Skip to main content
Back to top
Ctrl
+
K
Welcome to the Atomic Playbook
Initial Access
T1078.001 - Default Accounts
T1078.002 - Domain Accounts
T1078.003 - Local Accounts
T1078.004 - Cloud Accounts
T1078 - Valid Accounts
T1091 - Replication Through Removable Media
T1133 - External Remote Services
T1189 - Drive-by Compromise
T1190 - Exploit Public-Facing Application
T1195.001 - Compromise Software Dependencies and Development Tools
T1195.002 - Compromise Software Supply Chain
T1195.003 - Compromise Hardware Supply Chain
T1195 - Supply Chain Compromise
T1199 - Trusted Relationship
T1200 - Hardware Additions
T1566.001 - Spearphishing Attachment
T1566.002 - Spearphishing Link
T1566.003 - Spearphishing via Service
T1566.004 - Spearphishing Voice
T1566 - Phishing
T1659 - Content Injection
Execution
T1047 - Windows Management Instrumentation
T1053.002 - At
T1053.003 - Cron
T1053.005 - Scheduled Task
T1053.006 - Systemd Timers
T1053.007 - Container Orchestration Job
T1053 - Scheduled Task/Job
T1059.001 - PowerShell
T1059.002 - AppleScript
T1059.003 - Windows Command Shell
T1059.004 - Unix Shell
T1059.005 - Visual Basic
T1059.006 - Python
T1059.007 - JavaScript
T1059.008 - Network Device CLI
T1059.009 - Cloud API
T1059 - Command and Scripting Interpreter
T1072 - Software Deployment Tools
T1106 - Native API
T1129 - Shared Modules
T1203 - Exploitation for Client Execution
T1204.001 - Malicious Link
T1204.002 - Malicious File
T1204.003 - Malicious Image
T1204 - User Execution
T1559.001 - Component Object Model
T1559.002 - Dynamic Data Exchange
T1559.003 - XPC Services
T1559 - Inter-Process Communication
T1569.001 - Launchctl
T1569.002 - Service Execution
T1569 - System Services
T1609 - Container Administration Command
T1610 - Deploy Container
T1648 - Serverless Execution
T1651 - Cloud Administration Command
Persistence
T1037.001 - Logon Script (Windows)
T1037.002 - Login Hook
T1037.003 - Network Logon Script
T1037.004 - RC Scripts
T1037.005 - Startup Items
T1037 - Boot or Logon Initialization Scripts
T1053.002 - At
T1053.003 - Cron
T1053.005 - Scheduled Task
T1053.006 - Systemd Timers
T1053.007 - Container Orchestration Job
T1053 - Scheduled Task/Job
T1078.001 - Default Accounts
T1078.002 - Domain Accounts
T1078.003 - Local Accounts
T1078.004 - Cloud Accounts
T1078 - Valid Accounts
T1098.001 - Additional Cloud Credentials
T1098.002 - Additional Email Delegate Permissions
T1098.003 - Additional Cloud Roles
T1098.004 - SSH Authorized Keys
T1098.005 - Device Registration
T1098.006 - Additional Container Cluster Roles
T1098 - Account Manipulation
T1133 - External Remote Services
T1136.001 - Local Account
T1136.002 - Domain Account
T1136.003 - Cloud Account
T1136 - Create Account
T1137.001 - Office Template Macros
T1137.002 - Office Test
T1137.003 - Outlook Forms
T1137.004 - Outlook Home Page
T1137.005 - Outlook Rules
T1137.006 - Add-ins
T1137 - Office Application Startup
T1176 - Browser Extensions
T1197 - BITS Jobs
T1205.001 - Port Knocking
T1205.002 - Socket Filters
T1205 - Traffic Signaling
T1505.001 - SQL Stored Procedures
T1505.002 - Transport Agent
T1505.003 - Web Shell
T1505.004 - IIS Components
T1505.005 - Terminal Services DLL
T1505 - Server Software Component
T1525 - Implant Internal Image
T1542.001 - System Firmware
T1542.002 - Component Firmware
T1542.003 - Bootkit
T1542.004 - ROMMONkit
T1542.005 - TFTP Boot
T1542 - Pre-OS Boot
T1543.001 - Launch Agent
