 External Remote Services |
 Shared Modules |
 Socket Filters |
 Boot or Logon Initialization Scripts |
 Socket Filters |
 Adversary-in-the-Middle |
 System Owner/User Discovery |
 VNC |
 Archive via Utility |
 Socket Filters |
 Exfiltration Over Web Service |
 Disk Structure Wipe |
 Compromise Software Dependencies and Development Tools |
 JavaScript |
 Boot or Logon Initialization Scripts |
 Path Interception by PATH Environment Variable |
 Embedded Payloads |
 Pluggable Authentication Modules |
 Internet Connection Discovery |
 Taint Shared Content |
 Screen Capture |
 Standard Encoding |
 Exfiltration Over Webhook |
 Direct Network Flood |
 Spearphishing Link |
 Malicious File |
 Pluggable Authentication Modules |
 Create or Modify System Process |
 Pluggable Authentication Modules |
 Keylogging |
 Permission Groups Discovery |
 SSH |
 Adversary-in-the-Middle |
 Domain Generation Algorithms |
 Scheduled Transfer |
 External Defacement |
 Spearphishing Attachment |
 Cron |
 Path Interception by PATH Environment Variable |
 LC_LOAD_DYLIB Addition |
 File/Path Exclusions |
 Password Guessing |
 Device Driver Discovery |
 SSH Hijacking |
 Keylogging |
 DNS |
 Exfiltration Over Other Network Medium |
 OS Exhaustion Flood |
 Compromise Hardware Supply Chain |
 Scheduled Task/Job |
 Create or Modify System Process |
 Sudo and Sudo Caching |
 Linux and Mac File and Directory Permissions Modification |
 OS Credential Dumping |
 Domain Account |
 Remote Services |
 Audio Capture |
 Symmetric Cryptography |
 Exfiltration Over Bluetooth |
 Application Exhaustion Flood |
 Supply Chain Compromise |
 AppleScript |
 External Remote Services |
 Boot or Logon Autostart Execution |
 Path Interception by PATH Environment Variable |
 Steal Web Session Cookie |
 Local Account |
 Remote Service Session Hijacking |
 Archive via Custom Method |
 Fast Flux DNS |
 Automated Exfiltration |
 Disk Wipe |
 Exploit Public-Facing Application |
 Native API |
 LC_LOAD_DYLIB Addition |
 Cron |
 Email Hiding Rules |
 Securityd Memory |
 System Checks |
 Software Deployment Tools |
 Email Collection |
 Application Layer Protocol |
 Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
 Stored Data Manipulation |
 Content Injection |
 Command and Scripting Interpreter |
 Boot or Logon Autostart Execution |
 Scheduled Task/Job |
 Encrypted/Encoded File |
 Password Cracking |
 Domain Groups |
 Exploitation of Remote Services |
 Data from Removable Media |
 Remote Access Software |
 Exfiltration to Code Repository |
 Service Stop |
 Default Accounts |
 Launchctl |
 Cron |
 Login Hook |
 Rootkit |
 Keychain |
 System Service Discovery |
 Internal Spearphishing |
 Local Data Staging |
 Content Injection |
 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
 Application or System Exploitation |
 Trusted Relationship |
 XPC Services |
 Scheduled Task/Job |
 Process Injection |
 Sudo and Sudo Caching |
 Password Managers |
 Network Sniffing |
 Lateral Tool Transfer |
 Automated Collection |
 Traffic Signaling |
 Exfiltration Over C2 Channel |
 Runtime Data Manipulation |
 Phishing |
 User Execution |
 Browser Extensions |
 Launch Daemon |
 Match Legitimate Name or Location |
 Network Sniffing |
 Network Share Discovery |
|
 Clipboard Data |
 Protocol Tunneling |
 Exfiltration Over Alternative Protocol |
 Reflection Amplification |
 Valid Accounts |
 Software Deployment Tools |
 Login Hook |
 Default Accounts |
 Masquerade File Type |
 Steal or Forge Kerberos Tickets |
 Peripheral Device Discovery |
|
 Remote Data Staging |
 Mail Protocols |
 Exfiltration over USB |
 Service Exhaustion Flood |
 Spearphishing Voice |
 Unix Shell |
 Traffic Signaling |
 Trap |
 Hide Artifacts |
 Credentials from Password Stores |
 System Information Discovery |
|
 Data from Local System |
 Communication Through Removable Media |
 Exfiltration to Text Storage Sites |
 Defacement |
 Compromise Software Supply Chain |
