CompromiseInfrastructure:Virtual PrivateServerGather VictimIdentityInformation:EmployeeNamesMasquerading:RenameSystemUtilitiesDataManipulation:Runtime DataManipulationAcquireInfrastructure:DomainsInhibitSystemRecoveryOSCredentialDumping:LSASSMemoryFallbackChannelsExfiltration OverAlternativeProtocol:Exfiltration OverSymmetricEncrypted Non-C2ProtocolProcessInjection:Extra WindowMemoryInjectionApplicationWindowDiscoveryProcessInjection:VDSOHijackingEndpoint Denialof Service:Application orSystemExploitationEvent TriggeredExecution: UnixShellConfigurationModificationHijack ExecutionFlow:COR_PROFILERUse AlternateAuthenticationMaterial: Passthe TicketEventTriggeredExecutionImpairDefenses:ImpairCommandHistory LoggingSearchOpenTechnicalDatabases:CDNsSystemBinary ProxyExecution:ElectronApplicationsOSCredentialDumping:NTDSObfuscatedFiles orInformation:BinaryPaddingFile andDirectoryDiscoveryInter-ProcessCommunication:XPC ServicesCommand andScriptingInterpreter:WindowsCommandShellOSCredentialDumping:DCSyncAccountManipulation:AdditionalCloud RolesBrowserInformationDiscoveryModifyAuthenticationProcess:Hybrid IdentityApplication LayerProtocol:Publish/SubscribeProtocolsCreateAccount:LocalAccountValidAccounts:CloudAccountsFile and DirectoryPermissionsModification:Windows File andDirectoryPermissionsModificationUnsecuredCredentials:Credentialsin RegistrySteal WebSessionCookieEventTriggeredExecution:ScreensaverModifyCloudResourceHierarchyData fromCloudStorageGatherVictimIdentityInformationIndicatorRemoval:ClearPersistenceBoot or LogonAutostartExecution:Re-openedApplicationsBoot or LogonAutostartExecution:WinlogonHelper DLLImpairDefenses:SpoofSecurityAlertingCompromiseHostSoftwareBinaryActiveScanningSystemBinary ProxyExecution:CompiledHTML FileEncryptedChannel:SymmetricCryptographyValidAccounts:DomainAccountsDataObfuscation:SteganographyDataTransferSizeLimitsBoot orLogonAutostartExecution:Port MonitorsPhishing forInformation:SpearphishingServiceCompromiseInfrastructure:Web ServicesSystemBinary ProxyExecution:MMCImpairDefenses:Disable orModify LinuxAudit SystemBuildImageon HostProcessDiscoveryDefacement:InternalDefacementSearchClosedSourcesCommandand ScriptingInterpreter:PythonPre-OSBoot:BootkitPhishingAccountManipulation:AdditionalCloudCredentialsDataObfuscationSteal or ForgeAuthenticationCertificatesRemoteServices:CloudServicesSystemNetworkConfigurationDiscovery: Wi-Fi DiscoveryHijackExecution Flow:PathInterception bySearch OrderHijackingEventTriggeredExecution:TrapIndicatorRemoval:FileDeletionArchiveCollectedData: Archivevia CustomMethodSoftwareDiscovery:SecuritySoftwareDiscoveryStageCapabilities:Upload ToolDynamicResolution:Fast FluxDNSFile and DirectoryPermissionsModification: Linuxand Mac File andDirectoryPermissionsModificationAbuseElevationControlMechanismProcessInjectionCreateAccount:DomainAccountInter-ProcessCommunication:ComponentObject ModelDataManipulation:Stored DataManipulationProcessInjection:PtraceSystem CallsEventTriggeredExecution:AppInit DLLsEncryptedChannel:AsymmetricCryptographyTrustedDeveloperUtilitiesProxyExecutionModifyAuthenticationProcess:Multi-FactorAuthenticationWeb Service:BidirectionalCommunicationAccessTokenManipulation:Parent PIDSpoofingPre-OSBootExfiltrationOver C2ChannelPre-OSBoot:TFTPBootIndicatorRemoval: ClearNetworkConnectionHistory andConfigurationsDefacement:ExternalDefacementEscapeto HostData fromInformationRepositories:CodeRepositoriesModifyAuthenticationProcess:PluggableAuthenticationModulesFile andDirectoryPermissionsModificationExploitationfor ClientExecutionOSCredentialDumpingSubvertTrustControls:Mark-of-the-Web BypassBoot or LogonAutostartExecution:PrintProcessorsSystemOwner/UserDiscoveryNon-ApplicationLayerProtocolDeployContainerObfuscatedFiles orInformationSearch OpenWebsites/Domains:Search EnginesApplicationLayerProtocolImpairDefenses:Disable orModify CloudLogsSubvertTrustControls:Install RootCertificateExfiltrationOver OtherNetworkMediumDynamicResolution:DNSCalculationAbuse ElevationControlMechanism:ElevatedExecution withPromptPhishing:SpearphishingAttachmentBoot or LogonAutostartExecution:Registry RunKeys / StartupFolderObfuscatedFiles orInformation:CommandObfuscationCloudServiceDiscoveryImpairDefenses:IndicatorBlockingSystemBinary ProxyExecution:ControlPanelStageCapabilities:Install DigitalCertificateAccess TokenManipulation: TokenImpersonation/TheftExfiltrationOver WebServicePeripheralDeviceDiscoveryDebuggerEvasionVirtualization/SandboxEvasion: User ActivityBased ChecksDataManipulation:TransmittedDataManipulationValidAccounts:LocalAccountsDataManipulationMulti-FactorAuthenticationRequestGenerationInputCapture:Web PortalCaptureWindowsManagementInstrumentationPre-OSBoot:ROMMONkitProxy:Multi-hopProxyAccountDiscovery:CloudAccountCommandandScriptingInterpreterData fromLocalSystemData fromInformationRepositories:MessagingApplicationsImpairDefenses:Disable orModify SystemFirewallEventTriggeredExecution:ApplicationShimmingServerSoftwareComponentStageCapabilities:Drive-byTargetModifyAuthenticationProcess:Network DeviceAuthenticationDisk Wipe:DiskContentWipeCommandand ScriptingInterpreter:PowerShellAdversary-in-the-Middle:LLMNR/NBT-NS Poisoningand SMB RelayContainerandResourceDiscoverySystemServiceDiscoveryAccess TokenManipulation:CreateProcess withTokenEventTriggeredExecution:Udev RulesLogEnumerationPermissionGroupsDiscoveryBruteForce:PasswordGuessingExecutionGuardrailsAccountDiscovery:EmailAccountCommandand ScriptingInterpreter:Cloud APISystem Script ProxyExecution:SyncAppvPublishingServerSearchVictim-OwnedWebsitesData fromInformationRepositories:ConfluenceAutomatedExfiltration:TrafficDuplicationNetworkBoundaryBridgingSoftwareDiscoveryScreenCaptureSearchOpenTechnicalDatabasesStageCapabilities:Link TargetGather VictimNetworkInformation:NetworkSecurityAppliancesClipboardDataEventTriggeredExecution:Netsh HelperDLLData fromInformationRepositoriesEventTriggeredExecution:EmondObfuscatedFiles orInformation:IndicatorRemoval fromToolsData fromInformationRepositories:SharepointOfficeApplicationStartup:OutlookRulesSupply ChainCompromise:CompromiseSoftwareSupply ChainAdversary-in-the-Middle:Evil TwinExploitationforPrivilegeEscalationAccess TokenManipulation:Make andImpersonateTokenExecutionGuardrails:MutualExclusionPermissionGroupsDiscovery:LocalGroupsAutomatedExfiltrationVirtualization/SandboxEvasion: SystemChecksCommandand ScriptingInterpreter:JavaScriptBoot orLogonAutostartExecutionData fromNetworkSharedDriveModifyAuthenticationProcess:ReversibleEncryptionResourceHijacking:SMSPumpingPermissionGroupsDiscovery:DomainGroupsExfiltration OverAlternativeProtocol:Exfiltration OverAsymmetricEncrypted Non-C2ProtocolAccountManipulation:AdditionalEmail DelegatePermissionsnameForcedAuthenticationMasquerading:Invalid CodeSignatureCredentialsfrom PasswordStores:Credentialsfrom WebBrowsersDataEncodingBruteForceProxyExternalRemoteServicesHideArtifacts:File/PathExclusionsTrustedDeveloperUtilities ProxyExecution:MSBuildArchiveCollectedDataBruteForce:PasswordCrackingGather VictimNetworkInformation:IP AddressesCommandand ScriptingInterpreter:AppleScriptRemoteServiceSessionHijacking:RDP HijackingPhishing:SpearphishingLinkForge WebCredentials:SAMLTokensCloudStorageObjectDiscoveryNon-StandardPortObtainCapabilities:ExploitsCreateAccountSteal or ForgeKerberosTickets:KerberoastingCommandand ScriptingInterpreter:AutoHotKey& AutoITImpairDefenses:Disable orModify ToolsModify CloudComputeInfrastructure:CreateSnapshotDevelopCapabilities:CodeSigningCertificatesOfficeApplicationStartup:Add-insDomain orTenantPolicyModificationSystemScriptProxyExecutionExfiltrationOver WebService:Exfiltration toCloud StorageEmailCollection:RemoteEmailCollectionSystemScript ProxyExecution:PubPrnBoot or LogonAutostartExecution:Kernel Modulesand ExtensionsImpairDefenses:Disable orModify CloudFirewallGather VictimOrgInformation:BusinessRelationshipsForge WebCredentials:WebCookiesDataEncryptedfor ImpactAdversary-in-the-Middle:DHCPSpoofingModifyAuthenticationProcess:ConditionalAccess PoliciesModifyAuthenticationProcess:PasswordFilter DLLDevelopCapabilitiesSearchClosedSources:Threat IntelVendorsProtocolTunnelingSupply ChainCompromise:CompromiseHardwareSupply ChainProcessInjection:ThreadExecutionHijackingRemoteServices:DistributedComponentObject ModelCreateAccount:CloudAccountSupplyChainCompromiseInputCapture:GUI InputCaptureTrustedRelationshipGatherVictim HostInformation:HardwareLateralToolTransferCompromiseInfrastructure:ServerlessApplicationLayerProtocol:WebProtocolsPhishing forInformation:SpearphishingLinkActiveScanning:VulnerabilityScanningResourceHijacking:BandwidthHijackingActiveScanning:ScanningIP BlocksApplicationLayerProtocol:DNSHideArtifacts:IgnoreProcessInterruptsContainerAdministrationCommandGatherVictim OrgInformation:IdentifyRolesGather VictimHostInformation:ClientConfigurationsSystemBinary ProxyExecution:VerclsidSharedModulesFinancialTheftPlist FileModificationExfiltrationOver WebService:ExfiltrationOver WebhookHideArtifacts:HiddenWindowObtainCapabilities:ArtificialIntelligenceModifyAuthenticationProcessEmailCollection:EmailForwardingRuleSubvert TrustControls: SIPand TrustProviderHijackingUnused/UnsupportedCloud RegionsHideArtifactsPhishingforInformationHijack ExecutionFlow:KernelCallbackTableData Staged:RemoteData StagingObtainCapabilities:DigitalCertificatesRemoteServices:VNCOS CredentialDumping:SecurityAccountManagerFirmwareCorruptionEndpointDenial ofServiceBoot or LogonAutostartExecution:LSASS