Skip to content

Technique Explorer

117 unique MITRE ATT&CK techniques across 106 adversary profiles

117
Unique Techniques
612
Total TTP Uses
14
Tactics Covered
106
Adversary Profiles
Kill-Chain Coverage
Reconnaissance
7
Resource Development
12
Initial Access
95
Execution
66
Persistence
64
Privilege Escalation
53
Defense Evasion
32
Credential Access
22
Discovery
14
Lateral Movement
26
Collection
59
Command and Control
45
Exfiltration
28
Impact
89
Most Prevalent Techniques
1T1078
Valid AccountsPersistence
45
2T1566.001
Spearphishing AttachmentInitial Access
40
3T1134
Access Token ManipulationPrivilege Escalation
30
4T1486
Data Encrypted for ImpactImpact
29
5T1190
Exploit Public-Facing ApplicationInitial Access
24
RECONReconnaissance4 techniques
T1598
Phishing for Information
3×
T1598.003
Spearphishing Link
2×
T1591
Gather Victim Org Information
1×
T1598.001
Spearphishing Service
1×
RESOURCEResource Development7 techniques
T1585.001
Social Media Accounts
2×
T1584.004
Compromise Infrastructure: Server
1×
T1583.004
Server Infrastructure Acquisition
1×
T1585.002
Email Accounts
1×
T1584
Compromise Infrastructure
1×
INIT ACCESSInitial Access13 techniques
EXECExecution8 techniques
PERSISTPersistence6 techniques
PRIV ESCPrivilege Escalation3 techniques
DEF EVASIONDefense Evasion11 techniques
CRED ACCESSCredential Access8 techniques
T1539
Steal Web Session Cookie
4×
T1621
Multi-Factor Authentication Request Generation
3×
T1003
OS Credential Dumping
2×
T1110.004
Credential Stuffing
2×
T1528
Steal Application Access Token
1×
T1110
Brute Force
1×
DISCOVERYDiscovery4 techniques
T1082
System Information Discovery
4×
T1087
Account Discovery
1×
T1057
Process Discovery
1×
LAT MOVELateral Movement5 techniques
COLLECTIONCollection15 techniques
C2Command and Control11 techniques
EXFILExfiltration5 techniques
IMPACTImpact17 techniques
Data sourced from MITRE ATT&CK. For educational purposes.