MITRE ATT&CK
Adversary tactics and techniques framework
691
Techniques
14
Tactics
0
Mitigations
4.362
Actor-Technique Links
MITRE ATT&CK 691
| ID | Techniques | Tactic | Platforms | Threat Actors | Actions |
|---|---|---|---|---|---|
| T1659 | Content Injection | Command and Control, Init... | Linux, macOS, Window | 1 | |
| T1665 | Hide Infrastructure | Command and Control | ESXi, Linux, Network... | 2 | |
| T1666 | Modify Cloud Resource Hierarchy | Defense Evasion | IaaS | 0 | |
| T1667 | Email Bombing | Impact | Linux, Office Suite,... | 1 | |
| T1668 | Exclusive Control | Persistence | Linux, macOS, Window | 0 | |
| T1669 | Wi-Fi Networks | Initial Access | Linux, Network Devic... | 1 | |
| T1671 | Cloud Application Integration | Persistence | Office Suite, SaaS | 0 | |
| T1672 | Email Spoofing | Defense Evasion | Office Suite, Window... | 0 | |
| T1673 | Virtual Machine Discovery | Discovery | ESXi, Linux, macOS... | 1 | |
| T1674 | Input Injection | Execution | Windows, macOS, Linu | 1 | |
| T1675 | ESXi Administration Command | Execution | ESXi | 1 | |
| T1677 | Poisoned Pipeline Execution | Execution | SaaS | 0 | |
| T1678 | Delay Execution | Defense Evasion | Linux, macOS, Window | 1 | |
| T1679 | Selective Exclusion | Defense Evasion | Windows | 0 | |
| T1680 | Local Storage Discovery | Discovery | ESXi, IaaS, Linux... | 10 | |
| T1681 | Search Threat Vendor Data | Reconnaissance | PRE | 2 |