
-
- T1555.005 |
- Credentials from Password Stores |
- Password Managers |
- 0 |
- 1 |
- 0 |
- 1 |
- 2 |
-
-
- T1556 |
- Modify Authentication Process |
- n/a |
- 0 |
- 2 |
- 9 |
- 5 |
- 16 |
-
-
- T1556.001 |
- Modify Authentication Process |
- Domain Controller Authentication |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1556.002 |
- Modify Authentication Process |
- Password Filter DLL |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1556.003 |
- Modify Authentication Process |
- Pluggable Authentication Modules |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1556.004 |
- Modify Authentication Process |
- Network Device Authentication |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1556.005 |
- Modify Authentication Process |
- Reversible Encryption |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1557 |
- Adversary-in-the-Middle |
- n/a |
- 0 |
- 1 |
- 0 |
- 4 |
- 5 |
-
-
- T1557.001 |
- Adversary-in-the-Middle |
- LLMNR/NBT-NS Poisoning and SMB Relay |
- 0 |
- 7 |
- 0 |
- 0 |
- 7 |
-
-
- T1557.002 |
- Adversary-in-the-Middle |
- ARP Cache Poisoning |
- 0 |
- 0 |
- 0 |
- 3 |
- 3 |
-
-
- T1557.003 |
- Adversary-in-the-Middle |
- DHCP Spoofing |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1558 |
- Steal or Forge Kerberos Tickets |
- n/a |
- 0 |
- 3 |
- 9 |
- 18 |
- 30 |
-
-
- T1558.001 |
- Steal or Forge Kerberos Tickets |
- Golden Ticket |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1558.002 |
- Steal or Forge Kerberos Tickets |
- Silver Ticket |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1558.003 |
- Steal or Forge Kerberos Tickets |
- Kerberoasting |
- 0 |
- 11 |
- 1 |
- 8 |
- 20 |
-
-
- T1558.004 |
- Steal or Forge Kerberos Tickets |
- AS-REP Roasting |
- 0 |
- 0 |
- 0 |
- 7 |
- 7 |
-
-
- T1559 |
- Inter-Process Communication |
- n/a |
- 0 |
- 1 |
- 2 |
- 0 |
- 3 |
-
-
- T1559.001 |
- Inter-Process Communication |
- Component Object Model |
- 0 |
- 4 |
- 1 |
- 1 |
- 6 |
-
-
- T1559.002 |
- Inter-Process Communication |
- Dynamic Data Exchange |
- 1 |
- 1 |
- 0 |
- 0 |
- 2 |
-
-
- T1559.003 |
- Inter-Process Communication |
- XPC Services |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1560 |
- Archive Collected Data |
- n/a |
- 0 |
- 2 |
- 2 |
- 6 |
- 10 |
-
-
- T1560.001 |
- Archive Collected Data |
- Archive via Utility |
- 1 |
- 12 |
- 2 |
- 6 |
- 21 |
-
-
- T1560.002 |
- Archive Collected Data |
- Archive via Library |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1560.003 |
- Archive Collected Data |
- Archive via Custom Method |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1561 |
- Disk Wipe |
- n/a |
- 0 |
- 0 |
- 0 |
- 2 |
- 2 |
-
-
- T1561.001 |
- Disk Wipe |
- Disk Content Wipe |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1561.002 |
- Disk Wipe |
- Disk Structure Wipe |
- 0 |
- 1 |
- 0 |
- 2 |
- 3 |
-
-
- T1562 |
- Impair Defenses |
- n/a |
- 0 |
- 17 |
- 77 |
- 62 |
- 156 |
-
-
- T1562.001 |
- Impair Defenses |
- Disable or Modify Tools |
- 3 |
- 74 |
- 39 |
- 45 |
- 161 |
-
-
- T1562.002 |
- Impair Defenses |
- Disable Windows Event Logging |
- 1 |
- 12 |
- 2 |
- 0 |
- 15 |
-
-
- T1562.003 |
- Impair Defenses |
- Impair Command History Logging |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1562.004 |
- Impair Defenses |
- Disable or Modify System Firewall |
- 0 |
- 13 |
- 4 |
- 5 |
- 22 |
-
-
- T1562.006 |
- Impair Defenses |
- Indicator Blocking |
- 2 |
- 4 |
- 3 |
- 1 |
- 10 |
-
-
- T1562.007 |
- Impair Defenses |
- Disable or Modify Cloud Firewall |
- 0 |
- 0 |
- 3 |
- 6 |
- 9 |
-
-
- T1562.008 |
- Impair Defenses |
- Disable Cloud Logs |
- 0 |
- 0 |
- 0 |
- 6 |
- 6 |
-
-
- T1562.009 |
- Impair Defenses |
- Safe Mode Boot |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1562.010 |
- Impair Defenses |
- Downgrade Attack |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1563 |
- Remote Service Session Hijacking |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1563.001 |
- Remote Service Session Hijacking |
- SSH Hijacking |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1563.002 |
- Remote Service Session Hijacking |
- RDP Hijacking |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1564 |
- Hide Artifacts |
- n/a |
- 0 |
- 6 |
- 7 |
- 1 |
- 14 |
-
-
- T1564.001 |
- Hide Artifacts |
- Hidden Files and Directories |
