MITRE ATT&CK

Adversary tactics and techniques framework

714
Techniques
14
Tactics
0
Mitigations
4.632
Actor-Technique Links
MITRE ATT&CK 714
ID Techniques Tactic Platforms Threat Actors Actions
T1657 Financial Theft Impact Linux, macOS, Office... 15
T1659 Content Injection Command and Control, Init... Linux, macOS, Window 1
T1665 Hide Infrastructure Command and Control ESXi, Linux, macOS... 2
T1666 Modify Cloud Resource Hierarchy Stealth, Defense Impairme... IaaS 0
T1667 Email Bombing Impact Linux, Office Suite,... 1
T1668 Exclusive Control Persistence Linux, macOS, Window 0
T1669 Wi-Fi Networks Initial Access Linux, Network Devic... 1
T1671 Cloud Application Integration Persistence Office Suite, SaaS 0
T1672 Email Spoofing Stealth Office Suite, Window... 0
T1673 Virtual Machine Discovery Discovery ESXi, Linux, macOS... 1
T1674 Input Injection Execution Windows, macOS, Linu 1
T1675 ESXi Administration Command Execution ESXi 1
T1677 Poisoned Pipeline Execution Execution SaaS 0
T1678 Delay Execution Stealth Linux, macOS, Window 2
T1679 Selective Exclusion Stealth Windows 1
T1680 Local Storage Discovery Discovery ESXi, IaaS, Linux... 10
T1681 Search Threat Vendor Data Reconnaissance PRE 2
T1682 Query Public AI Services Reconnaissance PRE 2
T1683 Generate Content Resource Development PRE 0
T1683.001 Written Content Sub Resource Development PRE 2
T1683.002 Audio-Visual Content Sub Resource Development PRE 2
T1684 Social Engineering - Linux, macOS, Office... 0
T1684.001 Impersonation Sub - Linux, macOS, Office... 15
T1684.002 Email Spoofing Sub - Linux, macOS, Office... 0
T1685 Disable or Modify Tools Defense Impairment Containers, ESXi, Ia... 32