DriverOfficeApplicationStartup: OfficeTemplateMacrosGather VictimOrgInformation:IdentifyBusinessTempoSubvertTrustControls:CodeSigningSubvertTrustControlsProcessInjection:ProcMemoryRemoteServicesSearch OpenWebsites/Domains:Social MediaGatherVictimIdentityInformation:CredentialsDataStaged:Local DataStagingProcessInjection:ProcessDoppelgängingProxy:ExternalProxyGatherVictim HostInformation:SoftwareBoot orLogonAutostartExecution:Login ItemsRemoteSystemDiscoveryImpairDefenses:DisableWindowsEvent LoggingObfuscatedFiles orInformation:Compile AfterDeliveryGather VictimNetworkInformation:DomainPropertiesHideArtifacts:Hidden FilesandDirectoriesNetworkBoundaryBridging: NetworkAddressTranslationTraversalScheduledTask/Job:AtScheduledTask/Job:ScheduledTaskEstablishAccounts:EmailAccountsRemoteServices:WindowsRemoteManagementDataEncoding:StandardEncodingSystem BinaryProxy Execution:Regsvcs/RegasmStageCapabilitiesWeakenEncryptionPasswordPolicyDiscoveryCompromiseAccounts:Social MediaAccountsSteal or ForgeKerberosTickets: AS-REP RoastingResourceHijacking:CloudServiceHijackingCredentialsfrom PasswordStores:SecuritydMemoryNetworkSniffingProcessInjection:ProcessHollowingDataObfuscation:Junk DataEvent TriggeredExecution:WindowsManagementInstrumentationEvent SubscriptionUse AlternateAuthenticationMaterial: WebSessionCookieIndicatorRemoval:ClearMailbox DataExfiltrationOver OtherNetworkMedium:ExfiltrationOver BluetoothResourceHijacking:ComputeHijackingAccessTokenManipulationNativeAPISystemNetworkConfigurationDiscoveryQueryRegistryData fromConfigurationRepository:SNMP (MIBDump)ScheduledTask/Job:ContainerOrchestrationJobDataStagedActiveScanning:WordlistScanningCommandand ScriptingInterpreter:Visual BasicHijack ExecutionFlow:AppDomainManagerDataDestruction:Lifecycle-TriggeredDeletionExecutionGuardrails:EnvironmentalKeyingEventTriggeredExecution:InstallerPackagesSupply ChainCompromise:CompromiseSoftwareDependencies andDevelopmentToolsCompromiseAccounts:EmailAccountsObtainCapabilities:ToolSearch ClosedSources:PurchaseTechnical DataSystemShutdown/RebootUnsecuredCredentials:CredentialsIn FilesCommandand ScriptingInterpreter:NetworkDevice CLIAccountManipulation:DeviceRegistrationAcquireInfrastructure:Web ServicesHideArtifacts:Hidden FileSystemSteal orForgeKerberosTickets:Ccache FilesGather VictimNetworkInformation:NetworkTopologyPhishing:SpearphishingVoiceDeobfuscate/DecodeFiles or InformationIndirectCommandExecutionSystemInformationDiscoveryData fromConfigurationRepositoryHijackExecution Flow:Services FilePermissionsWeaknessHijackExecutionFlow: DLLSearch OrderHijackingObfuscatedFiles orInformation:PolymorphicCodeObtainCapabilities:MalwareObfuscatedFiles orInformation:FilelessStorageUse AlternateAuthenticationMaterialRemoteServices:Direct CloudVMConnectionsProxy:InternalProxySystemBinaryProxyExecutionAbuse ElevationControlMechanism:TemporaryElevated CloudAccessSearch OpenWebsites/Domains:Code RepositoriesGatherVictimNetworkInformation:DNSBoot or LogonInitializationScripts: LogonScript(Windows)Credentialsfrom PasswordStores:WindowsCredentialManagerProcessInjection:Dynamic-linkLibraryInjectionSystem NetworkConfigurationDiscovery:InternetConnectionDiscoveryGather VictimOrgInformation:DeterminePhysicalLocationsMasquerading:Double FileExtensionServerSoftwareComponent:Web ShellSystemBinary ProxyExecution:Rundll32SystemServicesTrafficSignalingUserExecutionOfficeApplicationStartup:OutlookHome PageUserExecution:MaliciousImageImpersonationInputCapture:CredentialAPI HookingHijackExecutionFlow: DynamicLinkerHijackingExploitationfor DefenseEvasionMasquerading:MasqueradeFile TypeValidAccountsDeviceDriverDiscoveryDevelopCapabilities:ExploitsVideoCaptureCreate orModify SystemProcess:ContainerServiceMasquerading:Right-to-LeftOverrideAccountManipulation:SSHAuthorizedKeysExploitationof RemoteServicesObtainCapabilities:VulnerabilitiesSystemBinary ProxyExecution:OdbcconfCompromiseInfrastructure:ServerDisk Wipe:DiskStructureWipeVirtualization/SandboxEvasionGather VictimNetworkInformation:Network TrustDependenciesAccountDiscovery:LocalAccountNetworkDenial ofServiceBoot or LogonAutostartExecution:TimeProvidersEvent TriggeredExecution:Image FileExecutionOptionsInjectionSystemBinary ProxyExecution:MshtaHideInfrastructureImpairDefenses:DowngradeAttackAbuseElevationControlMechanism:TCCManipulationMasquerading:MasqueradeTask orServiceHideArtifacts:NTFS FileAttributesBoot orLogonInitializationScripts:Login HookOfficeApplicationStartup:OutlookFormsImpairDefensesData fromInformationRepositories:CustomerRelationshipManagementSoftwareDevelopCapabilities:DigitalCertificatesBoot orLogonInitializationScriptsModifySystemImage:DowngradeSystem ImageServiceStopCredentialsfrom PasswordStores: CloudSecretsManagementStoresForge WebCredentialsSearch OpenTechnicalDatabases:ScanDatabasesBruteForce:CredentialStuffingCloudInfrastructureDiscoveryCompromiseAccounts:CloudAccountsSteal orForgeKerberosTickets:Golden TicketEstablishAccounts:CloudAccountsRemoteServices:SSHServerSoftwareComponent:SQL StoredProceduresUserExecution:MaliciousFileBrowserExtensionsUnsecuredCredentials:ChatMessagesWebServiceSystemLocationDiscoveryDomain orTenant PolicyModification:Group PolicyModificationObfuscatedFiles orInformation:EmbeddedPayloadsImplantInternalImageRemoteAccessSoftwareModify CloudComputeInfrastructureEndpoint Denialof Service:ServiceExhaustionFloodCreate orModifySystemProcessWeakenEncryption:ReduceKey SpaceProcessInjection:ListPlantingOS CredentialDumping:/etc/passwdand/etc/shadowRemoteServices:SMB/WindowsAdmin SharesEstablishAccounts:Social MediaAccountsScheduledTask/Job:SystemdTimersCreate orModify SystemProcess:WindowsServiceIndicatorRemoval:RelocateMalwareObfuscatedFiles orInformation:SteganographyDataObfuscation:Protocol orServiceImpersonationSystemBinary ProxyExecution:Regsvr32ModifySystemImage: PatchSystemImageHideArtifacts:ProcessArgumentSpoofingIngressToolTransferModify CloudComputeInfrastructure:Modify CloudComputeConfigurationsGatherVictim OrgInformationGather VictimIdentityInformation:EmailAddressesHideArtifacts:Email HidingRulesDefacementOS CredentialDumping:CachedDomainCredentialsRemoteServiceSessionHijackingIndicatorRemovalRemoteServiceSessionHijacking:SSH HijackingModifyRegistryHijackExecutionFlowImpairDefenses:Safe ModeBootObfuscatedFiles orInformation:Dynamic APIResolutionXSL ScriptProcessingDomainTrustDiscoveryUnsecuredCredentialsHideArtifacts:HiddenUsersMasqueradingBruteForce:PasswordSprayingAccountAccessRemovalCommunicationThroughRemovableMediaAccessTokenManipulation:SID-HistoryInjectionInter-ProcessCommunicationCloudAdministrationCommandHijackExecution Flow:ServicesRegistryPermissionsWeaknessWebService:Dead DropResolverSoftwareDeploymentToolsCredentialsfrom PasswordStores:PasswordManagersHijackExecutionFlow: PathInterception byUnquoted PathArchiveCollectedData:Archive viaUtilityVirtualization/SandboxEvasion: Time BasedEvasionCompromiseInfrastructure:DNS ServerBoot orLogonAutostartExecution:Active SetupTaintSharedContentCompromiseInfrastructure:DomainsExfiltration OverAlternativeProtocol:Exfiltration OverUnencryptedNon-C2 ProtocolPhishing forInformation:SpearphishingAttachmentBITSJobsCompromiseInfrastructure:BotnetPhishing forInformation:SpearphishingVoiceOSCredentialDumping:LSA SecretsInter-ProcessCommunication:Dynamic DataExchangeApplicationLayerProtocol:MailProtocolsCredentialsfromPasswordStores:KeychainIndicatorRemoval:ClearCommandHistoryModifyAuthenticationProcess:DomainControllerAuthenticationSearch OpenTechnicalDatabases:DigitalCertificatesProcessInjection:PortableExecutableInjectionSystemBinary ProxyExecution:InstallUtilHijackExecutionFlow: DLLSide-LoadingSteal orForgeKerberosTicketsBoot or LogonAutostartExecution:ShortcutModificationCreate orModify SystemProcess:LaunchDaemonUnsecuredCredentials:ContainerAPICreate orModifySystemProcess:Launch AgentSystemBinary ProxyExecution:MsiexecCompromiseInfrastructureAccountDiscoveryTemplateInjectionTrafficSignaling:PortKnockingHijack ExecutionFlow: PathInterception byPATHEnvironmentVariableServerSoftwareComponent:TransportAgentAccountManipulation:AdditionalContainerCluster RolesAcquireInfrastructure:ServerlessSubvert TrustControls:Code SigningPolicyModificationSteal orForgeKerberosTickets:Silver TicketGroupPolicyDiscoveryObfuscatedFiles orInformation:HTMLSmugglingMasquerading:MatchLegitimateName orLocationContentInjectionEndpoint Denialof Service:ApplicationExhaustionFloodUse AlternateAuthenticationMaterial:ApplicationAccess TokenAudioCaptureReflectiveCodeLoadingMulti-StageChannelsDynamicResolution:DomainGenerationAlgorithmsAcquireInfrastructure:BotnetProcessInjection:AsynchronousProcedureCallCommandand ScriptingInterpreter:LuaObfuscatedFiles orInformation:StrippedPayloadsGatherVictimHostInformationBrowserSessionHijackingAcquireAccessAbuseElevationControlMechanism:Setuid andSetgidTrafficSignaling:SocketFiltersServerlessExecutionExploitPublic-FacingApplicationAutomatedCollectionBoot or LogonAutostartExecution:XDG AutostartEntriesUnsecuredCredentials:CloudInstanceMetadata APIValidAccounts:DefaultAccountsResourceHijackingDrive-byCompromiseUnsecuredCredentials:Group PolicyPreferencesOfficeApplicationStartup:Office TestServerSoftwareComponent:TerminalServices DLLDataEncoding:Non-StandardEncodingSystemBinary ProxyExecution:MavinjectPhishing:Spearphishingvia ServiceEndpointDenial ofService: OSExhaustionFloodWeb Service:One-WayCommunicationReplicationThroughRemovableMediaData fromConfigurationRepository:Network