- 0 |
- 8 |
- 5 |
- 2 |
- 15 |
-
-
- T1564.002 |
- Hide Artifacts |
- Hidden Users |
- 0 |
- 4 |
- 0 |
- 0 |
- 4 |
-
-
- T1564.003 |
- Hide Artifacts |
- Hidden Window |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1564.004 |
- Hide Artifacts |
- NTFS File Attributes |
- 2 |
- 19 |
- 2 |
- 0 |
- 23 |
-
-
- T1564.005 |
- Hide Artifacts |
- Hidden File System |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1564.006 |
- Hide Artifacts |
- Run Virtual Instance |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1564.007 |
- Hide Artifacts |
- VBA Stomping |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1564.008 |
- Hide Artifacts |
- Email Hiding Rules |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1564.009 |
- Hide Artifacts |
- Resource Forking |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1564.010 |
- Hide Artifacts |
- Process Argument Spoofing |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1565 |
- Data Manipulation |
- n/a |
- 0 |
- 3 |
- 3 |
- 0 |
- 6 |
-
-
- T1565.001 |
- Data Manipulation |
- Stored Data Manipulation |
- 0 |
- 3 |
- 3 |
- 0 |
- 6 |
-
-
- T1565.002 |
- Data Manipulation |
- Transmitted Data Manipulation |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1565.003 |
- Data Manipulation |
- Runtime Data Manipulation |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1566 |
- Phishing |
- n/a |
- 0 |
- 9 |
- 17 |
- 33 |
- 59 |
-
-
- T1566.001 |
- Phishing |
- Spearphishing Attachment |
- 0 |
- 15 |
- 11 |
- 29 |
- 55 |
-
-
- T1566.002 |
- Phishing |
- Spearphishing Link |
- 0 |
- 1 |
- 8 |
- 1 |
- 10 |
-
-
- T1566.003 |
- Phishing |
- Spearphishing via Service |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1567 |
- Exfiltration Over Web Service |
- n/a |
- 0 |
- 7 |
- 1 |
- 2 |
- 10 |
-
-
- T1567.001 |
- Exfiltration Over Web Service |
- Exfiltration to Code Repository |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1567.002 |
- Exfiltration Over Web Service |
- Exfiltration to Cloud Storage |
- 0 |
- 7 |
- 0 |
- 1 |
- 8 |
-
-
- T1568 |
- Dynamic Resolution |
- n/a |
- 0 |
- 1 |
- 3 |
- 0 |
- 4 |
-
-
- T1568.001 |
- Dynamic Resolution |
- Fast Flux DNS |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1568.002 |
- Dynamic Resolution |
- Domain Generation Algorithms |
- 0 |
- 2 |
- 3 |
- 1 |
- 6 |
-
-
- T1568.003 |
- Dynamic Resolution |
- DNS Calculation |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1569 |
- System Services |
- n/a |
- 0 |
- 4 |
- 3 |
- 5 |
- 12 |
-
-
- T1569.001 |
- System Services |
- Launchctl |
- 1 |
- 0 |
- 0 |
- 0 |
- 1 |
-
-
- T1569.002 |
- System Services |
- Service Execution |
- 4 |
- 40 |
- 3 |
- 5 |
- 52 |
-
-
- T1570 |
- Lateral Tool Transfer |
- n/a |
- 3 |
- 2 |
- 1 |
- 0 |
- 6 |
-
-
- T1571 |
- Non-Standard Port |
- n/a |
- 0 |
- 3 |
- 1 |
- 0 |
- 4 |
-
-
- T1572 |
- Protocol Tunneling |
- n/a |
- 0 |
- 12 |
- 5 |
- 3 |
- 20 |
-
-
- T1573 |
- Encrypted Channel |
- n/a |
- 0 |
- 4 |
- 1 |
- 2 |
- 7 |
-
-
- T1573.001 |
- Encrypted Channel |
- Symmetric Cryptography |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1573.002 |
- Encrypted Channel |
- Asymmetric Cryptography |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1574 |
- Hijack Execution Flow |
- n/a |
- 0 |
- 8 |
- 9 |
- 11 |
- 28 |
-
-
- T1574.001 |
- Hijack Execution Flow |
- DLL Search Order Hijacking |
- 1 |
- 22 |
- 1 |
- 4 |
- 28 |
-
-
- T1574.002 |
- Hijack Execution Flow |
- DLL Side-Loading |
- 0 |
- 42 |
- 2 |
- 5 |
- 49 |
-
-
- T1574.004 |
- Hijack Execution Flow |
- Dylib Hijacking |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1574.005 |
- Hijack Execution Flow |
- Executable Installer File Permissions Weakness |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1574.006 |
- Hijack Execution Flow |
- Dynamic Linker Hijacking |
- 0 |
- 2 |
- 3 |
- 1 |
- 6 |
-
-
- T1574.007 |
- Hijack Execution Flow |
- Path Interception by PATH Environment Variable |
- 1 |
- 1 |
- 3 |
- 0 |
- 5 |
-
-
- T1574.008 |
- Hijack Execution Flow |
- Path Interception by Search Order Hijacking |
- 1 |
- 1 |
- 0 |
- 0 |
- 2 |
-
-
- T1574.009 |
- Hijack Execution Flow |
- Path Interception by Unquoted Path |
- 2 |
- 0 |
- 0 |
- 1 |
- 3 |
-
-
- T1574.010 |
- Hijack Execution Flow |
- Services File Permissions Weakness |
- 2 |
- 0 |
- 1 |
- 0 |
- 3 |
-
-
