MITRE ATT&CK

Adversary tactics and techniques framework

714
Techniques
14
Tactics
0
Mitigations
4.632
Actor-Technique Links
MITRE ATT&CK 714
ID Techniques Tactic Platforms Threat Actors Actions
T1530 Data from Cloud Storage Collection IaaS, Office Suite, 5
T1531 Account Access Removal Impact Linux, macOS, Window... 2
T1534 Internal Spearphishing Lateral Movement Linux, macOS, Office... 6
T1535 Unused/Unsupported Cloud Regions Stealth IaaS 0
T1537 Transfer Data to Cloud Account Exfiltration IaaS, Office Suite, 3
T1538 Cloud Service Dashboard Discovery IaaS, SaaS, Office S... 1
T1539 Steal Web Session Cookie Credential Access Linux, macOS, Office... 8
T1542 Pre-OS Boot Persistence, Stealth Linux, macOS, Networ... 0
T1542.001 System Firmware Sub Persistence, Stealth Network Devices, Win 0
T1542.002 Component Firmware Sub Persistence, Stealth Windows, Linux, macO 1
T1542.003 Bootkit Sub Persistence, Stealth Linux, Windows 3
T1542.004 ROMMONkit Sub Persistence, Stealth Network Devices 0
T1542.005 TFTP Boot Sub Persistence, Stealth Network Devices 0
T1543 Create or Modify System Process Persistence, Privilege Es... Containers, Linux, m... 0
T1543.001 Launch Agent Sub Persistence, Privilege Es... macOS 1
T1543.002 Systemd Service Sub Persistence, Privilege Es... Linux 3
T1543.003 Windows Service Sub Persistence, Privilege Es... Windows 26
T1543.004 Launch Daemon Sub Persistence, Privilege Es... macOS 0
T1543.005 Container Service Sub Persistence, Privilege Es... Containers 0
T1546 Event Triggered Execution Persistence, Privilege Es... Linux, macOS, Window... 0
T1546.001 Change Default File Association Sub Persistence, Privilege Es... Windows 1
T1546.002 Screensaver Sub Persistence, Privilege Es... Windows 0
T1546.003 Windows Management Instrumentation Event Subscription Sub Persistence, Privilege Es... Windows 10
T1546.004 Unix Shell Configuration Modification Sub Persistence, Privilege Es... Linux, macOS 1
T1546.005 Trap Sub Persistence, Privilege Es... macOS, Linux 0