External Remote Services |
Shared Modules |
Socket Filters |
Boot or Logon Initialization Scripts |
Socket Filters |
Adversary-in-the-Middle |
System Owner/User Discovery |
VNC |
Archive via Utility |
Socket Filters |
Exfiltration Over Web Service |
Disk Structure Wipe |
Compromise Software Dependencies and Development Tools |
JavaScript |
Boot or Logon Initialization Scripts |
Path Interception by PATH Environment Variable |
Embedded Payloads |
Pluggable Authentication Modules |
Internet Connection Discovery |
Taint Shared Content |
Screen Capture |
Standard Encoding |
Exfiltration Over Webhook |
Direct Network Flood |
Spearphishing Link |
Malicious File |
Pluggable Authentication Modules |
Create or Modify System Process |
Pluggable Authentication Modules |
Keylogging |
Permission Groups Discovery |
SSH |
Adversary-in-the-Middle |
Domain Generation Algorithms |
Scheduled Transfer |
External Defacement |
Spearphishing Attachment |
Cron |
Path Interception by PATH Environment Variable |
LC_LOAD_DYLIB Addition |
File/Path Exclusions |
Password Guessing |
Device Driver Discovery |
SSH Hijacking |
Keylogging |
DNS |
Exfiltration Over Other Network Medium |
OS Exhaustion Flood |
Compromise Hardware Supply Chain |
Scheduled Task/Job |
Create or Modify System Process |
Sudo and Sudo Caching |
Linux and Mac File and Directory Permissions Modification |
OS Credential Dumping |
Domain Account |
Remote Services |
Audio Capture |
Symmetric Cryptography |
Exfiltration Over Bluetooth |
Application Exhaustion Flood |
Supply Chain Compromise |
AppleScript |
External Remote Services |
Boot or Logon Autostart Execution |
Path Interception by PATH Environment Variable |
Steal Web Session Cookie |
Local Account |
Remote Service Session Hijacking |
Archive via Custom Method |
Fast Flux DNS |
Automated Exfiltration |
Disk Wipe |
Exploit Public-Facing Application |
Native API |
LC_LOAD_DYLIB Addition |
Cron |
Email Hiding Rules |
Securityd Memory |
System Checks |
Software Deployment Tools |
Email Collection |
Application Layer Protocol |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
Stored Data Manipulation |
Content Injection |
Command and Scripting Interpreter |
Boot or Logon Autostart Execution |
Scheduled Task/Job |
Encrypted/Encoded File |
Password Cracking |
Domain Groups |
Exploitation of Remote Services |
Data from Removable Media |
Remote Access Software |
Exfiltration to Code Repository |
Service Stop |
Default Accounts |
Launchctl |
Cron |
Login Hook |
Rootkit |
Keychain |
System Service Discovery |
Internal Spearphishing |
Local Data Staging |
Content Injection |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Application or System Exploitation |
Trusted Relationship |
XPC Services |
Scheduled Task/Job |
Process Injection |
Sudo and Sudo Caching |
Password Managers |
Network Sniffing |
Lateral Tool Transfer |
Automated Collection |
Traffic Signaling |
Exfiltration Over C2 Channel |
Runtime Data Manipulation |
Phishing |
User Execution |
Browser Extensions |
Launch Daemon |
Match Legitimate Name or Location |
Network Sniffing |
Network Share Discovery |
|
Clipboard Data |
Protocol Tunneling |
Exfiltration Over Alternative Protocol |
Reflection Amplification |
Valid Accounts |
Software Deployment Tools |
Login Hook |
Default Accounts |
Masquerade File Type |
Steal or Forge Kerberos Tickets |
Peripheral Device Discovery |
|
Remote Data Staging |
Mail Protocols |
Exfiltration over USB |
Service Exhaustion Flood |
Spearphishing Voice |
Unix Shell |
Traffic Signaling |
Trap |
Hide Artifacts |
Credentials from Password Stores |
System Information Discovery |