- T1574.011 |
- Hijack Execution Flow |
- Services Registry Permissions Weakness |
- 4 |
- 9 |
- 0 |
- 2 |
- 15 |
-
-
- T1574.012 |
- Hijack Execution Flow |
- COR_PROFILER |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1574.013 |
- Hijack Execution Flow |
- KernelCallbackTable |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1578 |
- Modify Cloud Compute Infrastructure |
- n/a |
- 0 |
- 1 |
- 2 |
- 0 |
- 3 |
-
-
- T1578.001 |
- Modify Cloud Compute Infrastructure |
- Create Snapshot |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1578.002 |
- Modify Cloud Compute Infrastructure |
- Create Cloud Instance |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1578.003 |
- Modify Cloud Compute Infrastructure |
- Delete Cloud Instance |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1578.004 |
- Modify Cloud Compute Infrastructure |
- Revert Cloud Instance |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1580 |
- Cloud Infrastructure Discovery |
- n/a |
- 0 |
- 0 |
- 0 |
- 2 |
- 2 |
-
-
- T1583 |
- Acquire Infrastructure |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1583.001 |
- Acquire Infrastructure |
- Domains |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1583.002 |
- Acquire Infrastructure |
- DNS Server |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1583.003 |
- Acquire Infrastructure |
- Virtual Private Server |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1583.004 |
- Acquire Infrastructure |
- Server |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1583.005 |
- Acquire Infrastructure |
- Botnet |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1583.006 |
- Acquire Infrastructure |
- Web Services |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1584 |
- Compromise Infrastructure |
- n/a |
- 0 |
- 2 |
- 0 |
- 0 |
- 2 |
-
-
- T1584.001 |
- Compromise Infrastructure |
- Domains |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1584.002 |
- Compromise Infrastructure |
- DNS Server |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1584.003 |
- Compromise Infrastructure |
- Virtual Private Server |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1584.004 |
- Compromise Infrastructure |
- Server |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1584.005 |
- Compromise Infrastructure |
- Botnet |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1584.006 |
- Compromise Infrastructure |
- Web Services |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1585 |
- Establish Accounts |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1585.001 |
- Establish Accounts |
- Social Media Accounts |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1585.002 |
- Establish Accounts |
- Email Accounts |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1586 |
- Compromise Accounts |
- n/a |
- 0 |
- 0 |
- 0 |
- 26 |
- 26 |
-
-
- T1586.001 |
- Compromise Accounts |
- Social Media Accounts |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1586.002 |
- Compromise Accounts |
- Email Accounts |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1587 |
- Develop Capabilities |
- n/a |
- 0 |
- 5 |
- 0 |
- 0 |
- 5 |
-
-
- T1587.001 |
- Develop Capabilities |
- Malware |
- 0 |
- 10 |
- 0 |
- 0 |
- 10 |
-
-
- T1587.002 |
- Develop Capabilities |
- Code Signing Certificates |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1587.003 |
- Develop Capabilities |
- Digital Certificates |
- 0 |
- 0 |
- 0 |
- 2 |
- 2 |
-
-
- T1587.004 |
- Develop Capabilities |
- Exploits |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1588 |
- Obtain Capabilities |
- n/a |
- 0 |
- 2 |
- 1 |
- 0 |
- 3 |
-
-
- T1588.001 |
- Obtain Capabilities |
- Malware |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1588.002 |
- Obtain Capabilities |
- Tool |
- 0 |
- 7 |
- 0 |
- 2 |
- 9 |
-
-
- T1588.003 |
- Obtain Capabilities |
- Code Signing Certificates |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1588.004 |
- Obtain Capabilities |
- Digital Certificates |
- 0 |
- 0 |
- 0 |
- 2 |
- 2 |
-
-
- T1588.005 |
- Obtain Capabilities |
- Exploits |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1588.006 |
- Obtain Capabilities |
- Vulnerabilities |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1589 |
- Gather Victim Identity Information |
- n/a |
- 0 |
- 1 |
- 0 |
- 2 |
- 3 |
-
-