T1543.002 - Systemd Service
T1543.003 - Windows Service
T1543.004 - Launch Daemon
T1543 - Create or Modify System Process
T1546.001 - Change Default File Association
T1546.002 - Screensaver
T1546.003 - Windows Management Instrumentation Event Subscription
T1546.004 - Unix Shell Configuration Modification
T1546.005 - Trap
T1546.006 - LC_LOAD_DYLIB Addition
T1546.007 - Netsh Helper DLL
T1546.008 - Accessibility Features
T1546.009 - AppCert DLLs
T1546.010 - AppInit DLLs
T1546.011 - Application Shimming
T1546.012 - Image File Execution Options Injection
T1546.013 - PowerShell Profile
T1546.014 - Emond
T1546.015 - Component Object Model Hijacking
T1546.016 - Installer Packages
T1546 - Event Triggered Execution
T1547.001 - Registry Run Keys / Startup Folder
T1547.002 - Authentication Package
T1547.003 - Time Providers
T1547.004 - Winlogon Helper DLL
T1547.005 - Security Support Provider
T1547.006 - Kernel Modules and Extensions
T1547.007 - Re-opened Applications
T1547.008 - LSASS Driver
T1547.009 - Shortcut Modification
T1547.010 - Port Monitors
T1547.012 - Print Processors
T1547.013 - XDG Autostart Entries
T1547.014 - Active Setup
T1547.015 - Login Items
T1547 - Boot or Logon Autostart Execution
T1554 - Compromise Client Software Binary
T1556.001 - Domain Controller Authentication
T1556.002 - Password Filter DLL
T1556.003 - Pluggable Authentication Modules
T1556.004 - Network Device Authentication
T1556.005 - Reversible Encryption
T1556.006 - Multi-Factor Authentication
T1556.007 - Hybrid Identity
T1556.008 - Network Provider DLL
T1556 - Modify Authentication Process
T1574.001 - DLL Search Order Hijacking
T1574.002 - DLL Side-Loading
T1574.004 - Dylib Hijacking
T1574.005 - Executable Installer File Permissions Weakness
T1574.006 - Dynamic Linker Hijacking
T1574.007 - Path Interception by PATH Environment Variable
T1574.008 - Path Interception by Search Order Hijacking
T1574.009 - Path Interception by Unquoted Path
T1574.010 - Services File Permissions Weakness
T1574.011 - Services Registry Permissions Weakness
T1574.012 - COR_PROFILER
T1574.013 - KernelCallbackTable
T1574 - Hijack Execution Flow
T1653 - Power Settings
Privilege Escalation
T1037.001 - Logon Script (Windows)
T1037.002 - Login Hook
T1037.003 - Network Logon Script
T1037.004 - RC Scripts
T1037.005 - Startup Items
T1037 - Boot or Logon Initialization Scripts
T1053.002 - At
T1053.003 - Cron
T1053.005 - Scheduled Task
T1053.006 - Systemd Timers
T1053.007 - Container Orchestration Job
T1053 - Scheduled Task/Job
T1055.001 - Dynamic-link Library Injection
T1055.002 - Portable Executable Injection
T1055.003 - Thread Execution Hijacking
T1055.004 - Asynchronous Procedure Call
T1055.005 - Thread Local Storage
T1055.008 - Ptrace System Calls
T1055.009 - Proc Memory
T1055.011 - Extra Window Memory Injection
T1055.012 - Process Hollowing
T1055.013 - Process Doppelgänging
T1055.014 - VDSO Hijacking
T1055.015 - ListPlanting
T1055 - Process Injection
T1068 - Exploitation for Privilege Escalation
T1078.001 - Default Accounts
T1078.002 - Domain Accounts
T1078.003 - Local Accounts
T1078.004 - Cloud Accounts
T1078 - Valid Accounts
T1098.001 - Additional Cloud Credentials
T1098.002 - Additional Email Delegate Permissions
T1098.003 - Additional Cloud Roles
T1098.004 - SSH Authorized Keys
T1098.005 - Device Registration
T1098.006 - Additional Container Cluster Roles
T1098 - Account Manipulation
T1134.001 - Token Impersonation/Theft
