MITRE ATT&CK Index

Enterprise Attack Framework reference index. Only top-level techniques listed.

TA0001 - Initial Access

  • T1078 - Valid Accounts
  • T1091 - Replication Through Removable Media
  • T1133 - External Remote Services
  • T1189 - Drive-by Compromise
  • T1190 - Exploit Public-Facing Application
  • T1195 - Supply Chain Compromise
  • T1199 - Trusted Relationship
  • T1200 - Hardware Additions
  • T1566 - Phishing
  • T1659 - Content Injection
  • T1669 - Wi-Fi Networks

TA0002 - Execution

  • T1047 - Windows Management Instrumentation
  • T1053 - Scheduled Task/Job
  • T1059 - Command and Scripting Interpreter
  • T1061 - Graphical User Interface
  • T1064 - Scripting
  • T1072 - Software Deployment Tools
  • T1106 - Native API
  • T1127 - Trusted Developer Utilities Proxy Execution
  • T1129 - Shared Modules
  • T1153 - Source
  • T1175 - Component Object Model and Distributed COM
  • T1197 - BITS Jobs
  • T1203 - Exploitation for Client Execution
  • T1204 - User Execution
  • T1559 - Inter-Process Communication
  • T1569 - System Services
  • T1574 - Hijack Execution Flow
  • T1609 - Container Administration Command
  • T1610 - Deploy Container
  • T1648 - Serverless Execution
  • T1651 - Cloud Administration Command
  • T1674 - Input Injection
  • T1675 - ESXi Administration Command
  • T1677 - Poisoned Pipeline Execution

TA0003 - Persistence

  • T1034 - Path Interception
  • T1037 - Boot or Logon Initialization Scripts
  • T1053 - Scheduled Task/Job
  • T1062 - Hypervisor
  • T1078 - Valid Accounts
  • T1098 - Account Manipulation
  • T1108 - Redundant Access
  • T1112 - Modify Registry
  • T1133 - External Remote Services
  • T1136 - Create Account
  • T1137 - Office Application Startup
  • T1176 - Software Extensions
  • T1197 - BITS Jobs
  • T1205 - Traffic Signaling
  • T1505 - Server Software Component
  • T1525 - Implant Internal Image
  • T1542 - Pre-OS Boot
  • T1543 - Create or Modify System Process
  • T1546 - Event Triggered Execution
  • T1547 - Boot or Logon Autostart Execution
  • T1554 - Compromise Host Software Binary
  • T1556 - Modify Authentication Process
  • T1653 - Power Settings
  • T1668 - Exclusive Control
  • T1671 - Cloud Application Integration

TA0004 - Privilege Escalation

  • T1034 - Path Interception
  • T1037 - Boot or Logon Initialization Scripts
  • T1053 - Scheduled Task/Job
  • T1055 - Process Injection
  • T1068 - Exploitation for Privilege Escalation
  • T1078 - Valid Accounts
  • T1098 - Account Manipulation
  • T1134 - Access Token Manipulation
  • T1484 - Domain or Tenant Policy Modification
  • T1543 - Create or Modify System Process
  • T1546 - Event Triggered Execution
  • T1547 - Boot or Logon Autostart Execution
  • T1548 - Abuse Elevation Control Mechanism
  • T1611 - Escape to Host