- T1589.001 |
- Gather Victim Identity Information |
- Credentials |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1589.002 |
- Gather Victim Identity Information |
- Email Addresses |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1589.003 |
- Gather Victim Identity Information |
- Employee Names |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1590 |
- Gather Victim Network Information |
- n/a |
- 0 |
- 2 |
- 0 |
- 2 |
- 4 |
-
-
- T1590.001 |
- Gather Victim Network Information |
- Domain Properties |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1590.002 |
- Gather Victim Network Information |
- DNS |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1590.003 |
- Gather Victim Network Information |
- Network Trust Dependencies |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1590.004 |
- Gather Victim Network Information |
- Network Topology |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1590.005 |
- Gather Victim Network Information |
- IP Addresses |
- 0 |
- 0 |
- 0 |
- 2 |
- 2 |
-
-
- T1590.006 |
- Gather Victim Network Information |
- Network Security Appliances |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1591 |
- Gather Victim Org Information |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1591.001 |
- Gather Victim Org Information |
- Determine Physical Locations |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1591.002 |
- Gather Victim Org Information |
- Business Relationships |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1591.003 |
- Gather Victim Org Information |
- Identify Business Tempo |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1591.004 |
- Gather Victim Org Information |
- Identify Roles |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1592 |
- Gather Victim Host Information |
- n/a |
- 0 |
- 1 |
- 0 |
- 5 |
- 6 |
-
-
- T1592.001 |
- Gather Victim Host Information |
- Hardware |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1592.002 |
- Gather Victim Host Information |
- Software |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1592.003 |
- Gather Victim Host Information |
- Firmware |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1592.004 |
- Gather Victim Host Information |
- Client Configurations |
- 0 |
- 3 |
- 0 |
- 0 |
- 3 |
-
-
- T1593 |
- Search Open Websites/Domains |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1593.001 |
- Search Open Websites/Domains |
- Social Media |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1593.002 |
- Search Open Websites/Domains |
- Search Engines |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1594 |
- Search Victim-Owned Websites |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1595 |
- Active Scanning |
- n/a |
- 0 |
- 0 |
- 0 |
- 1 |
- 1 |
-
-
- T1595.001 |
- Active Scanning |
- Scanning IP Blocks |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1595.002 |
- Active Scanning |
- Vulnerability Scanning |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1595.003 |
- Active Scanning |
- Wordlist Scanning |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1596 |
- Search Open Technical Databases |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1596.001 |
- Search Open Technical Databases |
- DNS/Passive DNS |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1596.002 |
- Search Open Technical Databases |
- WHOIS |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1596.003 |
- Search Open Technical Databases |
- Digital Certificates |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1596.004 |
- Search Open Technical Databases |
- CDNs |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1596.005 |
- Search Open Technical Databases |
- Scan Databases |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1597 |
- Search Closed Sources |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1597.001 |
- Search Closed Sources |
- Threat Intel Vendors |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1597.002 |
- Search Closed Sources |
- Purchase Technical Data |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1598 |
- Phishing for Information |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1598.001 |
- Phishing for Information |
- Spearphishing Service |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1598.002 |
- Phishing for Information |
