Technique Explorer

97 unique MITRE ATT&CK techniques across 78 adversary profiles

97
Unique Techniques
418
Total TTP Uses
14
Tactics Covered
78
Adversary Profiles
Kill-Chain Coverage
Reconnaissance
4
Resource Development
9
Initial Access
63
Execution
47
Persistence
40
Privilege Escalation
53
Defense Evasion
20
Credential Access
13
Discovery
5
Lateral Movement
14
Collection
46
Command and Control
29
Exfiltration
16
Impact
59
Most Prevalent Techniques
1T1134
Access Token ManipulationPrivilege Escalation
30
2T1566.001
Spearphishing AttachmentInitial Access
29
3T1078
Valid AccountsPersistence
26
4T1486
Data Encrypted for ImpactImpact
20
5T1068
Exploitation for Privilege EscalationPrivilege Escalation
17
RECONReconnaissance3 techniques
T1598.003
Spearphishing Link
2×
T1591
Gather Victim Org Information
1×
T1598.001
Spearphishing Service
1×
RESOURCEResource Development5 techniques
T1585.001
Social Media Accounts
2×
T1584.004
Compromise Infrastructure: Server
1×
T1583.004
Server Infrastructure Acquisition
1×
T1585.002
Email Accounts
1×
INIT ACCESSInitial Access9 techniques
EXECExecution7 techniques
PERSISTPersistence6 techniques
PRIV ESCPrivilege Escalation3 techniques
DEF EVASIONDefense Evasion9 techniques
T1027
Obfuscated Files or Information
3×
T1562.001
Disable or Modify Tools
2×
T1036.005
Match Legitimate Name or Location
2×
T1600
Weaken Encryption
1×
T1055
Process Injection
1×
CRED ACCESSCredential Access5 techniques
T1621
Multi-Factor Authentication Request Generation
3×
T1040
Network Sniffing
2×
T1539
Steal Web Session Cookie
2×
T1003
OS Credential Dumping
2×
DISCOVERYDiscovery3 techniques
T1083
File and Directory Discovery
3×
T1087
Account Discovery
1×
T1082
System Information Discovery
1×
LAT MOVELateral Movement5 techniques
T1021.001
Remote Desktop Protocol
5×
T1550.001
Application Access Token
3×
T1534
Internal Spearphishing
1×
COLLECTIONCollection13 techniques
T1213
Data from Information Repositories
5×
T1005
Data from Local System
3×
T1025
Data from Removable Media
2×
T1125
Video Capture
2×
T1119
Automated Collection
1×
T1560.001
Archive via Utility
1×
T1114
Email Collection
1×
T1557
Adversary-in-the-Middle
1×
C2Command and Control9 techniques
EXFILExfiltration5 techniques
T1041
Exfiltration Over C2 Channel
5×
T1048
Exfiltration Over Alternative Protocol
2×
T1567.002
Exfiltration to Cloud Storage
1×
T1020
Automated Exfiltration
1×
IMPACTImpact15 techniques
Data sourced from MITRE ATT&CK. For educational purposes.