|
Data from Local System |
Communication Through Removable Media |
Exfiltration to Text Storage Sites |
Defacement |
Compromise Software Supply Chain |
Inter-Process Communication |
Launch Daemon |
Dynamic Linker Hijacking |
System Checks |
Unsecured Credentials |
Wi-Fi Discovery |
|
Archive via Library |
External Proxy |
Exfiltration to Cloud Storage |
Financial Theft |
Domain Accounts |
Exploitation for Client Execution |
Web Shell |
Abuse Elevation Control Mechanism |
Clear Linux or Mac System Logs |
Credentials from Web Browsers |
Application Window Discovery |
|
Archive Collected Data |
Proxy |
Data Transfer Size Limits |
Internal Defacement |
Hardware Additions |
Python |
Default Accounts |
Setuid and Setgid |
Stripped Payloads |
DHCP Spoofing |
Time Based Evasion |
|
DHCP Spoofing |
Dynamic Resolution |
Exfiltration Over Physical Medium |
Data Manipulation |
Drive-by Compromise |
System Services |
Trap |
SSH Authorized Keys |
Gatekeeper Bypass |
Private Keys |
Browser Information Discovery |
|
Web Portal Capture |
Web Service |
Exfiltration Over Unencrypted Non-C2 Protocol |
Account Access Removal |
Spearphishing via Service |
Visual Basic |
Dynamic Linker Hijacking |
Login Items |
Code Signing |
Password Spraying |
System Network Configuration Discovery |
|
Video Capture |
DNS Calculation |
|
Data Encrypted for Impact |
Local Accounts |
Malicious Link |
Local Account |
Emond |
Break Process Trees |
Web Portal Capture |
Account Discovery |
|
Email Forwarding Rule |
Multi-Stage Channels |
|
Endpoint Denial of Service |
|
At |
SSH Authorized Keys |
Account Manipulation |
Clear Network Connection History and Configurations |
Steal or Forge Authentication Certificates |
File and Directory Discovery |
|
Data Staged |
Port Knocking |
|
Resource Hijacking |
|
|
Domain Account |
Kernel Modules and Extensions |
Clear Command History |
Bash History |
System Network Connections Discovery |
|
GUI Input Capture |
File Transfer Protocols |
|
Transmitted Data Manipulation |
|
|
Component Firmware |
Hijack Execution Flow |
Deobfuscate/Decode Files or Information |
Credentials In Files |
Virtualization/Sandbox Evasion |
|
Data from Network Shared Drive |
One-Way Communication |
|
Data Destruction |
|
|
Pre-OS Boot |
Valid Accounts |
Impair Defenses |
Web Cookies |
Log Enumeration |
|
Input Capture |
Multi-hop Proxy |
|
Network Denial of Service |
|
|
Login Items |
Exploitation for Privilege Escalation |
Masquerading |
Forge Web Credentials |
Process Discovery |
|
ARP Cache Poisoning |
Data Obfuscation |
|
Firmware Corruption |
|
|
Port Knocking |
Event Triggered Execution |
Clear Mailbox Data |
Multi-Factor Authentication Request Generation |
User Activity Based Checks |
|
Data from Information Repositories |
Non-Standard Port |
|
Inhibit System Recovery |
|
|
Compromise Host Software Binary |
Unix Shell Configuration Modification |
Process Injection |
Exploitation for Credential Access |
Local Groups |
|
|
Encrypted Channel |
|
Disk Content Wipe |
|
|
Emond |
Elevated Execution with Prompt |
Traffic Signaling |
GUI Input Capture |
Password Policy Discovery |
|
|
Bidirectional Communication |
|
System Shutdown/Reboot |
|
|
Account Manipulation |
Startup Items |
System Binary Proxy Execution |
Brute Force |
System Language Discovery |
|
|
Asymmetric Cryptography |
|
|
|
|
Kernel Modules and Extensions |
Domain Accounts |
Timestomp |
Credential Stuffing |
System Location Discovery |
|
|
Non-Application Layer Protocol |
|
|
|
|
Hijack Execution Flow |
Launch Agent |
Reflective Code Loading |
Multi-Factor Authentication |
Security Software Discovery |