T1134.002 - Create Process with Token
T1134.003 - Make and Impersonate Token
T1134.004 - Parent PID Spoofing
T1134.005 - SID-History Injection
T1134 - Access Token Manipulation
T1484.001 - Group Policy Modification
T1484.002 - Domain Trust Modification
T1484 - Domain Policy Modification
T1543.001 - Launch Agent
T1543.002 - Systemd Service
T1543.003 - Windows Service
T1543.004 - Launch Daemon
T1543 - Create or Modify System Process
T1546.001 - Change Default File Association
T1546.002 - Screensaver
T1546.003 - Windows Management Instrumentation Event Subscription
T1546.004 - Unix Shell Configuration Modification
T1546.005 - Trap
T1546.006 - LC_LOAD_DYLIB Addition
T1546.007 - Netsh Helper DLL
T1546.008 - Accessibility Features
T1546.009 - AppCert DLLs
T1546.010 - AppInit DLLs
T1546.011 - Application Shimming
T1546.012 - Image File Execution Options Injection
T1546.013 - PowerShell Profile
T1546.014 - Emond
T1546.015 - Component Object Model Hijacking
T1546.016 - Installer Packages
T1546 - Event Triggered Execution
T1547.001 - Registry Run Keys / Startup Folder
T1547.002 - Authentication Package
T1547.003 - Time Providers
T1547.004 - Winlogon Helper DLL
T1547.005 - Security Support Provider
T1547.006 - Kernel Modules and Extensions
T1547.007 - Re-opened Applications
T1547.008 - LSASS Driver
T1547.009 - Shortcut Modification
T1547.010 - Port Monitors
T1547.012 - Print Processors
T1547.013 - XDG Autostart Entries
T1547.014 - Active Setup
T1547.015 - Login Items
T1547 - Boot or Logon Autostart Execution
T1548.001 - Setuid and Setgid
T1548.002 - Bypass User Account Control
T1548.003 - Sudo and Sudo Caching
T1548.004 - Elevated Execution with Prompt
T1548.005 - Temporary Elevated Cloud Access
T1548 - Abuse Elevation Control Mechanism
T1574.001 - DLL Search Order Hijacking
T1574.002 - DLL Side-Loading
T1574.004 - Dylib Hijacking
T1574.005 - Executable Installer File Permissions Weakness
T1574.006 - Dynamic Linker Hijacking
T1574.007 - Path Interception by PATH Environment Variable
T1574.008 - Path Interception by Search Order Hijacking
T1574.009 - Path Interception by Unquoted Path
T1574.010 - Services File Permissions Weakness
T1574.011 - Services Registry Permissions Weakness
T1574.012 - COR_PROFILER
T1574.013 - KernelCallbackTable
T1574 - Hijack Execution Flow
T1611 - Escape to Host
Defense Evasion
T1006 - Direct Volume Access
T1014 - Rootkit
T1027.001 - Binary Padding
T1027.002 - Software Packing
T1027.003 - Steganography
T1027.004 - Compile After Delivery
T1027.005 - Indicator Removal from Tools
T1027.006 - HTML Smuggling
T1027.007 - Dynamic API Resolution
T1027.008 - Stripped Payloads
T1027.009 - Embedded Payloads
T1027.010 - Command Obfuscation
T1027.011 - Fileless Storage
T1027.012 - LNK Icon Smuggling
T1027 - Obfuscated Files or Information
T1036.001 - Invalid Code Signature
T1036.002 - Right-to-Left Override
T1036.003 - Rename System Utilities
T1036.004 - Masquerade Task or Service
T1036.005 - Match Legitimate Name or Location
T1036.006 - Space after Filename
T1036.007 - Double File Extension
T1036.008 - Masquerade File Type
T1036.009 - Break Process Trees
T1036 - Masquerading
T1055.001 - Dynamic-link Library Injection
T1055.002 - Portable Executable Injection
T1055.003 - Thread Execution Hijacking
T1055.004 - Asynchronous Procedure Call
T1055.005 - Thread Local Storage
T1055.008 - Ptrace System Calls
T1055.009 - Proc Memory
T1055.011 - Extra Window Memory Injection