- Spearphishing Attachment |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1598.003 |
- Phishing for Information |
- Spearphishing Link |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1599 |
- Network Boundary Bridging |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1599.001 |
- Network Boundary Bridging |
- Network Address Translation Traversal |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1600 |
- Weaken Encryption |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1600.001 |
- Weaken Encryption |
- Reduce Key Space |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1600.002 |
- Weaken Encryption |
- Disable Crypto Hardware |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1601 |
- Modify System Image |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1601.001 |
- Modify System Image |
- Patch System Image |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1601.002 |
- Modify System Image |
- Downgrade System Image |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1602 |
- Data from Configuration Repository |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1602.001 |
- Data from Configuration Repository |
- SNMP (MIB Dump) |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1602.002 |
- Data from Configuration Repository |
- Network Device Configuration Dump |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1606 |
- Forge Web Credentials |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1606.001 |
- Forge Web Credentials |
- Web Cookies |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1606.002 |
- Forge Web Credentials |
- SAML Tokens |
- 1 |
- 0 |
- 0 |
- 0 |
- 1 |
-
-
- T1608 |
- Stage Capabilities |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1608.001 |
- Stage Capabilities |
- Upload Malware |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1608.002 |
- Stage Capabilities |
- Upload Tool |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1608.003 |
- Stage Capabilities |
- Install Digital Certificate |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1608.004 |
- Stage Capabilities |
- Drive-by Target |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1608.005 |
- Stage Capabilities |
- Link Target |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1609 |
- Container Administration Command |
- n/a |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1610 |
- Deploy Container |
- n/a |
- 0 |
- 0 |
- 6 |
- 0 |
- 6 |
-
-
- T1611 |
- Escape to Host |
- n/a |
- 0 |
- 0 |
- 6 |
- 0 |
- 6 |
-
-
- T1612 |
- Build Image on Host |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1613 |
- Container and Resource Discovery |
- n/a |
- 0 |
- 0 |
- 2 |
- 0 |
- 2 |
-
-
- T1614 |
- System Location Discovery |
- n/a |
- 0 |
- 0 |
- 1 |
- 0 |
- 1 |
-
-
- T1614.001 |
- System Location Discovery |
- System Language Discovery |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1615 |
- Group Policy Discovery |
- n/a |
- 0 |
- 4 |
- 0 |
- 0 |
- 4 |
-
-
- T1619 |
- Cloud Storage Object Discovery |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1620 |
- Reflective Code Loading |
- n/a |
- 0 |
- 1 |
- 0 |
- 0 |
- 1 |
-
-
- T1621 |
- Multi-Factor Authentication Request Generation |
- n/a |
- 0 |
- 0 |
- 0 |
- 7 |
- 7 |
-
-
- T1622 |
- Debugger Evasion |
- n/a |
- 0 |
- 0 |
- 0 |
- 0 |
- 0 |
-
-
- T1647 |
- Plist File Modification |
- n/a |
- 0 |
- 0 |
- 2 |
- 1 |
- 3 |
-
-
+* A [CSV file](/coverage/analytic_coverage_01_08_2024.csv).
+* Separate ATT&CK Navigator Layers:
+* [CAR Analytic Coverage](https://mitre-attack.github.io/attack-navigator/#layerURL=https://raw.githubusercontent.com/mitre-attack/car/master/docs/coverage/car_analytic_coverage_01_08_2024.json).
+* [Sigma Analytic Coverage](https://mitre-attack.github.io/attack-navigator/#layerURL=https://raw.githubusercontent.com/mitre-attack/car/master/docs/coverage/es_analytic_coverage_01_08_2024.json).
+* [ES Analytic Coverage](https://mitre-attack.github.io/attack-navigator/#layerURL=https://raw.githubusercontent.com/mitre-attack/car/master/docs/coverage/es_analytic_coverage_01_08_2024.json).
+* [Splunk Analytic Coverage](https://mitre-attack.github.io/attack-navigator/#layerURL=https://raw.githubusercontent.com/mitre-attack/car/master/docs/coverage/splunk_analytic_coverage_01_08_2024.json).
+
+
+