ATT&CK Matrix
Enterprise tactics and techniques. Click any technique to view detection rules.
14 Tactics | 216 Techniques | 475 Sub-techniques
reconnaissance
Reconnaissance
11 techniques
T1589 3
Gather Victim Identity Information
T1590 6
Gather Victim Network Information
T1591 4
Gather Victim Org Information
T1592 4
Gather Victim Host Information
T1593 3
Search Open Websites/Domains
T1594
Search Victim-Owned Websites
T1595 3
Active Scanning
T1596 5
Search Open Technical Databases
T1597 2
Search Closed Sources
T1598 4
Phishing for Information
T1681
Search Threat Vendor Data
resource-development
Resource Development
8 techniques
T1583 8
Acquire Infrastructure
T1584 8
Compromise Infrastructure
T1585 3
Establish Accounts
T1586 3
Compromise Accounts
T1587 4
Develop Capabilities
T1588 7
Obtain Capabilities
T1608 6
Stage Capabilities
T1650
Acquire Access
initial-access
Initial Access
11 techniques
T1078 4
Valid Accounts
T1091
Replication Through Removable Media
T1133
External Remote Services
T1189
Drive-by Compromise
T1190
Exploit Public-Facing Application
T1195 3
Supply Chain Compromise
T1199
Trusted Relationship
T1200
Hardware Additions
T1566 4
Phishing
T1659
Content Injection
T1669
Wi-Fi Networks
execution
Execution
17 techniques
T1047
Windows Management Instrumentation
T1053 5
Scheduled Task/Job
T1059 13
Command and Scripting Interpreter
T1072
Software Deployment Tools
T1106
Native API
T1129
Shared Modules
T1203
Exploitation for Client Execution
T1204 5
User Execution
T1559 3
Inter-Process Communication
T1569 3
System Services
T1609
Container Administration Command
T1610
Deploy Container
T1648
Serverless Execution
T1651
Cloud Administration Command
T1674
Input Injection
T1675
ESXi Administration Command
T1677
Poisoned Pipeline Execution
persistence
Persistence
23 techniques
T1037 5
Boot or Logon Initialization Scripts
T1053 5
Scheduled Task/Job
T1078 4
Valid Accounts
T1098 7
Account Manipulation
T1112
Modify Registry
T1133
External Remote Services
T1136 3
Create Account
T1137 6
Office Application Startup
T1176 2
Software Extensions
T1197
BITS Jobs
T1205 2
Traffic Signaling
T1505 6
Server Software Component
T1525
Implant Internal Image
T1542 5
Pre-OS Boot
T1543 5
Create or Modify System Process
T1546 18
Event Triggered Execution
T1547 14
Boot or Logon Autostart Execution
T1554
Compromise Host Software Binary
T1556 9
Modify Authentication Process
T1574 12
Hijack Execution Flow
T1653
Power Settings
T1668
Exclusive Control
T1671
Cloud Application Integration
privilege-escalation
Privilege Escalation
14 techniques
T1037 5
Boot or Logon Initialization Scripts
T1053 5
Scheduled Task/Job
T1055 12
Process Injection
T1068
Exploitation for Privilege Escalation
T1078 4
Valid Accounts
T1098 7
Account Manipulation
T1134 5
Access Token Manipulation
T1484 2
Domain or Tenant Policy Modification
T1543 5
Create or Modify System Process
T1546 18
Event Triggered Execution
T1547 14
Boot or Logon Autostart Execution
T1548 6
Abuse Elevation Control Mechanism
T1574 12
Hijack Execution Flow
T1611
Escape to Host
defense-evasion
Defense Evasion
47 techniques
T1006
Direct Volume Access
T1014
Rootkit
T1027 17
Obfuscated Files or Information
T1036 12
Masquerading
T1055 12
Process Injection
T1070 10
Indicator Removal
T1078 4
Valid Accounts
T1112
Modify Registry
T1127 3
Trusted Developer Utilities Proxy Execution
T1134 5
Access Token Manipulation
T1140
Deobfuscate/Decode Files or Information
T1197
BITS Jobs
T1202
Indirect Command Execution
T1205 2
Traffic Signaling
T1207
Rogue Domain Controller
T1211
Exploitation for Defense Evasion
T1216 2
System Script Proxy Execution
T1218 14
System Binary Proxy Execution
T1220
XSL Script Processing
T1221
Template Injection
T1222 2
File and Directory Permissions Modification
T1480 2
Execution Guardrails
T1484 2
Domain or Tenant Policy Modification
T1497 3
Virtualization/Sandbox Evasion
T1535
Unused/Unsupported Cloud Regions
T1542 5
Pre-OS Boot
T1548 6
Abuse Elevation Control Mechanism
T1550 4
Use Alternate Authentication Material
T1553 6
Subvert Trust Controls
T1556 9
Modify Authentication Process
T1562 12
Impair Defenses
T1564 14
Hide Artifacts
T1574 12
Hijack Execution Flow
T1578 5
Modify Cloud Compute Infrastructure
T1599 1
Network Boundary Bridging
T1600 2
Weaken Encryption
