MITRE ATT&CK Coverage by Technique
(listed alphabetically)
Technique | ||||||||||||
Access Token Manipulation | X | X | ||||||||||
Accessibility Features | X | X | ||||||||||
Account Discovery | X | |||||||||||
Account Manipulation | X | X | ||||||||||
AppCert DLLs | X | X | ||||||||||
AppInit DLLs | X | X | ||||||||||
Application Shimming | X | X | ||||||||||
Application Window Discovery | X | |||||||||||
Audio Capture | X | |||||||||||
Authentication Package | X | |||||||||||
Automated Collection | X | |||||||||||
Binary Padding | X | |||||||||||
BITS Jobs | X | X | ||||||||||
Bootkit | X | |||||||||||
Browser Extensions | X | |||||||||||
Brute Force | X | |||||||||||
Bypass User Account Control | X | X | ||||||||||
Change Default File Association | X | |||||||||||
Clipboard Data | X | |||||||||||
CMSTP | X | X | ||||||||||
Code Signing | X | |||||||||||
Command-Line Interface | X | |||||||||||
Commonly Used Port | X | |||||||||||
Communication Through Removable Media | X | |||||||||||
Compile After Delivery | X | |||||||||||
Compiled HTML File | X | X | ||||||||||
Component Object Model Hijacking | X | X | ||||||||||
Connection Proxy | X | |||||||||||
Control Panel Items | X | X | ||||||||||
Create Account | X | |||||||||||
Credential Dumping | X | |||||||||||
Credentials in Files | X | |||||||||||
Credentials in Registry | X | |||||||||||
Custom Command and Control Protocol | X | |||||||||||
Data Compressed | X | |||||||||||
Data Destruction | X | |||||||||||
Data Encoding | X | |||||||||||
Data Encrypted for Impact | X | |||||||||||
Data from Local System | X | |||||||||||
Data from Network Shared Drive | X | |||||||||||
Data from Removable Media | X | |||||||||||
Data Obfuscation | X | |||||||||||
Data Staged | X | |||||||||||
Data Transfer Size Limits | X | |||||||||||
DCShadow | X | |||||||||||
Deobfuscate/Decode Files or Information | X | |||||||||||
Disabling Security Tools | X | |||||||||||
Disk Content Wipe | X | |||||||||||
Disk Structure Wipe | X | |||||||||||
DLL Search Order Hijacking | X | X | ||||||||||
DLL Side-Loading | X | |||||||||||
Domain Generation Algorithms | X | |||||||||||
Domain Trust Discovery | X | |||||||||||
Drive-by Compromise | X | |||||||||||
Dynamic Data Exchange | X | |||||||||||
Email Collection | X | |||||||||||
Execution through API | X | |||||||||||
Execution through Module Load | X | |||||||||||
Exfiltration Over Alternative Protocol | X | |||||||||||
Exfiltration Over Command and Control Channel | X | |||||||||||
Exfiltration Over Other Network Medium | X | |||||||||||
Exfiltration Over Physical Medium | X | |||||||||||
Exploit Public-Facing Application | X | |||||||||||
Exploitation for Client Execution | X | |||||||||||
Exploitation for Credential Access | X | |||||||||||
Exploitation for Defense Evasion | X | |||||||||||
Exploitation for Privilege Escalation | X | |||||||||||
Exploitation of Remote Services | X | |||||||||||
External Remote Services | X | X | ||||||||||
Extra Window Memory Injection | X | |||||||||||
Fallback Channels | X | |||||||||||
File and Directory Discovery | X | |||||||||||
File Deletion | X | |||||||||||
Forced Authentication | X | |||||||||||
Group Policy Modification | X | |||||||||||
Hardware Additions | X | |||||||||||
Hidden Files and Directories | X | X | ||||||||||
Hooking | X | X | X | |||||||||
Hypervisor | X | |||||||||||
Image File Execution Options Injection | X | X | X | |||||||||