|
|
Protocol Impersonation |
|
|
|
|
Valid Accounts |
Installer Packages |
Ignore Process Interrupts |
Input Capture |
Remote System Discovery |
|
|
Domain Fronting |
|
|
|
|
Multi-Factor Authentication |
RC Scripts |
Time Based Evasion |
ARP Cache Poisoning |
Network Service Discovery |
|
|
Data Encoding |
|
|
|
|
Event Triggered Execution |
Re-opened Applications |
Disable or Modify System Firewall |
Multi-Factor Authentication Interception |
Software Discovery |
|
|
Non-Standard Encoding |
|
|
|
|
Unix Shell Configuration Modification |
TCC Manipulation |
Electron Applications |
Modify Authentication Process |
Debugger Evasion |
|
|
Web Protocols |
|
|
|
|
Startup Items |
At |
Code Signing Policy Modification |
|
System Time Discovery |
|
|
Ingress Tool Transfer |
|
|
|
|
Domain Accounts |
Dylib Hijacking |
Binary Padding |
|
|
|
|
Hide Infrastructure |
|
|
|
|
Launch Agent |
Local Accounts |
Default Accounts |
|
|
|
|
Steganography |
|
|
|
|
Server Software Component |
|
Dynamic Linker Hijacking |
|
|
|
|
Fallback Channels |
|
|
|
|
Installer Packages |
|
File and Directory Permissions Modification |
|
|
|
|
Internal Proxy |
|
|
|
|
RC Scripts |
|
Abuse Elevation Control Mechanism |
|
|
|
|
Dead Drop Resolver |
|
|
|
|
Create Account |
|
Setuid and Setgid |
|
|
|
|
Junk Data |
|
|
|
|
Re-opened Applications |
|
Indicator Blocking |
|
|
|
|
|
|
|
|
|
Power Settings |
|
Right-to-Left Override |
|
|
|
|
|
|
|
|
|
At |
|
Component Firmware |
|
|
|
|
|
|
|
|
|
Modify Authentication Process |
|
Indicator Removal |
|
|
|
|
|
|
|
|
|
Dylib Hijacking |
|
Masquerade Task or Service |
|
|
|
|
|
|
|
|
|
Local Accounts |
|
Plist File Modification |
|
|
|
|
|
|
|
|
|
|
|
Pre-OS Boot |
|
|
|
|
|
|
|
|
|
|
|
Downgrade Attack |
|
|
|
|
|
|
|
|
|
|
|
Virtualization/Sandbox Evasion |
|
|
|
|
|
|
|
|
|
|
|
Execution Guardrails |
|
|
|
|
|
|
|
|
|
|
|
Port Knocking |
|
|
|
|
|
|
|
|
|
|
|
Hidden Users |
|
|
|
|
|
|
|
|
|
|
|
Impair Command History Logging |
|
|
|
|
|
|
|
|
|
|
|
User Activity Based Checks |
|
|
|
|
|
|
|
|
|
|
|
Disable or Modify Tools |
|
|
|
|
|
|
|
|
|
|
|
Hijack Execution Flow |
|
|
|
|
|
|
|
|
|
|
|
Indicator Removal from Tools |
|
|
|
|
|
|
|
|
|
|
|
Valid Accounts |
|
|
|
|
|
|
|
|
|
|
|
Resource Forking |
|
|
|
|
|
|
|
|
|
|
|
Obfuscated Files or Information |
|
|
|
|
|
|
|
|
|
|
|
Multi-Factor Authentication |
|
|
|
|
|
|
|
|
|
|
|
Invalid Code Signature |
|
|
|
|
|
|
|
|
|
|
|
Run Virtual Instance |
|
|
|
|
|
|
|
|
|
|
|
Subvert Trust Controls |
|
|
|
|
|
|
|
|
|
|
|
Elevated Execution with Prompt |
|
|
|
|
|
|
|
|
|
|
|
Rename System Utilities |
|
|
|
|
|
|
|
|
|
|
|
Spoof Security Alerting |
|
|
|
|
|
|
|
|
|
|
|
Steganography |
|
|
|
|
|
|
|
|
|
|
|
Domain Accounts |
|
|
|
|
|
|
|
|
|
|
|
Install Root Certificate |
|
|
|
|
|
|
|
|
|
|
|
Compile After Delivery |
|
|
|
|
|
|
|
|
|
|
|
VBA Stomping |
|
|
|
|
|
|
|
|
|
|
|
Impersonation |
|
|
|
|
|
|
|
|
|
|
|
Hidden Window |
|
|
|
|
|
|
|
|
|
|
|
Clear Persistence |
|
|
|
|
|
|
|
|
|
|
|
HTML Smuggling |
|
|
|
|
|
|
|
|
|
|
|
Command Obfuscation |
|
|
|
|
|
|
|
|
|
|
|
File Deletion |
|
|
|
|
|
|
|
|
|
|
|
Software Packing |
|
|
|
|
|
|
|
|
|
|
|
Hidden File System |
|
|
|
|
|
|
|
|
|
|
|
Debugger Evasion |
|
|
|
|
|
|
|
|
|
|
|
Space after Filename |
|
|
|
|
|
|
|
|
|
|
|
TCC Manipulation |
|
|
|
|
|
|
|
|
|
|
|
Hidden Files and Directories |
|
|
|
|
|
|
|
|
|
|
|
Environmental Keying |
|
|
|
|
|
|
|
|
|
|
|
Modify Authentication Process |
|
|
|
|
|
|
|
|
|
|
|
Dylib Hijacking |
|
|
|
|
|
|
|
|
|
|
|
Local Accounts |
|
|
|
|
|
|
|
|
|
|
|
Exploitation for Defense Evasion |
|
|
|
|
|
|
|