T1055.012 - Process Hollowing
T1055.013 - Process Doppelgänging
T1055.014 - VDSO Hijacking
T1055.015 - ListPlanting
T1055 - Process Injection
T1070.001 - Clear Windows Event Logs
T1070.002 - Clear Linux or Mac System Logs
T1070.003 - Clear Command History
T1070.004 - File Deletion
T1070.005 - Network Share Connection Removal
T1070.006 - Timestomp
T1070.007 - Clear Network Connection History and Configurations
T1070.008 - Clear Mailbox Data
T1070.009 - Clear Persistence
T1070 - Indicator Removal
T1078.001 - Default Accounts
T1078.002 - Domain Accounts
T1078.003 - Local Accounts
T1078.004 - Cloud Accounts
T1078 - Valid Accounts
T1112 - Modify Registry
T1127.001 - MSBuild
T1127 - Trusted Developer Utilities Proxy Execution
T1134.001 - Token Impersonation/Theft
T1134.002 - Create Process with Token
T1134.003 - Make and Impersonate Token
T1134.004 - Parent PID Spoofing
T1134.005 - SID-History Injection
T1134 - Access Token Manipulation
T1140 - Deobfuscate/Decode Files or Information
T1197 - BITS Jobs
T1202 - Indirect Command Execution
T1205.001 - Port Knocking
T1205.002 - Socket Filters
T1205 - Traffic Signaling
T1207 - Rogue Domain Controller
T1211 - Exploitation for Defense Evasion
T1216.001 - PubPrn
T1216 - System Script Proxy Execution
T1218.001 - Compiled HTML File
T1218.002 - Control Panel
T1218.003 - CMSTP
T1218.004 - InstallUtil
T1218.005 - Mshta
T1218.007 - Msiexec
T1218.008 - Odbcconf
T1218.009 - Regsvcs/Regasm
T1218.010 - Regsvr32
T1218.011 - Rundll32
T1218.012 - Verclsid
T1218.013 - Mavinject
T1218.014 - MMC
T1218 - System Binary Proxy Execution
T1220 - XSL Script Processing
T1221 - Template Injection
T1222.001 - Windows File and Directory Permissions Modification
T1222.002 - Linux and Mac File and Directory Permissions Modification
T1222 - File and Directory Permissions Modification
T1480.001 - Environmental Keying
T1480 - Execution Guardrails
T1484.001 - Group Policy Modification
T1484.002 - Domain Trust Modification
T1484 - Domain Policy Modification
T1497.001 - System Checks
T1497.002 - User Activity Based Checks
T1497.003 - Time Based Evasion
T1497 - Virtualization/Sandbox Evasion
T1535 - Unused/Unsupported Cloud Regions
T1542.001 - System Firmware
T1542.002 - Component Firmware
T1542.003 - Bootkit
T1542.004 - ROMMONkit
T1542.005 - TFTP Boot
T1542 - Pre-OS Boot
T1548.001 - Setuid and Setgid
T1548.002 - Bypass User Account Control
T1548.003 - Sudo and Sudo Caching
T1548.004 - Elevated Execution with Prompt
T1548.005 - Temporary Elevated Cloud Access
T1548 - Abuse Elevation Control Mechanism
T1550.001 - Application Access Token
T1550.002 - Pass the Hash
T1550.003 - Pass the Ticket
T1550.004 - Web Session Cookie
T1550 - Use Alternate Authentication Material
T1553.001 - Gatekeeper Bypass
T1553.002 - Code Signing
T1553.003 - SIP and Trust Provider Hijacking
T1553.004 - Install Root Certificate
T1553.005 - Mark-of-the-Web Bypass
T1553.006 - Code Signing Policy Modification
T1553 - Subvert Trust Controls
T1556.001 - Domain Controller Authentication
T1556.002 - Password Filter DLL
T1556.003 - Pluggable Authentication Modules
T1556.004 - Network Device Authentication
T1556.005 - Reversible Encryption
T1556.006 - Multi-Factor Authentication
T1556.007 - Hybrid Identity
T1556.008 - Network Provider DLL
T1556 - Modify Authentication Process
T1562.001 - Disable or Modify Tools
T1562.002 - Disable Windows Event Logging
T1562.003 - Impair Command History Logging
