MITRE ATT&CK

Adversary tactics and techniques framework

691
Techniques
14
Tactics
0
Mitigations
4.362
Actor-Technique Links
MITRE ATT&CK 691
ID Techniques Tactic Platforms Threat Actors Actions
T1659 Content Injection Command and Control, Init... Linux, macOS, Window 1
T1665 Hide Infrastructure Command and Control ESXi, Linux, Network... 2
T1666 Modify Cloud Resource Hierarchy Defense Evasion IaaS 0
T1667 Email Bombing Impact Linux, Office Suite,... 1
T1668 Exclusive Control Persistence Linux, macOS, Window 0
T1669 Wi-Fi Networks Initial Access Linux, Network Devic... 1
T1671 Cloud Application Integration Persistence Office Suite, SaaS 0
T1672 Email Spoofing Defense Evasion Office Suite, Window... 0
T1673 Virtual Machine Discovery Discovery ESXi, Linux, macOS... 1
T1674 Input Injection Execution Windows, macOS, Linu 1
T1675 ESXi Administration Command Execution ESXi 1
T1677 Poisoned Pipeline Execution Execution SaaS 0
T1678 Delay Execution Defense Evasion Linux, macOS, Window 1
T1679 Selective Exclusion Defense Evasion Windows 0
T1680 Local Storage Discovery Discovery ESXi, IaaS, Linux... 10
T1681 Search Threat Vendor Data Reconnaissance PRE 2