TA0005 - Stealth

  • T1006 - Direct Volume Access
  • T1014 - Rootkit
  • T1027 - Obfuscated Files or Information
  • T1036 - Masquerading
  • T1055 - Process Injection
  • T1064 - Scripting
  • T1070 - Indicator Removal
  • T1078 - Valid Accounts
  • T1108 - Redundant Access
  • T1127 - Trusted Developer Utilities Proxy Execution
  • T1134 - Access Token Manipulation
  • T1140 - Deobfuscate/Decode Files or Information
  • T1149 - LC_MAIN Hijacking
  • T1197 - BITS Jobs
  • T1202 - Indirect Command Execution
  • T1205 - Traffic Signaling
  • T1211 - Exploitation for Stealth
  • T1216 - System Script Proxy Execution
  • T1218 - System Binary Proxy Execution
  • T1220 - XSL Script Processing
  • T1221 - Template Injection
  • T1480 - Execution Guardrails
  • T1497 - Virtualization/Sandbox Evasion
  • T1535 - Unused/Unsupported Cloud Regions
  • T1542 - Pre-OS Boot
  • T1564 - Hide Artifacts
  • T1574 - Hijack Execution Flow
  • T1612 - Build Image on Host
  • T1620 - Reflective Code Loading
  • T1622 - Debugger Evasion
  • T1678 - Delay Execution
  • T1679 - Selective Exclusion
  • T1684 - Social Engineering

TA0006 - Credential Access

  • T1003 - OS Credential Dumping
  • T1040 - Network Sniffing
  • T1056 - Input Capture
  • T1110 - Brute Force
  • T1111 - Multi-Factor Authentication Interception
  • T1187 - Forced Authentication
  • T1212 - Exploitation for Credential Access
  • T1528 - Steal Application Access Token
  • T1539 - Steal Web Session Cookie
  • T1552 - Unsecured Credentials
  • T1555 - Credentials from Password Stores
  • T1556 - Modify Authentication Process
  • T1557 - Adversary-in-the-Middle
  • T1558 - Steal or Forge Kerberos Tickets
  • T1606 - Forge Web Credentials
  • T1621 - Multi-Factor Authentication Request Generation
  • T1649 - Steal or Forge Authentication Certificates

TA0007 - Discovery

  • T1007 - System Service Discovery
  • T1010 - Application Window Discovery
  • T1012 - Query Registry
  • T1016 - System Network Configuration Discovery
  • T1018 - Remote System Discovery
  • T1033 - System Owner/User Discovery
  • T1040 - Network Sniffing
  • T1046 - Network Service Discovery
  • T1049 - System Network Connections Discovery
  • T1057 - Process Discovery
  • T1069 - Permission Groups Discovery
  • T1082 - System Information Discovery
  • T1083 - File and Directory Discovery
  • T1087 - Account Discovery
  • T1120 - Peripheral Device Discovery
  • T1124 - System Time Discovery
  • T1135 - Network Share Discovery
  • T1201 - Password Policy Discovery
  • T1217 - Browser Information Discovery
  • T1482 - Domain Trust Discovery
  • T1497 - Virtualization/Sandbox Evasion
  • T1518 - Software Discovery
  • T1526 - Cloud Service Discovery
  • T1538 - Cloud Service Dashboard
  • T1580 - Cloud Infrastructure Discovery
  • T1613 - Container and Resource Discovery
  • T1614 - System Location Discovery
  • T1615 - Group Policy Discovery
  • T1619 - Cloud Storage Object Discovery
  • T1622 - Debugger Evasion
  • T1652 - Device Driver Discovery
  • T1654 - Log Enumeration
  • T1673 - Virtual Machine Discovery
  • T1680 - Local Storage Discovery

TA0008 - Lateral Movement

  • T1021 - Remote Services
  • T1051 - Shared Webroot
  • T1072 - Software Deployment Tools
  • T1080 - Taint Shared Content
  • T1091 - Replication Through Removable Media
  • T1175 - Component Object Model and Distributed COM
  • T1210 - Exploitation of Remote Services
  • T1534 - Internal Spearphishing
  • T1550 - Use Alternate Authentication Material
  • T1563 - Remote Service Session Hijacking
  • T1570 - Lateral Tool Transfer

TA0009 - Collection

  • T1005 - Data from Local System
  • T1025 - Data from Removable Media
  • T1039 - Data from Network Shared Drive
  • T1056 - Input Capture
  • T1074 - Data Staged
  • T1113 - Screen Capture
  • T1114 - Email Collection
  • T1115 - Clipboard Data
  • T1119 - Automated Collection
  • T1123 - Audio Capture
  • T1125 - Video Capture
  • T1185 - Browser Session Hijacking
  • T1213 - Data from Information Repositories
  • T1530 - Data from Cloud Storage
  • T1557 - Adversary-in-the-Middle
  • T1560 - Archive Collected Data
  • T1602 - Data from Configuration Repository