DeviceConfigurationDumpCommandand ScriptingInterpreter:Unix ShellHijackExecution Flow:ExecutableInstaller FilePermissionsWeaknessIndicatorRemoval:Clear Linuxor MacSystem LogsAcquireInfrastructure:ServerPre-OSBoot:ComponentFirmwareHardwareAdditionsNetworkDenial ofService: DirectNetwork FloodRootkitWeakenEncryption:DisableCryptoHardwareAcquireInfrastructureDataDestructionHijackExecutionFlow: DylibHijackingSystemTimeDiscoverySearch OpenWebsites/DomainsExfiltrationOver WebService:Exfiltration toText StorageSitesSystemServices:LaunchctlSearchOpenTechnicalDatabases:WHOISInternalSpearphishingObtainCapabilities:CodeSigningCertificatesEvent TriggeredExecution:LC_LOAD_DYLIBAdditionAccountDiscovery:DomainAccountBoot orLogonInitializationScripts:Startup ItemsAccountManipulationExfiltrationOver PhysicalMedium:Exfiltrationover USBBoot or LogonAutostartExecution:SecuritySupportProviderPowerSettingsModify CloudComputeInfrastructure:Delete CloudInstanceArchiveCollectedData:Archive viaLibraryBoot orLogonInitializationScripts: RCScriptsInputCapture:KeyloggingTrustedDeveloperUtilities ProxyExecution:ClickOnceOSCredentialDumping:ProcFilesystemBoot or LogonAutostartExecution:AuthenticationPackageCompromiseInfrastructure:NetworkDevicesExfiltrationOver WebService:Exfiltration toCodeRepositoryHideArtifacts:ResourceForkingUnsecuredCredentials:PrivateKeysSystemServices:ServiceExecutionEvent TriggeredExecution:ComponentObject ModelHijackingProxy:DomainFrontingEstablishAccountsSystemBinary ProxyExecution:CMSTPUnsecuredCredentials:BashHistoryData fromRemovableMediaGatherVictimNetworkInformationStageCapabilities:UploadMalwareBoot or LogonInitializationScripts:NetworkLogon ScriptObfuscatedFiles orInformation:LNK IconSmugglingIndicatorRemoval:Network ShareConnectionRemovalCredentialsfromPasswordStoresCompromiseAccountsSystemNetworkConnectionsDiscoveryStealApplicationAccessTokenNetworkShareDiscoveryModifyAuthenticationProcess:NetworkProvider DLLOfficeApplicationStartupStageCapabilities:SEOPoisoningAdversary-in-the-MiddleMasquerading:MasqueradeAccount NameRemoteServices:RemoteDesktopProtocolCreate orModify SystemProcess:SystemdServiceAccountManipulation:Additional Localor DomainGroupsNetworkDenial ofService:ReflectionAmplificationEmailCollection:Local EmailCollectionAbuse ElevationControlMechanism:Bypass UserAccount ControlSubvertTrustControls:GatekeeperBypassGatherVictim HostInformation:FirmwareApplicationLayerProtocol: FileTransferProtocolsMulti-FactorAuthenticationInterceptionModifySystemImageAdversary-in-the-Middle: ARPCachePoisoningScheduledTask/Job:CronDiskWipeAcquireInfrastructure:Virtual PrivateServerMasquerading:Space afterFilenameIndicatorRemoval:TimestompTransferData toCloudAccountMasquerading:Break ProcessTreesScheduledTask/JobPre-OSBoot:SystemFirmwareEvent TriggeredExecution:Change DefaultFile AssociationObfuscated Files orInformation:Encrypted/EncodedFileDynamicResolutionUse AlternateAuthenticationMaterial: Passthe HashObtainCapabilitiesRogueDomainControllerPermissionGroupsDiscovery:CloudGroupsExfiltrationOverPhysicalMediumEventTriggeredExecution:AppCertDLLsModify CloudComputeInfrastructure:Create CloudInstanceServerSoftwareComponent:IISComponentsScheduledTransferDirectVolumeAccessNetworkServiceDiscoveryCloudServiceDashboardDomain orTenant PolicyModification:TrustModificationEventTriggeredExecution:AccessibilityFeaturesSystemLocationDiscovery:SystemLanguageDiscoveryAbuseElevationControlMechanism:Sudo and SudoCachingAcquireInfrastructure:DNS ServerExploitationforCredentialAccessModify CloudComputeInfrastructure:Revert CloudInstanceAcquireInfrastructure:MalvertisingInputCaptureIndicatorRemoval:ClearWindowsEvent LogsSearch OpenTechnicalDatabases:DNS/PassiveDNSHideArtifacts:VBAStompingDevelopCapabilities:MalwareExfiltrationOverAlternativeProtocolEventTriggeredExecution:PowerShellProfileProcessInjection:Thread LocalStorageEncryptedChannelObfuscatedFiles orInformation:SoftwarePackingHideArtifacts:Run VirtualInstanceEmailCollectionUserExecution:MaliciousLinkCompromiseInfrastructure:Virtual PrivateServerGather VictimIdentityInformation:EmployeeNamesMasquerading:RenameSystemUtilitiesDataManipulation:Runtime DataManipulationAcquireInfrastructure:DomainsInhibitSystemRecoveryOSCredentialDumping:LSASSMemoryFallbackChannelsExfiltration OverAlternativeProtocol:Exfiltration OverSymmetricEncrypted Non-C2ProtocolProcessInjection:Extra WindowMemoryInjectionApplicationWindowDiscoveryProcessInjection:VDSOHijackingEndpoint Denialof Service:Application orSystemExploitationEvent TriggeredExecution: UnixShellConfigurationModificationHijack ExecutionFlow:COR_PROFILERUse AlternateAuthenticationMaterial: Passthe TicketEventTriggeredExecutionImpairDefenses:ImpairCommandHistory LoggingSearchOpenTechnicalDatabases:CDNsSystemBinary ProxyExecution:ElectronApplicationsOSCredentialDumping:NTDSObfuscatedFiles orInformation:BinaryPaddingFile andDirectoryDiscoveryInter-ProcessCommunication:XPC ServicesCommand andScriptingInterpreter:WindowsCommandShellOSCredentialDumping:DCSyncAccountManipulation:AdditionalCloud RolesBrowserInformationDiscoveryModifyAuthenticationProcess:Hybrid IdentityApplication LayerProtocol:Publish/SubscribeProtocolsCreateAccount:LocalAccountValidAccounts:CloudAccountsFile and DirectoryPermissionsModification:Windows File andDirectoryPermissionsModificationUnsecuredCredentials:Credentialsin RegistrySteal WebSessionCookieEventTriggeredExecution:ScreensaverModifyCloudResourceHierarchyData fromCloudStorageGatherVictimIdentityInformationIndicatorRemoval:ClearPersistenceBoot or LogonAutostartExecution:Re-openedApplicationsBoot or LogonAutostartExecution:WinlogonHelper DLLImpairDefenses:SpoofSecurityAlertingCompromiseHostSoftwareBinaryActiveScanningSystemBinary ProxyExecution:CompiledHTML FileEncryptedChannel:SymmetricCryptographyValidAccounts:DomainAccountsDataObfuscation:SteganographyDataTransferSizeLimitsBoot orLogonAutostartExecution:Port MonitorsPhishing forInformation:SpearphishingServiceCompromiseInfrastructure:Web ServicesSystemBinary ProxyExecution:MMCImpairDefenses:Disable orModify LinuxAudit SystemBuildImageon HostProcessDiscoveryDefacement:InternalDefacementSearchClosedSourcesCommandand ScriptingInterpreter:PythonPre-OSBoot:BootkitPhishingAccountManipulation:AdditionalCloudCredentialsDataObfuscationSteal or ForgeAuthenticationCertificatesRemoteServices:CloudServicesSystemNetworkConfigurationDiscovery: Wi-Fi DiscoveryHijackExecution Flow:PathInterception bySearch OrderHijackingEventTriggeredExecution:TrapIndicatorRemoval:FileDeletionArchiveCollectedData: Archivevia CustomMethodSoftwareDiscovery:SecuritySoftwareDiscoveryStageCapabilities:Upload ToolDynamicResolution:Fast FluxDNSFile and DirectoryPermissionsModification: Linuxand Mac File andDirectoryPermissionsModificationAbuseElevationControlMechanismProcessInjectionCreateAccount:DomainAccountInter-ProcessCommunication:ComponentObject ModelDataManipulation:Stored DataManipulationProcessInjection:PtraceSystem CallsEventTriggeredExecution:AppInit DLLsEncryptedChannel:AsymmetricCryptographyTrustedDeveloperUtilitiesProxyExecutionModifyAuthenticationProcess:Multi-FactorAuthenticationWeb Service:BidirectionalCommunicationAccessTokenManipulation:Parent PIDSpoofingPre-OSBootExfiltrationOver C2ChannelPre-OSBoot:TFTPBootIndicatorRemoval: ClearNetworkConnectionHistory andConfigurationsDefacement:ExternalDefacementEscapeto HostData fromInformationRepositories:CodeRepositoriesModifyAuthenticationProcess:PluggableAuthenticationModulesFile andDirectoryPermissionsModificationExploitationfor ClientExecutionOSCredentialDumpingSubvertTrustControls:Mark-of-the-Web BypassBoot or LogonAutostartExecution:PrintProcessorsSystemOwner/UserDiscoveryNon-ApplicationLayerProtocolDeployContainerObfuscatedFiles orInformationSearch OpenWebsites/Domains:Search EnginesApplicationLayerProtocolImpairDefenses:Disable orModify CloudLogsSubvertTrustControls:Install RootCertificateExfiltrationOver OtherNetworkMediumDynamicResolution:DNSCalculationAbuse ElevationControlMechanism:ElevatedExecution withPromptPhishing:SpearphishingAttachmentBoot or LogonAutostartExecution:Registry RunKeys / StartupFolderObfuscatedFiles orInformation:CommandObfuscationCloudServiceDiscoveryImpairDefenses:IndicatorBlockingSystemBinary ProxyExecution:ControlPanelStageCapabilities:Install DigitalCertificateAccess TokenManipulation: TokenImpersonation/TheftExfiltrationOver WebServicePeripheralDeviceDiscoveryDebuggerEvasionVirtualization/SandboxEvasion: User ActivityBased ChecksDataManipulation:TransmittedDataManipulationValidAccounts:LocalAccountsDataManipulationMulti-FactorAuthenticationRequestGenerationInputCapture:Web PortalCaptureWindowsManagementInstrumentationPre-OSBoot:ROMMONkitProxy:Multi-hopProxyAccountDiscovery:CloudAccountCommandandScriptingInterpreterData fromLocalSystemData fromInformationRepositories:MessagingApplicationsImpairDefenses:Disable orModify SystemFirewallEventTriggeredExecution:ApplicationShimmingServerSoftwareComponentStageCapabilities:Drive-byTargetModifyAuthenticationProcess:Network DeviceAuthenticationDisk Wipe:DiskContentWipeCommandand ScriptingInterpreter:PowerShellAdversary-in-the-Middle:LLMNR/NBT-NS Poisoningand SMB RelayContainerandResourceDiscoverySystemServiceDiscoveryAccess TokenManipulation:CreateProcess withTokenEventTriggeredExecution:Udev RulesLogEnumerationPermissionGroupsDiscoveryBruteForce:PasswordGuessingExecutionGuardrailsAccountDiscovery:EmailAccountCommandand ScriptingInterpreter:Cloud