ATT&CK Matrix

Enterprise tactics and techniques. Click any technique to view detection rules.

14 Tactics | 216 Techniques | 475 Sub-techniques
defense-evasion
Defense Evasion
47 techniques
T1006
Direct Volume Access
T1014
Rootkit
T1027 17
Obfuscated Files or Information
T1036 12
Masquerading
T1055 12
Process Injection
T1070 10
Indicator Removal
T1078 4
Valid Accounts
T1112
Modify Registry
T1127 3
Trusted Developer Utilities Proxy Execution
T1134 5
Access Token Manipulation
T1140
Deobfuscate/Decode Files or Information
T1197
BITS Jobs
T1202
Indirect Command Execution
T1205 2
Traffic Signaling
T1207
Rogue Domain Controller
T1211
Exploitation for Defense Evasion
T1216 2
System Script Proxy Execution
T1218 14
System Binary Proxy Execution
T1220
XSL Script Processing
T1221
Template Injection
T1222 2
File and Directory Permissions Modification
T1480 2
Execution Guardrails
T1484 2
Domain or Tenant Policy Modification
T1497 3
Virtualization/Sandbox Evasion
T1535
Unused/Unsupported Cloud Regions
T1542 5
Pre-OS Boot
T1548 6
Abuse Elevation Control Mechanism
T1550 4
Use Alternate Authentication Material
T1553 6
Subvert Trust Controls
T1556 9
Modify Authentication Process
T1562 12
Impair Defenses
T1564 14
Hide Artifacts
T1574 12
Hijack Execution Flow
T1578 5
Modify Cloud Compute Infrastructure
T1599 1
Network Boundary Bridging
T1600 2
Weaken Encryption
T1601 2
Modify System Image
T1610
Deploy Container
T1612
Build Image on Host
T1620
Reflective Code Loading
T1622
Debugger Evasion
T1647
Plist File Modification
T1656
Impersonation
T1666
Modify Cloud Resource Hierarchy
T1672
Email Spoofing
T1678
Delay Execution
T1679
Selective Exclusion