Indicator Blocking | X | |||||||||||
Indicator Removal on Host | X | |||||||||||
Indirect Command Execution | X | |||||||||||
Inhibit System Recovery | X | |||||||||||
Input Capture | X | X | ||||||||||
Input Prompt | X | |||||||||||
Install Root Certificate | X | |||||||||||
InstallUtil | X | X | ||||||||||
Kerberoasting | X | |||||||||||
LLMNR/NBT-NS Poisoning and Relay | X | |||||||||||
Logon Scripts | X | X | ||||||||||
LSASS Driver | X | X | ||||||||||
Masquerading | X | |||||||||||
Modify Existing Service | X | |||||||||||
Modify Registry | X | |||||||||||
Mshta | X | X | ||||||||||
Multi-hop Proxy | X | |||||||||||
Multi-Stage Channels | X | |||||||||||
Network Service Scanning | X | |||||||||||
Network Share Connection Removal | X | |||||||||||
Network Share Discovery | X | |||||||||||
Network Sniffing | X | X | ||||||||||
New Service | X | X | ||||||||||
NTFS File Attributes | X | |||||||||||
Obfuscated Files or Information | X | |||||||||||
Office Application Startup | X | |||||||||||
Pass the Hash | X | |||||||||||
Pass the Ticket | X | |||||||||||
Password Policy Discovery | X | |||||||||||
Path Interception | X | X | ||||||||||
Peripheral Device Discovery | X | |||||||||||
Permission Groups Discovery | X | |||||||||||
Port Monitors | X | X | ||||||||||
PowerShell | X | |||||||||||
Private Keys | X | |||||||||||
Process Discovery | X | |||||||||||
Process Injection | X | X | ||||||||||
Query Registry | X | |||||||||||
Registry Run Keys / Startup Folder | X | |||||||||||
Regsvcs/Regasm | X | X | ||||||||||
Regsvr32 | X | X | ||||||||||
Remote Access Tools | X | |||||||||||
Remote Desktop Protocol | X | |||||||||||
Remote File Copy | X | X | ||||||||||
Remote Services | X | |||||||||||
Remote System Discovery | X | |||||||||||
Replication Through Removable Media | X | X | ||||||||||
Rundll32 | X | X | ||||||||||
Scheduled Task | X | X | X | |||||||||
Scheduled Transfer | X | |||||||||||
Screensaver | X | |||||||||||
Scripting | X | X | ||||||||||
Security Software Discovery | X | |||||||||||
Security Support Provider | X | |||||||||||
Service Execution | X | |||||||||||
Service Stop | X | |||||||||||
Signed Binary Proxy Execution | X | X | ||||||||||
Signed Script Proxy Execution | X | X | ||||||||||
Spearphishing Attachment | X | |||||||||||
Spearphishing Link | X | |||||||||||
Standard Application Layer Protocol | X | |||||||||||
Standard Non-Application Layer Protocol | X | |||||||||||
Stored Data Manipulation | X | |||||||||||
System Information Discovery | X | |||||||||||
System Network Configuration Discovery | X | |||||||||||
System Network Connections Discovery | X | |||||||||||
System Owner/User Discovery | X | |||||||||||
System Service Discovery | X | |||||||||||
System Time Discovery | X | |||||||||||
Third-party Software | X | X | ||||||||||
Timestomp | X | |||||||||||
Trusted Developer Utilities | X | X | ||||||||||
Trusted Relationship | X | |||||||||||
Uncommonly Used Port | X | |||||||||||
User Execution | X | |||||||||||
Valid Accounts | X | X | X | |||||||||
Virtualization/Sandbox Evasion | X | |||||||||||
Web Service | X | X | ||||||||||
Web Shell | X | X | ||||||||||
Windows Admin Shares | X | |||||||||||
Windows Management Instrumentation | X | |||||||||||
Windows Management Instrumentation Event Subscription | X | |||||||||||
Windows Remote Management | X | X | ||||||||||
Winlogon Helper DLL | X | jjjj |
Last updated