T1562.004 - Disable or Modify System Firewall
T1562.006 - Indicator Blocking
T1562.007 - Disable or Modify Cloud Firewall
T1562.008 - Disable or Modify Cloud Logs
T1562.009 - Safe Mode Boot
T1562.010 - Downgrade Attack
T1562.011 - Spoof Security Alerting
T1562.012 - Disable or Modify Linux Audit System
T1562 - Impair Defenses
T1564.001 - Hidden Files and Directories
T1564.002 - Hidden Users
T1564.003 - Hidden Window
T1564.004 - NTFS File Attributes
T1564.005 - Hidden File System
T1564.006 - Run Virtual Instance
T1564.007 - VBA Stomping
T1564.008 - Email Hiding Rules
T1564.009 - Resource Forking
T1564.010 - Process Argument Spoofing
T1564.011 - Ignore Process Interrupts
T1564 - Hide Artifacts
T1574.001 - DLL Search Order Hijacking
T1574.002 - DLL Side-Loading
T1574.004 - Dylib Hijacking
T1574.005 - Executable Installer File Permissions Weakness
T1574.006 - Dynamic Linker Hijacking
T1574.007 - Path Interception by PATH Environment Variable
T1574.008 - Path Interception by Search Order Hijacking
T1574.009 - Path Interception by Unquoted Path
T1574.010 - Services File Permissions Weakness
T1574.011 - Services Registry Permissions Weakness
T1574.012 - COR_PROFILER
T1574.013 - KernelCallbackTable
T1574 - Hijack Execution Flow
T1578.001 - Create Snapshot
T1578.002 - Create Cloud Instance
T1578.003 - Delete Cloud Instance
T1578.004 - Revert Cloud Instance
T1578.005 - Modify Cloud Compute Configurations
T1578 - Modify Cloud Compute Infrastructure
T1599.001 - Network Address Translation Traversal
T1599 - Network Boundary Bridging
T1600.001 - Reduce Key Space
T1600.002 - Disable Crypto Hardware
T1600 - Weaken Encryption
T1601.001 - Patch System Image
T1601.002 - Downgrade System Image
T1601 - Modify System Image
T1610 - Deploy Container
T1612 - Build Image on Host
T1620 - Reflective Code Loading
T1622 - Debugger Evasion
T1647 - Plist File Modification
T1656 - Impersonation
Credential Access
T1003.001 - LSASS Memory
T1003.002 - Security Account Manager
T1003.003 - NTDS
T1003.004 - LSA Secrets
T1003.005 - Cached Domain Credentials
T1003.006 - DCSync
T1003.007 - Proc Filesystem
T1003.008 - /etc/passwd and /etc/shadow
T1003 - OS Credential Dumping
T1040 - Network Sniffing
T1056.001 - Keylogging
T1056.002 - GUI Input Capture
T1056.003 - Web Portal Capture
T1056.004 - Credential API Hooking
T1056 - Input Capture
T1110.001 - Password Guessing
T1110.002 - Password Cracking
T1110.003 - Password Spraying
T1110.004 - Credential Stuffing
T1110 - Brute Force
T1111 - Multi-Factor Authentication Interception
T1187 - Forced Authentication
T1212 - Exploitation for Credential Access
T1528 - Steal Application Access Token
T1539 - Steal Web Session Cookie
T1552.001 - Credentials In Files
T1552.002 - Credentials in Registry
T1552.003 - Bash History
T1552.004 - Private Keys
T1552.005 - Cloud Instance Metadata API
T1552.006 - Group Policy Preferences
T1552.007 - Container API
T1552.008 - Chat Messages
T1552 - Unsecured Credentials
T1555.001 - Keychain
T1555.002 - Securityd Memory
T1555.003 - Credentials from Web Browsers
T1555.004 - Windows Credential Manager
T1555.005 - Password Managers
T1555.006 - Cloud Secrets Management Stores
T1555 - Credentials from Password Stores
T1556.001 - Domain Controller Authentication
T1556.002 - Password Filter DLL
T1556.003 - Pluggable Authentication Modules
T1556.004 - Network Device Authentication
T1556.005 - Reversible Encryption
T1556.006 - Multi-Factor Authentication