APISystem Script ProxyExecution:SyncAppvPublishingServerSearchVictim-OwnedWebsitesData fromInformationRepositories:ConfluenceAutomatedExfiltration:TrafficDuplicationNetworkBoundaryBridgingSoftwareDiscoveryScreenCaptureSearchOpenTechnicalDatabasesStageCapabilities:Link TargetGather VictimNetworkInformation:NetworkSecurityAppliancesClipboardDataEventTriggeredExecution:Netsh HelperDLLData fromInformationRepositoriesEventTriggeredExecution:EmondObfuscatedFiles orInformation:IndicatorRemoval fromToolsData fromInformationRepositories:SharepointOfficeApplicationStartup:OutlookRulesSupply ChainCompromise:CompromiseSoftwareSupply ChainAdversary-in-the-Middle:Evil TwinExploitationforPrivilegeEscalationAccess TokenManipulation:Make andImpersonateTokenExecutionGuardrails:MutualExclusionPermissionGroupsDiscovery:LocalGroupsAutomatedExfiltrationVirtualization/SandboxEvasion: SystemChecksCommandand ScriptingInterpreter:JavaScriptBoot orLogonAutostartExecutionData fromNetworkSharedDriveModifyAuthenticationProcess:ReversibleEncryptionResourceHijacking:SMSPumpingPermissionGroupsDiscovery:DomainGroupsExfiltration OverAlternativeProtocol:Exfiltration OverAsymmetricEncrypted Non-C2ProtocolAccountManipulation:AdditionalEmail DelegatePermissionsnameForcedAuthenticationMasquerading:Invalid CodeSignatureCredentialsfrom PasswordStores:Credentialsfrom WebBrowsersDataEncodingBruteForceProxyExternalRemoteServicesHideArtifacts:File/PathExclusionsTrustedDeveloperUtilities ProxyExecution:MSBuildArchiveCollectedDataBruteForce:PasswordCrackingGather VictimNetworkInformation:IP AddressesCommandand ScriptingInterpreter:AppleScriptRemoteServiceSessionHijacking:RDP HijackingPhishing:SpearphishingLinkForge WebCredentials:SAMLTokensCloudStorageObjectDiscoveryNon-StandardPortObtainCapabilities:ExploitsCreateAccountSteal or ForgeKerberosTickets:KerberoastingCommandand ScriptingInterpreter:AutoHotKey& AutoITImpairDefenses:Disable orModify ToolsModify CloudComputeInfrastructure:CreateSnapshotDevelopCapabilities:CodeSigningCertificatesOfficeApplicationStartup:Add-insDomain orTenantPolicyModificationSystemScriptProxyExecutionExfiltrationOver WebService:Exfiltration toCloud StorageEmailCollection:RemoteEmailCollectionSystemScript ProxyExecution:PubPrnBoot or LogonAutostartExecution:Kernel Modulesand ExtensionsImpairDefenses:Disable orModify CloudFirewallGather VictimOrgInformation:BusinessRelationshipsForge WebCredentials:WebCookiesDataEncryptedfor ImpactAdversary-in-the-Middle:DHCPSpoofingModifyAuthenticationProcess:ConditionalAccess PoliciesModifyAuthenticationProcess:PasswordFilter DLLDevelopCapabilitiesSearchClosedSources:Threat IntelVendorsProtocolTunnelingSupply ChainCompromise:CompromiseHardwareSupply ChainProcessInjection:ThreadExecutionHijackingRemoteServices:DistributedComponentObject ModelCreateAccount:CloudAccountSupplyChainCompromiseInputCapture:GUI InputCaptureTrustedRelationshipGatherVictim HostInformation:HardwareLateralToolTransferCompromiseInfrastructure:ServerlessApplicationLayerProtocol:WebProtocolsPhishing forInformation:SpearphishingLinkActiveScanning:VulnerabilityScanningResourceHijacking:BandwidthHijackingActiveScanning:ScanningIP BlocksApplicationLayerProtocol:DNSHideArtifacts:IgnoreProcessInterruptsContainerAdministrationCommandGatherVictim OrgInformation:IdentifyRolesGather VictimHostInformation:ClientConfigurationsSystemBinary ProxyExecution:VerclsidSharedModulesFinancialTheftPlist FileModificationExfiltrationOver WebService:ExfiltrationOver WebhookHideArtifacts:HiddenWindowObtainCapabilities:ArtificialIntelligenceModifyAuthenticationProcessEmailCollection:EmailForwardingRuleSubvert TrustControls: SIPand TrustProviderHijackingUnused/UnsupportedCloud RegionsHideArtifactsPhishingforInformationHijack ExecutionFlow:KernelCallbackTableData Staged:RemoteData StagingObtainCapabilities:DigitalCertificatesRemoteServices:VNCOS CredentialDumping:SecurityAccountManagerFirmwareCorruptionEndpointDenial ofServiceBoot or LogonAutostartExecution:LSASS DriverOfficeApplicationStartup: OfficeTemplateMacrosGather VictimOrgInformation:IdentifyBusinessTempoSubvertTrustControls:CodeSigningSubvertTrustControlsProcessInjection:ProcMemoryRemoteServicesSearch OpenWebsites/Domains:Social MediaGatherVictimIdentityInformation:CredentialsDataStaged:Local DataStagingProcessInjection:ProcessDoppelgängingProxy:ExternalProxyGatherVictim HostInformation:SoftwareBoot orLogonAutostartExecution:Login ItemsRemoteSystemDiscoveryImpairDefenses:DisableWindowsEvent LoggingObfuscatedFiles orInformation:Compile AfterDeliveryGather VictimNetworkInformation:DomainPropertiesHideArtifacts:Hidden FilesandDirectoriesNetworkBoundaryBridging: NetworkAddressTranslationTraversalScheduledTask/Job:AtScheduledTask/Job:ScheduledTaskEstablishAccounts:EmailAccountsRemoteServices:WindowsRemoteManagementDataEncoding:StandardEncodingSystem BinaryProxy Execution:Regsvcs/RegasmStageCapabilitiesWeakenEncryptionPasswordPolicyDiscoveryCompromiseAccounts:Social MediaAccountsSteal or ForgeKerberosTickets: AS-REP RoastingResourceHijacking:CloudServiceHijackingCredentialsfrom PasswordStores:SecuritydMemoryNetworkSniffingProcessInjection:ProcessHollowingDataObfuscation:Junk DataEvent TriggeredExecution:WindowsManagementInstrumentationEvent SubscriptionUse AlternateAuthenticationMaterial: WebSessionCookieIndicatorRemoval:ClearMailbox DataExfiltrationOver OtherNetworkMedium:ExfiltrationOver BluetoothResourceHijacking:ComputeHijackingAccessTokenManipulationNativeAPISystemNetworkConfigurationDiscoveryQueryRegistryData fromConfigurationRepository:SNMP (MIBDump)ScheduledTask/Job:ContainerOrchestrationJobDataStagedActiveScanning:WordlistScanningCommandand ScriptingInterpreter:Visual BasicHijack ExecutionFlow:AppDomainManagerDataDestruction:Lifecycle-TriggeredDeletionExecutionGuardrails:EnvironmentalKeyingEventTriggeredExecution:InstallerPackagesSupply ChainCompromise:CompromiseSoftwareDependencies andDevelopmentToolsCompromiseAccounts:EmailAccountsObtainCapabilities:ToolSearch ClosedSources:PurchaseTechnical DataSystemShutdown/RebootUnsecuredCredentials:CredentialsIn FilesCommandand ScriptingInterpreter:NetworkDevice CLIAccountManipulation:DeviceRegistrationAcquireInfrastructure:Web ServicesHideArtifacts:Hidden FileSystemSteal orForgeKerberosTickets:Ccache FilesGather VictimNetworkInformation:NetworkTopologyPhishing:SpearphishingVoiceDeobfuscate/DecodeFiles or InformationIndirectCommandExecutionSystemInformationDiscoveryData fromConfigurationRepositoryHijackExecution Flow:Services FilePermissionsWeaknessHijackExecutionFlow: DLLSearch OrderHijackingObfuscatedFiles orInformation:PolymorphicCodeObtainCapabilities:MalwareObfuscatedFiles orInformation:FilelessStorageUse AlternateAuthenticationMaterialRemoteServices:Direct CloudVMConnectionsProxy:InternalProxySystemBinaryProxyExecutionAbuse ElevationControlMechanism:TemporaryElevated CloudAccessSearch OpenWebsites/Domains:Code RepositoriesGatherVictimNetworkInformation:DNSBoot or LogonInitializationScripts: LogonScript(Windows)Credentialsfrom PasswordStores:WindowsCredentialManagerProcessInjection:Dynamic-linkLibraryInjectionSystem NetworkConfigurationDiscovery:InternetConnectionDiscoveryGather VictimOrgInformation:DeterminePhysicalLocationsMasquerading:Double FileExtensionServerSoftwareComponent:Web ShellSystemBinary ProxyExecution:Rundll32SystemServicesTrafficSignalingUserExecutionOfficeApplicationStartup:OutlookHome PageUserExecution:MaliciousImageImpersonationInputCapture:CredentialAPI HookingHijackExecutionFlow: DynamicLinkerHijackingExploitationfor DefenseEvasionMasquerading:MasqueradeFile TypeValidAccountsDeviceDriverDiscoveryDevelopCapabilities:ExploitsVideoCaptureCreate orModify SystemProcess:ContainerServiceMasquerading:Right-to-LeftOverrideAccountManipulation:SSHAuthorizedKeysExploitationof RemoteServicesObtainCapabilities:VulnerabilitiesSystemBinary ProxyExecution:OdbcconfCompromiseInfrastructure:ServerDisk Wipe:DiskStructureWipeVirtualization/SandboxEvasionGather VictimNetworkInformation:Network TrustDependenciesAccountDiscovery:LocalAccountNetworkDenial ofServiceBoot or LogonAutostartExecution:TimeProvidersEvent TriggeredExecution:Image FileExecutionOptionsInjectionSystemBinary ProxyExecution:MshtaHideInfrastructureImpairDefenses:DowngradeAttackAbuseElevationControlMechanism:TCCManipulationMasquerading:MasqueradeTask orServiceHideArtifacts:NTFS FileAttributesBoot orLogonInitializationScripts:Login HookOfficeApplicationStartup:OutlookFormsImpairDefensesData fromInformationRepositories:CustomerRelationshipManagementSoftwareDevelopCapabilities:DigitalCertificatesBoot orLogonInitializationScriptsModifySystemImage:DowngradeSystem ImageServiceStopCredentialsfrom PasswordStores: CloudSecretsManagementStoresForge WebCredentialsSearch OpenTechnicalDatabases:ScanDatabasesBruteForce:CredentialStuffingCloudInfrastructureDiscoveryCompromiseAccounts:CloudAccountsSteal orForgeKerberosTickets:Golden TicketEstablishAccounts:CloudAccountsRemoteServices:SSHServerSoftwareComponent:SQL StoredProceduresUserExecution:MaliciousFileBrowserExtensionsUnsecuredCredentials:ChatMessagesWebServiceSystemLocationDiscoveryDomain orTenant PolicyModification:Group PolicyModificationObfuscatedFiles orInformation:EmbeddedPayloadsImplantInternalImageRemoteAccessSoftwareModify CloudComputeInfrastructureEndpoint Denialof Service:ServiceExhaustionFloodCreate orModifySystemProcessWeakenEncryption:ReduceKey SpaceProcessInjection:ListPlantingOS