TA0010 - Exfiltration

  • T1011 - Exfiltration Over Other Network Medium
  • T1020 - Automated Exfiltration
  • T1029 - Scheduled Transfer
  • T1030 - Data Transfer Size Limits
  • T1041 - Exfiltration Over C2 Channel
  • T1048 - Exfiltration Over Alternative Protocol
  • T1052 - Exfiltration Over Physical Medium
  • T1537 - Transfer Data to Cloud Account
  • T1567 - Exfiltration Over Web Service

TA0011 - Command and Control

  • T1001 - Data Obfuscation
  • T1008 - Fallback Channels
  • T1026 - Multiband Communication
  • T1043 - Commonly Used Port
  • T1071 - Application Layer Protocol
  • T1090 - Proxy
  • T1092 - Communication Through Removable Media
  • T1095 - Non-Application Layer Protocol
  • T1102 - Web Service
  • T1104 - Multi-Stage Channels
  • T1105 - Ingress Tool Transfer
  • T1132 - Data Encoding
  • T1205 - Traffic Signaling
  • T1219 - Remote Access Tools
  • T1568 - Dynamic Resolution
  • T1571 - Non-Standard Port
  • T1572 - Protocol Tunneling
  • T1573 - Encrypted Channel
  • T1659 - Content Injection
  • T1665 - Hide Infrastructure

TA0040 - Impact

  • T1485 - Data Destruction
  • T1486 - Data Encrypted for Impact
  • T1489 - Service Stop
  • T1490 - Inhibit System Recovery
  • T1491 - Defacement
  • T1495 - Firmware Corruption
  • T1496 - Resource Hijacking
  • T1498 - Network Denial of Service
  • T1499 - Endpoint Denial of Service
  • T1529 - System Shutdown/Reboot
  • T1531 - Account Access Removal
  • T1561 - Disk Wipe
  • T1565 - Data Manipulation
  • T1657 - Financial Theft
  • T1667 - Email Bombing

TA0042 - Resource Development

  • T1583 - Acquire Infrastructure
  • T1584 - Compromise Infrastructure
  • T1585 - Establish Accounts
  • T1586 - Compromise Accounts
  • T1587 - Develop Capabilities
  • T1588 - Obtain Capabilities
  • T1608 - Stage Capabilities
  • T1650 - Acquire Access
  • T1683 - Generate Content

TA0043 - Reconnaissance

  • T1589 - Gather Victim Identity Information
  • T1590 - Gather Victim Network Information
  • T1591 - Gather Victim Org Information
  • T1592 - Gather Victim Host Information
  • T1593 - Search Open Websites/Domains
  • T1594 - Search Victim-Owned Websites
  • T1595 - Active Scanning
  • T1596 - Search Open Technical Databases
  • T1597 - Search Closed Sources
  • T1598 - Phishing for Information
  • T1681 - Search Threat Vendor Data
  • T1682 - Query Public AI Services

TA0112 - Defense Impairment

  • T1112 - Modify Registry
  • T1207 - Rogue Domain Controller
  • T1222 - File and Directory Permissions Modification
  • T1484 - Domain or Tenant Policy Modification
  • T1553 - Subvert Trust Controls
  • T1556 - Modify Authentication Process
  • T1578 - Modify Cloud Compute Infrastructure
  • T1599 - Network Boundary Bridging
  • T1600 - Weaken Encryption
  • T1601 - Modify System Image
  • T1647 - Plist File Modification
  • T1666 - Modify Cloud Resource Hierarchy
  • T1685 - Disable or Modify Tools
  • T1686 - Disable or Modify System Firewall
  • T1687 - Exploitation for Defense Impairment
  • T1688 - Safe Mode Boot
  • T1689 - Downgrade Attack
  • T1690 - Prevent Command History Logging