T1556.007 - Hybrid Identity
T1556.008 - Network Provider DLL
T1556 - Modify Authentication Process
T1557.001 - LLMNR/NBT-NS Poisoning and SMB Relay
T1557.002 - ARP Cache Poisoning
T1557.003 - DHCP Spoofing
T1557 - Adversary-in-the-Middle
T1558.001 - Golden Ticket
T1558.002 - Silver Ticket
T1558.003 - Kerberoasting
T1558.004 - AS-REP Roasting
T1558 - Steal or Forge Kerberos Tickets
T1606.001 - Web Cookies
T1606.002 - SAML Tokens
T1606 - Forge Web Credentials
T1621 - Multi-Factor Authentication Request Generation
T1649 - Steal or Forge Authentication Certificates
Discovery
T1007 - System Service Discovery
T1010 - Application Window Discovery
T1012 - Query Registry
T1016.001 - Internet Connection Discovery
T1016.002 - Wi-Fi Discovery
T1016 - System Network Configuration Discovery
T1018 - Remote System Discovery
T1033 - System Owner/User Discovery
T1040 - Network Sniffing
T1046 - Network Service Discovery
T1049 - System Network Connections Discovery
T1057 - Process Discovery
T1069.001 - Local Groups
T1069.002 - Domain Groups
T1069.003 - Cloud Groups
T1069 - Permission Groups Discovery
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1087.001 - Local Account
T1087.002 - Domain Account
T1087.003 - Email Account
T1087.004 - Cloud Account
T1087 - Account Discovery
T1120 - Peripheral Device Discovery
T1124 - System Time Discovery
T1135 - Network Share Discovery
T1201 - Password Policy Discovery
T1217 - Browser Information Discovery
T1482 - Domain Trust Discovery
T1497.001 - System Checks
T1497.002 - User Activity Based Checks
T1497.003 - Time Based Evasion
T1497 - Virtualization/Sandbox Evasion
T1518.001 - Security Software Discovery
T1518 - Software Discovery
T1526 - Cloud Service Discovery
T1538 - Cloud Service Dashboard
T1580 - Cloud Infrastructure Discovery
T1613 - Container and Resource Discovery
T1614.001 - System Language Discovery
T1614 - System Location Discovery
T1615 - Group Policy Discovery
T1619 - Cloud Storage Object Discovery
T1622 - Debugger Evasion
T1652 - Device Driver Discovery
T1654 - Log Enumeration
Lateral Movement
T1021.001 - Remote Desktop Protocol
T1021.002 - SMB/Windows Admin Shares
T1021.003 - Distributed Component Object Model
T1021.004 - SSH
T1021.005 - VNC
T1021.006 - Windows Remote Management
T1021.007 - Cloud Services
T1021.008 - Direct Cloud VM Connections
T1021 - Remote Services
T1072 - Software Deployment Tools
T1080 - Taint Shared Content
T1091 - Replication Through Removable Media
T1210 - Exploitation of Remote Services
T1534 - Internal Spearphishing
T1550.001 - Application Access Token
T1550.002 - Pass the Hash
T1550.003 - Pass the Ticket
T1550.004 - Web Session Cookie
T1550 - Use Alternate Authentication Material
T1563.001 - SSH Hijacking
T1563.002 - RDP Hijacking
T1563 - Remote Service Session Hijacking
T1570 - Lateral Tool Transfer
Collection
T1005 - Data from Local System
T1025 - Data from Removable Media
T1039 - Data from Network Shared Drive
T1056.001 - Keylogging
T1056.002 - GUI Input Capture
T1056.003 - Web Portal Capture
T1056.004 - Credential API Hooking
T1056 - Input Capture
T1074.001 - Local Data Staging
T1074.002 - Remote Data Staging
T1074 - Data Staged
T1113 - Screen Capture
T1114.001 - Local Email Collection
T1114.002 - Remote Email Collection
T1114.003 - Email Forwarding Rule
T1114 - Email Collection
T1115 - Clipboard Data
T1119 - Automated Collection
T1123 - Audio Capture
T1125 - Video Capture