T1601 2
Modify System Image
T1610
Deploy Container
T1612
Build Image on Host
T1620
Reflective Code Loading
T1622
Debugger Evasion
T1647
Plist File Modification
T1656
Impersonation
T1666
Modify Cloud Resource Hierarchy
T1672
Email Spoofing
T1678
Delay Execution
T1679
Selective Exclusion
credential-access
Credential Access
17 techniques
T1003 8
OS Credential Dumping
T1040
Network Sniffing
T1056 4
Input Capture
T1110 4
Brute Force
T1111
Multi-Factor Authentication Interception
T1187
Forced Authentication
T1212
Exploitation for Credential Access
T1528
Steal Application Access Token
T1539
Steal Web Session Cookie
T1552 8
Unsecured Credentials
T1555 6
Credentials from Password Stores
T1556 9
Modify Authentication Process
T1557 4
Adversary-in-the-Middle
T1558 5
Steal or Forge Kerberos Tickets
T1606 2
Forge Web Credentials
T1621
Multi-Factor Authentication Request Generation
T1649
Steal or Forge Authentication Certificates
discovery
Discovery
34 techniques
T1007
System Service Discovery
T1010
Application Window Discovery
T1012
Query Registry
T1016 2
System Network Configuration Discovery
T1018
Remote System Discovery
T1033
System Owner/User Discovery
T1040
Network Sniffing
T1046
Network Service Discovery
T1049
System Network Connections Discovery
T1057
Process Discovery
T1069 3
Permission Groups Discovery
T1082
System Information Discovery
T1083
File and Directory Discovery
T1087 4
Account Discovery
T1120
Peripheral Device Discovery
T1124
System Time Discovery
T1135
Network Share Discovery
T1201
Password Policy Discovery
T1217
Browser Information Discovery
T1482
Domain Trust Discovery
T1497 3
Virtualization/Sandbox Evasion
T1518 2
Software Discovery
T1526
Cloud Service Discovery
T1538
Cloud Service Dashboard
T1580
Cloud Infrastructure Discovery
T1613
Container and Resource Discovery
T1614 1
System Location Discovery
T1615
Group Policy Discovery
T1619
Cloud Storage Object Discovery
T1622
Debugger Evasion
T1652
Device Driver Discovery
T1654
Log Enumeration
T1673
Virtual Machine Discovery
T1680
Local Storage Discovery
lateral-movement
Lateral Movement
9 techniques
T1021 8
Remote Services
T1072
Software Deployment Tools
T1080
Taint Shared Content
T1091
Replication Through Removable Media
T1210
Exploitation of Remote Services
T1534
Internal Spearphishing
T1550 4
Use Alternate Authentication Material
T1563 2
Remote Service Session Hijacking
T1570
Lateral Tool Transfer
collection
Collection
17 techniques
T1005
Data from Local System
T1025
Data from Removable Media
T1039
Data from Network Shared Drive
T1056 4
Input Capture
T1074 2
Data Staged
T1113
Screen Capture
T1114 3
Email Collection
T1115
Clipboard Data
T1119
Automated Collection
T1123
Audio Capture
T1125
Video Capture
T1185
Browser Session Hijacking
T1213 6
Data from Information Repositories
T1530
Data from Cloud Storage
T1557 4
Adversary-in-the-Middle
T1560 3
Archive Collected Data
T1602 2
Data from Configuration Repository
command-and-control
Command and Control
18 techniques
T1001 3
Data Obfuscation
T1008
Fallback Channels
T1071 5
Application Layer Protocol
T1090 4
Proxy
T1092
Communication Through Removable Media
T1095
Non-Application Layer Protocol
T1102 3
Web Service
T1104
Multi-Stage Channels
T1105
Ingress Tool Transfer
T1132 2
Data Encoding
T1205 2
Traffic Signaling
T1219 3
Remote Access Tools
T1568 3
Dynamic Resolution
T1571
Non-Standard Port
T1572
Protocol Tunneling
T1573 2
Encrypted Channel
T1659
Content Injection
T1665
Hide Infrastructure
exfiltration
Exfiltration
9 techniques
T1011 1
Exfiltration Over Other Network Medium
T1020 1
Automated Exfiltration
T1029
Scheduled Transfer
T1030
Data Transfer Size Limits
T1041
Exfiltration Over C2 Channel
T1048 3
Exfiltration Over Alternative Protocol
T1052 1
Exfiltration Over Physical Medium
T1537
Transfer Data to Cloud Account
T1567 4
Exfiltration Over Web Service
impact
Impact
15 techniques
T1485 1
Data Destruction
T1486
Data Encrypted for Impact
T1489
Service Stop
T1490
Inhibit System Recovery
T1491 2
Defacement
T1495
Firmware Corruption
T1496 4
Resource Hijacking
T1498 2
Network Denial of Service
T1499 4
Endpoint Denial of Service
T1529
System Shutdown/Reboot
T1531
Account Access Removal
T1561 2
Disk Wipe
T1565 3
Data Manipulation
T1657
Financial Theft
T1667
Email Bombing