CredentialDumping:/etc/passwdand/etc/shadowRemoteServices:SMB/WindowsAdmin SharesEstablishAccounts:Social MediaAccountsScheduledTask/Job:SystemdTimersCreate orModify SystemProcess:WindowsServiceIndicatorRemoval:RelocateMalwareObfuscatedFiles orInformation:SteganographyDataObfuscation:Protocol orServiceImpersonationSystemBinary ProxyExecution:Regsvr32ModifySystemImage: PatchSystemImageHideArtifacts:ProcessArgumentSpoofingIngressToolTransferModify CloudComputeInfrastructure:Modify CloudComputeConfigurationsGatherVictim OrgInformationGather VictimIdentityInformation:EmailAddressesHideArtifacts:Email HidingRulesDefacementOS CredentialDumping:CachedDomainCredentialsRemoteServiceSessionHijackingIndicatorRemovalRemoteServiceSessionHijacking:SSH HijackingModifyRegistryHijackExecutionFlowImpairDefenses:Safe ModeBootObfuscatedFiles orInformation:Dynamic APIResolutionXSL ScriptProcessingDomainTrustDiscoveryUnsecuredCredentialsHideArtifacts:HiddenUsersMasqueradingBruteForce:PasswordSprayingAccountAccessRemovalCommunicationThroughRemovableMediaAccessTokenManipulation:SID-HistoryInjectionInter-ProcessCommunicationCloudAdministrationCommandHijackExecution Flow:ServicesRegistryPermissionsWeaknessWebService:Dead DropResolverSoftwareDeploymentToolsCredentialsfrom PasswordStores:PasswordManagersHijackExecutionFlow: PathInterception byUnquoted PathArchiveCollectedData:Archive viaUtilityVirtualization/SandboxEvasion: Time BasedEvasionCompromiseInfrastructure:DNS ServerBoot orLogonAutostartExecution:Active SetupTaintSharedContentCompromiseInfrastructure:DomainsExfiltration OverAlternativeProtocol:Exfiltration OverUnencryptedNon-C2 ProtocolPhishing forInformation:SpearphishingAttachmentBITSJobsCompromiseInfrastructure:BotnetPhishing forInformation:SpearphishingVoiceOSCredentialDumping:LSA SecretsInter-ProcessCommunication:Dynamic DataExchangeApplicationLayerProtocol:MailProtocolsCredentialsfromPasswordStores:KeychainIndicatorRemoval:ClearCommandHistoryModifyAuthenticationProcess:DomainControllerAuthenticationSearch OpenTechnicalDatabases:DigitalCertificatesProcessInjection:PortableExecutableInjectionSystemBinary ProxyExecution:InstallUtilHijackExecutionFlow: DLLSide-LoadingSteal orForgeKerberosTicketsBoot or LogonAutostartExecution:ShortcutModificationCreate orModify SystemProcess:LaunchDaemonUnsecuredCredentials:ContainerAPICreate orModifySystemProcess:Launch AgentSystemBinary ProxyExecution:MsiexecCompromiseInfrastructureAccountDiscoveryTemplateInjectionTrafficSignaling:PortKnockingHijack ExecutionFlow: PathInterception byPATHEnvironmentVariableServerSoftwareComponent:TransportAgentAccountManipulation:AdditionalContainerCluster RolesAcquireInfrastructure:ServerlessSubvert TrustControls:Code SigningPolicyModificationSteal orForgeKerberosTickets:Silver TicketGroupPolicyDiscoveryObfuscatedFiles orInformation:HTMLSmugglingMasquerading:MatchLegitimateName orLocationContentInjectionEndpoint Denialof Service:ApplicationExhaustionFloodUse AlternateAuthenticationMaterial:ApplicationAccess TokenAudioCaptureReflectiveCodeLoadingMulti-StageChannelsDynamicResolution:DomainGenerationAlgorithmsAcquireInfrastructure:BotnetProcessInjection:AsynchronousProcedureCallCommandand ScriptingInterpreter:LuaObfuscatedFiles orInformation:StrippedPayloadsGatherVictimHostInformationBrowserSessionHijackingAcquireAccessAbuseElevationControlMechanism:Setuid andSetgidTrafficSignaling:SocketFiltersServerlessExecutionExploitPublic-FacingApplicationAutomatedCollectionBoot or LogonAutostartExecution:XDG AutostartEntriesUnsecuredCredentials:CloudInstanceMetadata APIValidAccounts:DefaultAccountsResourceHijackingDrive-byCompromiseUnsecuredCredentials:Group PolicyPreferencesOfficeApplicationStartup:Office TestServerSoftwareComponent:TerminalServices DLLDataEncoding:Non-StandardEncodingSystemBinary ProxyExecution:MavinjectPhishing:Spearphishingvia ServiceEndpointDenial ofService: OSExhaustionFloodWeb Service:One-WayCommunicationReplicationThroughRemovableMediaData fromConfigurationRepository:Network DeviceConfigurationDumpCommandand ScriptingInterpreter:Unix ShellHijackExecution Flow:ExecutableInstaller FilePermissionsWeaknessIndicatorRemoval:Clear Linuxor MacSystem LogsAcquireInfrastructure:ServerPre-OSBoot:ComponentFirmwareHardwareAdditionsNetworkDenial ofService: DirectNetwork FloodRootkitWeakenEncryption:DisableCryptoHardwareAcquireInfrastructureDataDestructionHijackExecutionFlow: DylibHijackingSystemTimeDiscoverySearch OpenWebsites/DomainsExfiltrationOver WebService:Exfiltration toText StorageSitesSystemServices:LaunchctlSearchOpenTechnicalDatabases:WHOISInternalSpearphishingObtainCapabilities:CodeSigningCertificatesEvent TriggeredExecution:LC_LOAD_DYLIBAdditionAccountDiscovery:DomainAccountBoot orLogonInitializationScripts:Startup ItemsAccountManipulationExfiltrationOver PhysicalMedium:Exfiltrationover USBBoot or LogonAutostartExecution:SecuritySupportProviderPowerSettingsModify CloudComputeInfrastructure:Delete CloudInstanceArchiveCollectedData:Archive viaLibraryBoot orLogonInitializationScripts: RCScriptsInputCapture:KeyloggingTrustedDeveloperUtilities ProxyExecution:ClickOnceOSCredentialDumping:ProcFilesystemBoot or LogonAutostartExecution:AuthenticationPackageCompromiseInfrastructure:NetworkDevicesExfiltrationOver WebService:Exfiltration toCodeRepositoryHideArtifacts:ResourceForkingUnsecuredCredentials:PrivateKeysSystemServices:ServiceExecutionEvent TriggeredExecution:ComponentObject ModelHijackingProxy:DomainFrontingEstablishAccountsSystemBinary ProxyExecution:CMSTPUnsecuredCredentials:BashHistoryData fromRemovableMediaGatherVictimNetworkInformationStageCapabilities:UploadMalwareBoot or LogonInitializationScripts:NetworkLogon ScriptObfuscatedFiles orInformation:LNK IconSmugglingIndicatorRemoval:Network ShareConnectionRemovalCredentialsfromPasswordStoresCompromiseAccountsSystemNetworkConnectionsDiscoveryStealApplicationAccessTokenNetworkShareDiscoveryModifyAuthenticationProcess:NetworkProvider DLLOfficeApplicationStartupStageCapabilities:SEOPoisoningAdversary-in-the-MiddleMasquerading:MasqueradeAccount NameRemoteServices:RemoteDesktopProtocolCreate orModify SystemProcess:SystemdServiceAccountManipulation:Additional Localor DomainGroupsNetworkDenial ofService:ReflectionAmplificationEmailCollection:Local EmailCollectionAbuse ElevationControlMechanism:Bypass UserAccount ControlSubvertTrustControls:GatekeeperBypassGatherVictim HostInformation:FirmwareApplicationLayerProtocol: FileTransferProtocolsMulti-FactorAuthenticationInterceptionModifySystemImageAdversary-in-the-Middle: ARPCachePoisoningScheduledTask/Job:CronDiskWipeAcquireInfrastructure:Virtual PrivateServerMasquerading:Space afterFilenameIndicatorRemoval:TimestompTransferData toCloudAccountMasquerading:Break ProcessTreesScheduledTask/JobPre-OSBoot:SystemFirmwareEvent TriggeredExecution:Change DefaultFile AssociationObfuscated Files orInformation:Encrypted/EncodedFileDynamicResolutionUse AlternateAuthenticationMaterial: Passthe HashObtainCapabilitiesRogueDomainControllerPermissionGroupsDiscovery:CloudGroupsExfiltrationOverPhysicalMediumEventTriggeredExecution:AppCertDLLsModify CloudComputeInfrastructure:Create CloudInstanceServerSoftwareComponent:IISComponentsScheduledTransferDirectVolumeAccessNetworkServiceDiscoveryCloudServiceDashboardDomain orTenant PolicyModification:TrustModificationEventTriggeredExecution:AccessibilityFeaturesSystemLocationDiscovery:SystemLanguageDiscoveryAbuseElevationControlMechanism:Sudo and SudoCachingAcquireInfrastructure:DNS ServerExploitationforCredentialAccessModify CloudComputeInfrastructure:Revert CloudInstanceAcquireInfrastructure:MalvertisingInputCaptureIndicatorRemoval:ClearWindowsEvent LogsSearch OpenTechnicalDatabases:DNS/PassiveDNSHideArtifacts:VBAStompingDevelopCapabilities:MalwareExfiltrationOverAlternativeProtocolEventTriggeredExecution:PowerShellProfileProcessInjection:Thread LocalStorageEncryptedChannelObfuscatedFiles orInformation:SoftwarePackingHideArtifacts:Run VirtualInstanceEmailCollectionUserExecution:MaliciousLink

MITRE ATT&CK Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
  1. Compromise Infrastructure: Virtual Private Server
  2. Gather Victim Identity Information: Employee Names
  3. Masquerading: Rename System Utilities
  4. Data Manipulation: Runtime Data Manipulation
  5. Acquire Infrastructure: Domains
  6. Inhibit System Recovery
  7. OS Credential Dumping: LSASS Memory
  8. Fallback Channels
  9. Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol
  10. Process Injection: Extra Window Memory Injection
  11. Application Window Discovery
  12. Process Injection: VDSO Hijacking
  13. Endpoint Denial of Service: Application or System Exploitation
  14. Event Triggered Execution: Unix Shell Configuration Modification
  15. Hijack Execution Flow: COR_PROFILER
  16. Use Alternate Authentication Material: Pass the Ticket
  17. Event Triggered Execution
  18. Impair Defenses: Impair Command History Logging
  19. Search Open Technical Databases: CDNs
  20. System Binary Proxy Execution: Electron Applications
  21. OS Credential Dumping: NTDS
  22. Obfuscated Files or Information: Binary Padding
  23. File and Directory Discovery
  24. Inter-Process Communication: XPC Services
  25. Command and Scripting Interpreter: Windows Command Shell
  26. OS Credential Dumping: DCSync
  27. Account Manipulation: Additional Cloud Roles
  28. Browser Information Discovery
  29. Modify Authentication Process: Hybrid Identity