T1185 - Browser Session Hijacking
T1213.001 - Confluence
T1213.002 - Sharepoint
T1213.003 - Code Repositories
T1213 - Data from Information Repositories
T1530 - Data from Cloud Storage
T1557.001 - LLMNR/NBT-NS Poisoning and SMB Relay
T1557.002 - ARP Cache Poisoning
T1557.003 - DHCP Spoofing
T1557 - Adversary-in-the-Middle
T1560.001 - Archive via Utility
T1560.002 - Archive via Library
T1560.003 - Archive via Custom Method
T1560 - Archive Collected Data
T1602.001 - SNMP (MIB Dump)
T1602.002 - Network Device Configuration Dump
T1602 - Data from Configuration Repository
Command and Control
T1001.001 - Junk Data
T1001.002 - Steganography
T1001.003 - Protocol Impersonation
T1001 - Data Obfuscation
T1008 - Fallback Channels
T1071.001 - Web Protocols
T1071.002 - File Transfer Protocols
T1071.003 - Mail Protocols
T1071.004 - DNS
T1071 - Application Layer Protocol
T1090.001 - Internal Proxy
T1090.002 - External Proxy
T1090.003 - Multi-hop Proxy
T1090.004 - Domain Fronting
T1090 - Proxy
T1092 - Communication Through Removable Media
T1095 - Non-Application Layer Protocol
T1102.001 - Dead Drop Resolver
T1102.002 - Bidirectional Communication
T1102.003 - One-Way Communication
T1102 - Web Service
T1104 - Multi-Stage Channels
T1105 - Ingress Tool Transfer
T1132.001 - Standard Encoding
T1132.002 - Non-Standard Encoding
T1132 - Data Encoding
T1205.001 - Port Knocking
T1205.002 - Socket Filters
T1205 - Traffic Signaling
T1219 - Remote Access Software
T1568.001 - Fast Flux DNS
T1568.002 - Domain Generation Algorithms
T1568.003 - DNS Calculation
T1568 - Dynamic Resolution
T1571 - Non-Standard Port
T1572 - Protocol Tunneling
T1573.001 - Symmetric Cryptography
T1573.002 - Asymmetric Cryptography
T1573 - Encrypted Channel
T1659 - Content Injection
Exfiltration
T1011.001 - Exfiltration Over Bluetooth
T1011 - Exfiltration Over Other Network Medium
T1020.001 - Traffic Duplication
T1020 - Automated Exfiltration
T1029 - Scheduled Transfer
T1030 - Data Transfer Size Limits
T1041 - Exfiltration Over C2 Channel
T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol
T1048.002 - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
T1048.003 - Exfiltration Over Unencrypted Non-C2 Protocol
T1048 - Exfiltration Over Alternative Protocol
T1052.001 - Exfiltration over USB
T1052 - Exfiltration Over Physical Medium
T1537 - Transfer Data to Cloud Account
T1567.001 - Exfiltration to Code Repository
T1567.002 - Exfiltration to Cloud Storage
T1567.003 - Exfiltration to Text Storage Sites
T1567.004 - Exfiltration Over Webhook
T1567 - Exfiltration Over Web Service
Impact
T1485 - Data Destruction
T1486 - Data Encrypted for Impact
T1489 - Service Stop
T1490 - Inhibit System Recovery
T1491.001 - Internal Defacement
T1491.002 - External Defacement
T1491 - Defacement
T1495 - Firmware Corruption
T1496 - Resource Hijacking
T1498.001 - Direct Network Flood
T1498.002 - Reflection Amplification
T1498 - Network Denial of Service
T1499.001 - OS Exhaustion Flood
T1499.002 - Service Exhaustion Flood
T1499.003 - Application Exhaustion Flood
T1499.004 - Application or System Exploitation
T1499 - Endpoint Denial of Service
T1529 - System Shutdown/Reboot
T1531 - Account Access Removal
T1561.001 - Disk Content Wipe
T1561.002 - Disk Structure Wipe
T1561 - Disk Wipe
T1565.001 - Stored Data Manipulation
T1565.002 - Transmitted Data Manipulation
T1565.003 - Runtime Data Manipulation
T1565 - Data Manipulation
T1657 - Financial Theft
Index