MITRE ATT&CK

Adversary tactics and techniques framework

714
Techniques
14
Tactics
0
Mitigations
4.632
Actor-Technique Links
MITRE ATT&CK 714
ID Techniques Tactic Platforms Threat Actors Actions
T1114 Email Collection Collection Windows, macOS, Linu... 4
T1114.001 Local Email Collection Sub Collection Windows 8
T1114.002 Remote Email Collection Sub Collection Office Suite, Window 13
T1114.003 Email Forwarding Rule Sub Collection Linux, macOS, Office... 5
T1115 Clipboard Data Collection Linux, macOS, Window 4
T1119 Automated Collection Collection IaaS, Linux, macOS... 21
T1120 Peripheral Device Discovery Discovery Linux, macOS, Window 9
T1123 Audio Capture Collection Linux, macOS, Window 2
T1124 System Time Discovery Discovery ESXi, Linux, macOS... 14
T1125 Video Capture Collection Linux, macOS, Window 4
T1127 Trusted Developer Utilities Proxy Execution Execution, Stealth Windows 0
T1127.001 MSBuild Sub Execution, Stealth Windows 0
T1127.002 ClickOnce Sub Execution, Stealth Windows 0
T1127.003 JamPlus Sub Execution, Stealth Windows 0
T1129 Shared Modules Execution Linux, macOS, Window 1
T1132 Data Encoding Command and Control ESXi, Linux, macOS... 1
T1132.001 Standard Encoding Sub Command and Control ESXi, Linux, macOS... 11
T1132.002 Non-Standard Encoding Sub Command and Control ESXi, Linux, macOS... 1
T1133 External Remote Services Persistence, Initial Acce... Containers, Linux, m... 28
T1134 Access Token Manipulation Privilege Escalation, Ste... Windows 3
T1134.001 Token Impersonation/Theft Sub Privilege Escalation, Ste... Windows 2
T1134.002 Create Process with Token Sub Privilege Escalation, Ste... Windows 2
T1134.003 Make and Impersonate Token Sub Privilege Escalation, Ste... Windows 2
T1134.004 Parent PID Spoofing Sub Privilege Escalation, Ste... Windows 0
T1134.005 SID-History Injection Sub Privilege Escalation, Ste... Windows 0