  30. Application Layer Protocol: Publish/Subscribe Protocols
  31. Create Account: Local Account
  32. Valid Accounts: Cloud Accounts
  33. File and Directory Permissions Modification: Windows File and Directory Permissions Modification
  34. Unsecured Credentials: Credentials in Registry
  35. Steal Web Session Cookie
  36. Event Triggered Execution: Screensaver
  37. Modify Cloud Resource Hierarchy
  38. Data from Cloud Storage
  39. Gather Victim Identity Information
  40. Indicator Removal: Clear Persistence
  41. Boot or Logon Autostart Execution: Re-opened Applications
  42. Boot or Logon Autostart Execution: Winlogon Helper DLL
  43. Impair Defenses: Spoof Security Alerting
  44. Compromise Host Software Binary
  45. Active Scanning
  46. System Binary Proxy Execution: Compiled HTML File
  47. Encrypted Channel: Symmetric Cryptography
  48. Valid Accounts: Domain Accounts
  49. Data Obfuscation: Steganography
  50. Data Transfer Size Limits
  51. Boot or Logon Autostart Execution: Port Monitors
  52. Phishing for Information: Spearphishing Service
  53. Compromise Infrastructure: Web Services
  54. System Binary Proxy Execution: MMC
  55. Impair Defenses: Disable or Modify Linux Audit System
  56. Build Image on Host
  57. Process Discovery
  58. Defacement: Internal Defacement
  59. Search Closed Sources
  60. Command and Scripting Interpreter: Python
  61. Pre-OS Boot: Bootkit
  62. Phishing
  63. Account Manipulation: Additional Cloud Credentials
  64. Data Obfuscation
  65. Steal or Forge Authentication Certificates
  66. Remote Services: Cloud Services
  67. System Network Configuration Discovery: Wi-Fi Discovery
  68. Hijack Execution Flow: Path Interception by Search Order Hijacking
  69. Event Triggered Execution: Trap
  70. Indicator Removal: File Deletion
  71. Archive Collected Data: Archive via Custom Method
  72. Software Discovery: Security Software Discovery
  73. Stage Capabilities: Upload Tool
  74. Dynamic Resolution: Fast Flux DNS
  75. File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification
  76. Abuse Elevation Control Mechanism
  77. Process Injection
  78. Create Account: Domain Account
  79. Inter-Process Communication: Component Object Model
  80. Data Manipulation: Stored Data Manipulation
  81. Process Injection: Ptrace System Calls
  82. Event Triggered Execution: AppInit DLLs
  83. Encrypted Channel: Asymmetric Cryptography
  84. Trusted Developer Utilities Proxy Execution
  85. Modify Authentication Process: Multi-Factor Authentication
  86. Web Service: Bidirectional Communication
  87. Access Token Manipulation: Parent PID Spoofing
  88. Pre-OS Boot
  89. Exfiltration Over C2 Channel
  90. Pre-OS Boot: TFTP Boot
  91. Indicator Removal: Clear Network Connection History and Configurations
  92. Defacement: External Defacement
  93. Escape to Host
  94. Data from Information Repositories: Code Repositories
  95. Modify Authentication Process: Pluggable Authentication Modules
  96. File and Directory Permissions Modification
  97. Exploitation for Client Execution
  98. OS Credential Dumping
  99. Subvert Trust Controls: Mark-of-the-Web Bypass
  100. Boot or Logon Autostart Execution: Print Processors
  101. System Owner/User Discovery
  102. Non-Application Layer Protocol
  103. Deploy Container
  104. Obfuscated Files or Information
  105. Search Open Websites/Domains: Search Engines
  106. Application Layer Protocol
  107. Impair Defenses: Disable or Modify Cloud Logs
  108. Subvert Trust Controls: Install Root Certificate
  109. Exfiltration Over Other Network Medium
  110. Dynamic Resolution: DNS Calculation
  111. Abuse Elevation Control Mechanism: Elevated Execution with Prompt
  112. Phishing: Spearphishing Attachment
  113. Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
  114. Obfuscated Files or Information: Command Obfuscation
  115. Cloud Service Discovery
  116. Impair Defenses: Indicator Blocking
  117. System Binary Proxy Execution: Control Panel
  118. Stage Capabilities: Install Digital Certificate
  119. Access Token Manipulation: Token Impersonation/Theft
  120. Exfiltration Over Web Service
  121. Peripheral Device Discovery
  122. Debugger Evasion
  123. Virtualization/Sandbox Evasion: User Activity Based Checks
  124. Data Manipulation: Transmitted Data Manipulation
  125. Valid Accounts: Local Accounts
  126. Data Manipulation
  127. Multi-Factor Authentication Request Generation
  128. Input Capture: Web Portal Capture
  129. Windows Management Instrumentation
  130. Pre-OS Boot: ROMMONkit
  131. Proxy: Multi-hop Proxy
  132. Account Discovery: Cloud Account
  133. Command and Scripting Interpreter
  134. Data from Local System
  135. Data from Information Repositories: Messaging Applications
  136. Impair Defenses: Disable or Modify System Firewall
  137. Event Triggered Execution: Application Shimming
  138. Server Software Component
  139. Stage Capabilities: Drive-by Target
  140. Modify Authentication Process: Network Device Authentication
  141. Disk Wipe: Disk Content Wipe
  142. Command and Scripting Interpreter: PowerShell
  143. Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
  144. Container and Resource Discovery
  145. System Service Discovery
  146. Access Token Manipulation: Create Process with Token
  147. Event Triggered Execution: Udev Rules
  148. Log Enumeration
  149. Permission Groups Discovery
  150. Brute Force: Password Guessing
  151. Execution Guardrails
  152. Account Discovery: Email Account
  153. Command and Scripting Interpreter: Cloud API
  154. System Script Proxy Execution: SyncAppvPublishingServer
  155. Search Victim-Owned Websites
  156. Data from Information Repositories: Confluence
  157. Automated Exfiltration: Traffic Duplication
  158. Network Boundary Bridging
  159. Software Discovery
  160. Screen Capture
  161. Search Open Technical Databases
  162. Stage Capabilities: Link Target
  163. Gather Victim Network Information: Network Security Appliances
  164. Clipboard Data
  165. Event Triggered Execution: Netsh Helper DLL
  166. Data from Information Repositories
  167. Event Triggered Execution: Emond
  168. Obfuscated Files or Information: Indicator Removal from Tools
  169. Data from Information Repositories: Sharepoint
  170. Office Application Startup: Outlook Rules
  171. Supply Chain Compromise: Compromise Software Supply Chain
  172. Adversary-in-the-Middle: Evil Twin
  173. Exploitation for Privilege Escalation
  174. Access Token Manipulation: Make and Impersonate Token
  175. Execution Guardrails: Mutual Exclusion
  176. Permission Groups Discovery: Local Groups
  177. Automated Exfiltration
  178. Virtualization/Sandbox Evasion: System Checks
  179. Command and Scripting Interpreter: JavaScript
  180. Boot or Logon Autostart Execution
  181. Data from Network Shared Drive
  182. Modify Authentication Process: Reversible Encryption
  183. Resource Hijacking: SMS Pumping
  184. Permission Groups Discovery: Domain Groups
  185. Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
  186. Account Manipulation: Additional Email Delegate Permissions
  187. name
  188. Forced Authentication
  189. Masquerading: Invalid Code Signature
  190. Credentials from Password Stores: Credentials from Web Browsers
  191. Data Encoding
  192. Brute Force
  193. Proxy
  194. External Remote Services
  195. Hide Artifacts: File/Path Exclusions
  196. Trusted Developer Utilities Proxy Execution: MSBuild
  197. Archive Collected Data
  198. Brute Force: Password Cracking
  199. Gather Victim Network Information: IP Addresses
  200. Command and Scripting Interpreter: AppleScript
  201. Remote Service Session Hijacking: RDP Hijacking
  202. Phishing: Spearphishing Link
  203. Forge Web Credentials: SAML Tokens
  204. Cloud Storage Object Discovery
  205. Non-Standard Port
  206. Obtain Capabilities: Exploits
  207. Create Account
  208. Steal or Forge Kerberos Tickets: Kerberoasting
  209. Command and Scripting Interpreter: AutoHotKey & AutoIT
  210. Impair Defenses: Disable or Modify Tools
  211. Modify Cloud Compute Infrastructure: Create Snapshot
  212. Develop Capabilities: Code Signing Certificates
  213. Office Application Startup: Add-ins
  214. Domain or Tenant Policy Modification
  215. System Script Proxy Execution
  216. Exfiltration Over Web Service: Exfiltration to Cloud Storage
  217. Email Collection: Remote Email Collection
  218. System Script Proxy Execution: PubPrn
  219. Boot or Logon Autostart Execution: Kernel Modules and Extensions
  220. Impair Defenses: Disable or Modify Cloud Firewall
  221. Gather Victim Org Information: Business Relationships
  222. Forge Web Credentials: Web Cookies
  223. Data Encrypted for Impact
  224. Adversary-in-the-Middle: DHCP Spoofing
  225. Modify Authentication Process: Conditional Access Policies
  226. Modify Authentication Process: Password Filter DLL
  227. Develop Capabilities
  228. Search Closed Sources: Threat Intel Vendors
  229. Protocol Tunneling
  230. Supply Chain Compromise: Compromise Hardware Supply Chain
  231. Process Injection: Thread Execution Hijacking
  232. Remote Services: Distributed Component Object Model
  233. Create Account: Cloud Account
  234. Supply Chain Compromise
  235. Input Capture: GUI Input Capture
  236. Trusted Relationship
  237. Gather Victim Host Information: Hardware
  238. Lateral Tool Transfer
  239. Compromise Infrastructure: Serverless
  240. Application Layer Protocol: Web Protocols
  241. Phishing for Information: Spearphishing Link
  242. Active Scanning: Vulnerability Scanning
  243. Resource Hijacking: Bandwidth Hijacking
  244. Active Scanning: Scanning IP Blocks
  245. Application Layer Protocol: DNS
  246. Hide Artifacts: Ignore Process Interrupts
  247. Container Administration Command
  248. Gather Victim Org Information: Identify Roles
  249. Gather Victim Host Information: Client Configurations
  250. System Binary Proxy Execution: Verclsid
  251. Shared Modules
  252. Financial Theft
  253. Plist File Modification
  254. Exfiltration Over Web Service: Exfiltration Over Webhook
  255. Hide Artifacts: Hidden Window
  256. Obtain Capabilities: Artificial Intelligence
  257. Modify Authentication Process
  258. Email Collection: Email Forwarding Rule
  259. Subvert Trust Controls: SIP and Trust Provider Hijacking
  260. Unused/Unsupported Cloud Regions
  261. Hide Artifacts
  262. Phishing for Information
  263. Hijack Execution Flow: KernelCallbackTable
  264. Data Staged: Remote Data Staging
  265. Obtain Capabilities: Digital Certificates
  266. Remote Services: VNC
  267. OS Credential Dumping: Security Account Manager
  268. Firmware Corruption
  269. Endpoint Denial of Service
  270. Boot or Logon Autostart Execution: LSASS Driver
  271. Office Application Startup: Office Template Macros
  272. Gather Victim Org Information: Identify Business Tempo
  273. Subvert Trust Controls: Code Signing
  274. Subvert Trust Controls
  275. Process Injection: Proc Memory
  276. Remote Services
  277. Search Open Websites/Domains: Social Media
  278. Gather Victim Identity Information: Credentials
  279. Data Staged: Local Data Staging
  280. Process Injection: Process Doppelgänging
  281. Proxy: External Proxy
  282. Gather Victim Host Information: Software
  283. Boot or Logon Autostart Execution: Login Items
  284. Remote System Discovery
  285. Impair Defenses: Disable Windows Event Logging
  286. Obfuscated Files or Information: Compile After Delivery
  287. Gather Victim Network Information: Domain Properties
  288. Hide Artifacts: Hidden Files and Directories
  289. Network Boundary Bridging: Network Address Translation Traversal
  290. Scheduled Task/Job: At
  291. Scheduled Task/Job: Scheduled Task
  292. Establish Accounts: Email Accounts
  293. Remote Services: Windows Remote Management
  294. Data Encoding: Standard Encoding
  295. System Binary Proxy Execution: Regsvcs/Regasm
  296. Stage Capabilities
  297. Weaken Encryption
  298. Password Policy Discovery
  299. Compromise Accounts: Social Media Accounts
  300. Steal or Forge Kerberos Tickets: AS-REP Roasting
  301. Resource Hijacking: Cloud Service Hijacking
  302. Credentials from Password Stores: Securityd Memory
  303. Network Sniffing
  304. Process Injection: Process Hollowing
  305. Data Obfuscation: Junk Data
  306. Event Triggered Execution: Windows Management Instrumentation Event Subscription
  307. Use Alternate Authentication Material: Web Session Cookie
  308. Indicator Removal: Clear Mailbox Data
  309. Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth
  310. Resource Hijacking: Compute Hijacking
  311. Access Token Manipulation
  312. Native API
  313. System Network Configuration Discovery
  314. Query Registry
  315. Data from Configuration Repository: SNMP (MIB Dump)
  316. Scheduled Task/Job: Container Orchestration Job
  317. Data Staged
  318. Active Scanning: Wordlist Scanning
  319. Command and Scripting Interpreter: Visual Basic
  320. Hijack Execution Flow: AppDomainManager
  321. Data Destruction: Lifecycle-Triggered Deletion
  322. Execution Guardrails: Environmental Keying
  323. Event Triggered Execution: Installer Packages
  324. Supply Chain Compromise: Compromise Software Dependencies and Development Tools
  325. Compromise Accounts: Email Accounts
  326. Obtain Capabilities: Tool
  327. Search Closed Sources: Purchase Technical Data
  328. System Shutdown/Reboot
  329. Unsecured Credentials: Credentials In Files
  330. Command and Scripting Interpreter: Network Device CLI
  331. Account Manipulation: Device Registration
  332. Acquire Infrastructure: Web Services
  333. Hide Artifacts: Hidden File System
  334. Steal or Forge Kerberos Tickets: Ccache Files
  335. Gather Victim Network Information: Network Topology
  336. Phishing: Spearphishing Voice
  337. Deobfuscate/Decode Files or Information
  338. Indirect Command Execution
  339. System Information Discovery
  340. Data from Configuration Repository
  341. Hijack Execution Flow: Services File Permissions Weakness
  342. Hijack Execution Flow: DLL Search Order Hijacking
  343. Obfuscated Files or Information: Polymorphic Code
  344. Obtain Capabilities: Malware
  345. Obfuscated Files or Information: Fileless Storage
  346. Use Alternate Authentication Material
  347. Remote Services: Direct Cloud VM Connections
  348. Proxy: Internal Proxy
  349. System Binary Proxy Execution
  350. Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access
  351. Search Open Websites/Domains: Code Repositories
  352. Gather Victim Network Information: DNS
  353. Boot or Logon Initialization Scripts: Logon Script (Windows)
  354. Credentials from Password Stores: Windows Credential Manager
  355. Process Injection: Dynamic-link Library Injection
  356. System Network Configuration Discovery: Internet Connection Discovery
  357. Gather Victim Org Information: Determine Physical Locations
  358. Masquerading: Double File Extension
  359. Server Software Component: Web Shell
  360. System Binary Proxy Execution: Rundll32
  361. System Services
  362. Traffic Signaling
  363. User Execution
  364. Office Application Startup: Outlook Home Page
  365. User Execution: Malicious Image
  366. Impersonation
  367. Input Capture: Credential API Hooking
  368. Hijack Execution Flow: Dynamic Linker Hijacking
  369. Exploitation for Defense Evasion
  370. Masquerading: Masquerade File Type
  371. Valid Accounts
  372. Device Driver Discovery
  373. Develop Capabilities: Exploits
  374. Video Capture
  375. Create or Modify System Process: Container Service
  376. Masquerading: Right-to-Left Override
  377. Account Manipulation: SSH Authorized Keys
  378. Exploitation of Remote Services
  379. Obtain Capabilities: Vulnerabilities
  380. System Binary Proxy Execution: Odbcconf
  381. Compromise Infrastructure: Server
  382. Disk Wipe: Disk Structure Wipe
  383. Virtualization/Sandbox Evasion
  384. Gather Victim Network Information: Network Trust Dependencies
  385. Account Discovery: Local Account
  386. Network Denial of Service
  387. Boot or Logon Autostart Execution: Time Providers
  388. Event Triggered Execution: Image File Execution Options Injection
  389. System Binary Proxy Execution: Mshta
  390. Hide Infrastructure
  391. Impair Defenses: Downgrade Attack
  392. Abuse Elevation Control Mechanism: TCC Manipulation
  393. Masquerading: Masquerade Task or Service
  394. Hide Artifacts: NTFS File Attributes
  395. Boot or Logon Initialization Scripts: Login Hook
  396. Office Application Startup: Outlook Forms
  397. Impair Defenses
  398. Data from Information Repositories: Customer Relationship Management Software
  399. Develop Capabilities: Digital Certificates
  400. Boot or Logon Initialization Scripts
  401. Modify System Image: Downgrade System Image
  402. Service Stop
  403. Credentials from Password Stores: Cloud Secrets Management Stores
  404. Forge Web Credentials
  405. Search Open Technical Databases: Scan Databases
  406. Brute Force: Credential Stuffing
  407. Cloud Infrastructure Discovery
  408. Compromise Accounts: Cloud Accounts
  409. Steal or Forge Kerberos Tickets: Golden Ticket
  410. Establish Accounts: Cloud Accounts
  411. Remote Services: SSH
  412. Server Software Component: SQL Stored Procedures
  413. User Execution: Malicious File
  414. Browser Extensions
  415. Unsecured Credentials: Chat Messages
  416. Web Service
  417. System Location Discovery
  418. Domain or Tenant Policy Modification: Group Policy Modification
  419. Obfuscated Files or Information: Embedded Payloads
  420. Implant Internal Image
  421. Remote Access Software
  422. Modify Cloud Compute Infrastructure
  423. Endpoint Denial of Service: Service Exhaustion Flood
  424. Create or Modify System Process
  425. Weaken Encryption: Reduce Key Space
  426. Process Injection: ListPlanting
  427. OS Credential Dumping: /etc/passwd and /etc/shadow
  428. Remote Services: SMB/Windows Admin Shares
  429. Establish Accounts: Social Media Accounts
  430. Scheduled Task/Job: Systemd Timers
  431. Create or Modify System Process: Windows Service
  432. Indicator Removal: Relocate Malware
  433. Obfuscated Files or Information: Steganography
  434. Data Obfuscation: Protocol or Service Impersonation
  435. System Binary Proxy Execution: Regsvr32
  436. Modify System Image: Patch System Image
  437. Hide Artifacts: Process Argument Spoofing
  438. Ingress Tool Transfer
  439. Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations
  440. Gather Victim Org Information
  441. Gather Victim Identity Information: Email Addresses
  442. Hide Artifacts: Email Hiding Rules
  443. Defacement
  444. OS Credential Dumping: Cached Domain Credentials
  445. Remote Service Session Hijacking
  446. Indicator Removal
  447. Remote Service Session Hijacking: SSH Hijacking
  448. Modify Registry
  449. Hijack Execution Flow
  450. Impair Defenses: Safe Mode Boot
  451. Obfuscated Files or Information: Dynamic API Resolution
  452. XSL Script Processing
  453. Domain Trust Discovery
  454. Unsecured Credentials
  455. Hide Artifacts: Hidden Users
  456. Masquerading
  457. Brute Force: Password Spraying
  458. Account Access Removal
  459. Communication Through Removable Media
  460. Access Token Manipulation: SID-History Injection
  461. Inter-Process Communication
  462. Cloud Administration Command
  463. Hijack Execution Flow: Services Registry Permissions Weakness
  464. Web Service: Dead Drop Resolver
  465. Software Deployment Tools
  466. Credentials from Password Stores: Password Managers
  467. Hijack Execution Flow: Path Interception by Unquoted Path
  468. Archive Collected Data: Archive via Utility
  469. Virtualization/Sandbox Evasion: Time Based Evasion
  470. Compromise Infrastructure: DNS Server
  471. Boot or Logon Autostart Execution: Active Setup
  472. Taint Shared Content
  473. Compromise Infrastructure: Domains
  474. Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol
  475. Phishing for Information: Spearphishing Attachment
  476. BITS Jobs
  477. Compromise Infrastructure: Botnet
  478. Phishing for Information: Spearphishing Voice
  479. OS Credential Dumping: LSA Secrets
  480. Inter-Process Communication: Dynamic Data Exchange
  481. Application Layer Protocol: Mail Protocols
  482. Credentials from Password Stores: Keychain
  483. Indicator Removal: Clear Command History
  484. Modify Authentication Process: Domain Controller Authentication
  485. Search Open Technical Databases: Digital Certificates
  486. Process Injection: Portable Executable Injection
  487. System Binary Proxy Execution: InstallUtil
  488. Hijack Execution Flow: DLL Side-Loading
  489. Steal or Forge Kerberos Tickets
  490. Boot or Logon Autostart Execution: Shortcut Modification
  491. Create or Modify System Process: Launch Daemon
  492. Unsecured Credentials: Container API
  493. Create or Modify System Process: Launch Agent
  494. System Binary Proxy Execution: Msiexec
  495. Compromise Infrastructure
  496. Account Discovery
  497. Template Injection
  498. Traffic Signaling: Port Knocking
  499. Hijack Execution Flow: Path Interception by PATH Environment Variable
  500. Server Software Component: Transport Agent
  501. Account Manipulation: Additional Container Cluster Roles
  502. Acquire Infrastructure: Serverless
  503. Subvert Trust Controls: Code Signing Policy Modification
  504. Steal or Forge Kerberos Tickets: Silver Ticket
  505. Group Policy Discovery
  506. Obfuscated Files or Information: HTML Smuggling
  507. Masquerading: Match Legitimate Name or Location
  508. Content Injection
  509. Endpoint Denial of Service: Application Exhaustion Flood
  510. Use Alternate Authentication Material: Application Access Token
  511. Audio Capture
  512. Reflective Code Loading
  513. Multi-Stage Channels
  514. Dynamic Resolution: Domain Generation Algorithms
  515. Acquire Infrastructure: Botnet
  516. Process Injection: Asynchronous Procedure Call
  517. Command and Scripting Interpreter: Lua
  518. Obfuscated Files or Information: Stripped Payloads
  519. Gather Victim Host Information
  520. Browser Session Hijacking
  521. Acquire Access
  522. Abuse Elevation Control Mechanism: Setuid and Setgid
  523. Traffic Signaling: Socket Filters
  524. Serverless Execution
  525. Exploit Public-Facing Application
  526. Automated Collection
  527. Boot or Logon Autostart Execution: XDG Autostart Entries
  528. Unsecured Credentials: Cloud Instance Metadata API
  529. Valid Accounts: Default Accounts
  530. Resource Hijacking
  531. Drive-by Compromise
  532. Unsecured Credentials: Group Policy Preferences
  533. Office Application Startup: Office Test
  534. Server Software Component: Terminal Services DLL
  535. Data Encoding: Non-Standard Encoding
  536. System Binary Proxy Execution: Mavinject
  537. Phishing: Spearphishing via Service
  538. Endpoint Denial of Service: OS Exhaustion Flood
  539. Web Service: One-Way Communication
  540. Replication Through Removable Media
  541. Data from Configuration Repository: Network Device Configuration Dump
  542. Command and Scripting Interpreter: Unix Shell
  543. Hijack Execution Flow: Executable Installer File Permissions Weakness
  544. Indicator Removal: Clear Linux or Mac System Logs
  545. Acquire Infrastructure: Server
  546. Pre-OS Boot: Component Firmware
  547. Hardware Additions
  548. Network Denial of Service: Direct Network Flood
  549. Rootkit
  550. Weaken Encryption: Disable Crypto Hardware
  551. Acquire Infrastructure
  552. Data Destruction
  553. Hijack Execution Flow: Dylib Hijacking
  554. System Time Discovery
  555. Search Open Websites/Domains
  556. Exfiltration Over Web Service: Exfiltration to Text Storage Sites
  557. System Services: Launchctl
  558. Search Open Technical Databases: WHOIS
  559. Internal Spearphishing
  560. Obtain Capabilities: Code Signing Certificates
  561. Event Triggered Execution: LC_LOAD_DYLIB Addition
  562. Account Discovery: Domain Account
  563. Boot or Logon Initialization Scripts: Startup Items
  564. Account Manipulation
  565. Exfiltration Over Physical Medium: Exfiltration over USB
  566. Boot or Logon Autostart Execution: Security Support Provider
  567. Power Settings
  568. Modify Cloud Compute Infrastructure: Delete Cloud Instance
  569. Archive Collected Data: Archive via Library
  570. Boot or Logon Initialization Scripts: RC Scripts
  571. Input Capture: Keylogging
  572. Trusted Developer Utilities Proxy Execution: ClickOnce
  573. OS Credential Dumping: Proc Filesystem
  574. Boot or Logon Autostart Execution: Authentication Package
  575. Compromise Infrastructure: Network Devices
  576. Exfiltration Over Web Service: Exfiltration to Code Repository
  577. Hide Artifacts: Resource Forking
  578. Unsecured Credentials: Private Keys
  579. System Services: Service Execution
  580. Event Triggered Execution: Component Object Model Hijacking
  581. Proxy: Domain Fronting
  582. Establish Accounts
  583. System Binary Proxy Execution: CMSTP
  584. Unsecured Credentials: Bash History
  585. Data from Removable Media
  586. Gather Victim Network Information
  587. Stage Capabilities: Upload Malware
  588. Boot or Logon Initialization Scripts: Network Logon Script
  589. Obfuscated Files or Information: LNK Icon Smuggling
  590. Indicator Removal: Network Share Connection Removal
  591. Credentials from Password Stores
  592. Compromise Accounts
  593. System Network Connections Discovery
  594. Steal Application Access Token
  595. Network Share Discovery
  596. Modify Authentication Process: Network Provider DLL
  597. Office Application Startup
  598. Stage Capabilities: SEO Poisoning
  599. Adversary-in-the-Middle
  600. Masquerading: Masquerade Account Name
  601. Remote Services: Remote Desktop Protocol
  602. Create or Modify System Process: Systemd Service
  603. Account Manipulation: Additional Local or Domain Groups
  604. Network Denial of Service: Reflection Amplification
  605. Email Collection: Local Email Collection
  606. Abuse Elevation Control Mechanism: Bypass User Account Control
  607. Subvert Trust Controls: Gatekeeper Bypass
  608. Gather Victim Host Information: Firmware
  609. Application Layer Protocol: File Transfer Protocols
  610. Multi-Factor Authentication Interception
  611. Modify System Image
  612. Adversary-in-the-Middle: ARP Cache Poisoning
  613. Scheduled Task/Job: Cron
  614. Disk Wipe
  615. Acquire Infrastructure: Virtual Private Server
  616. Masquerading: Space after Filename
  617. Indicator Removal: Timestomp
  618. Transfer Data to Cloud Account
  619. Masquerading: Break Process Trees
  620. Scheduled Task/Job
  621. Pre-OS Boot: System Firmware
  622. Event Triggered Execution: Change Default File Association
  623. Obfuscated Files or Information: Encrypted/Encoded File
  624. Dynamic Resolution
  625. Use Alternate Authentication Material: Pass the Hash
  626. Obtain Capabilities
  627. Rogue Domain Controller
  628. Permission Groups Discovery: Cloud Groups
  629. Exfiltration Over Physical Medium
  630. Event Triggered Execution: AppCert DLLs
  631. Modify Cloud Compute Infrastructure: Create Cloud Instance
  632. Server Software Component: IIS Components
  633. Scheduled Transfer
  634. Direct Volume Access
  635. Network Service Discovery
  636. Cloud Service Dashboard
  637. Domain or Tenant Policy Modification: Trust Modification
  638. Event Triggered Execution: Accessibility Features
  639. System Location Discovery: System Language Discovery
  640. Abuse Elevation Control Mechanism: Sudo and Sudo Caching
  641. Acquire Infrastructure: DNS Server
  642. Exploitation for Credential Access
  643. Modify Cloud Compute Infrastructure: Revert Cloud Instance
  644. Acquire Infrastructure: Malvertising
  645. Input Capture
  646. Indicator Removal: Clear Windows Event Logs
  647. Search Open Technical Databases: DNS/Passive DNS
  648. Hide Artifacts: VBA Stomping
  649. Develop Capabilities: Malware
  650. Exfiltration Over Alternative Protocol
  651. Event Triggered Execution: PowerShell Profile
  652. Process Injection: Thread Local Storage
  653. Encrypted Channel
  654. Obfuscated Files or Information: Software Packing
  655. Hide Artifacts: Run Virtual Instance
  656. Email Collection
  657. User Execution: Malicious Link