 Inter-Process Communication |
 Launch Daemon |
 Dynamic Linker Hijacking |
 System Checks |
 Unsecured Credentials |
 Wi-Fi Discovery |
|
 Archive via Library |
 External Proxy |
 Exfiltration to Cloud Storage |
 Financial Theft |
 Domain Accounts |
 Exploitation for Client Execution |
 Web Shell |
 Abuse Elevation Control Mechanism |
 Clear Linux or Mac System Logs |
 Credentials from Web Browsers |
 Application Window Discovery |
|
 Archive Collected Data |
 Proxy |
 Data Transfer Size Limits |
 Internal Defacement |
 Hardware Additions |
 Python |
 Default Accounts |
 Setuid and Setgid |
 Stripped Payloads |
 DHCP Spoofing |
 Time Based Evasion |
|
 DHCP Spoofing |
 Dynamic Resolution |
 Exfiltration Over Physical Medium |
 Data Manipulation |
 Drive-by Compromise |
 System Services |
 Trap |
 SSH Authorized Keys |
 Gatekeeper Bypass |
 Private Keys |
 Browser Information Discovery |
|
 Web Portal Capture |
 Web Service |
 Exfiltration Over Unencrypted Non-C2 Protocol |
 Account Access Removal |
 Spearphishing via Service |
 Visual Basic |
 Dynamic Linker Hijacking |
 Login Items |
 Code Signing |
 Password Spraying |
 System Network Configuration Discovery |
|
 Video Capture |
 DNS Calculation |
|
 Data Encrypted for Impact |
 Local Accounts |
 Malicious Link |
 Local Account |
 Emond |
 Break Process Trees |
 Web Portal Capture |
 Account Discovery |
|
 Email Forwarding Rule |
 Multi-Stage Channels |
|
 Endpoint Denial of Service |
|
 At |
 SSH Authorized Keys |
 Account Manipulation |
 Clear Network Connection History and Configurations |
 Steal or Forge Authentication Certificates |
 File and Directory Discovery |
|
 Data Staged |
 Port Knocking |
|
 Resource Hijacking |
|
|
 Domain Account |
 Kernel Modules and Extensions |
 Clear Command History |
 Bash History |
 System Network Connections Discovery |
|
 GUI Input Capture |
 File Transfer Protocols |
|
 Transmitted Data Manipulation |
|
|
 Component Firmware |
 Hijack Execution Flow |
 Deobfuscate/Decode Files or Information |
 Credentials In Files |
 Virtualization/Sandbox Evasion |
|
 Data from Network Shared Drive |
 One-Way Communication |
|
 Data Destruction |
|
|
 Pre-OS Boot |
 Valid Accounts |
 Impair Defenses |
 Web Cookies |
 Log Enumeration |
|
 Input Capture |
 Multi-hop Proxy |
|
 Network Denial of Service |
|
|
 Login Items |
 Exploitation for Privilege Escalation |
 Masquerading |
 Forge Web Credentials |
 Process Discovery |
|
 ARP Cache Poisoning |
 Data Obfuscation |
|
 Firmware Corruption |
|
|
 Port Knocking |
 Event Triggered Execution |
 Clear Mailbox Data |
 Multi-Factor Authentication Request Generation |
 User Activity Based Checks |
|
 Data from Information Repositories |
 Non-Standard Port |
|
 Inhibit System Recovery |
|
|
 Compromise Host Software Binary |
 Unix Shell Configuration Modification |
 Process Injection |
 Exploitation for Credential Access |
 Local Groups |
|
|
 Encrypted Channel |
|
 Disk Content Wipe |
|
|
 Emond |
 Elevated Execution with Prompt |
 Traffic Signaling |
 GUI Input Capture |
 Password Policy Discovery |
|
|
 Bidirectional Communication |
|
 System Shutdown/Reboot |
|
|
 Account Manipulation |
 Startup Items |
 System Binary Proxy Execution |
 Brute Force |
 System Language Discovery |
|
|
 Asymmetric Cryptography |
|
|
|
|
 Kernel Modules and Extensions |
 Domain Accounts |
 Timestomp |
 Credential Stuffing |
 System Location Discovery |
|
|
 Non-Application Layer Protocol |
|
|
|
|
 Hijack Execution Flow |
 Launch Agent |
 Reflective Code Loading |
 Multi-Factor Authentication |
 Security Software Discovery |
|
|
 Protocol Impersonation |
|
|
|
|
 Valid Accounts |
 Installer Packages |
 Ignore Process Interrupts |
 Input Capture |
 Remote System Discovery |
|
|
 Domain Fronting |
|
|
|
|
 Multi-Factor Authentication |
 RC Scripts |
 Time Based Evasion |
 ARP Cache Poisoning |
 Network Service Discovery |
|
|
 Data Encoding |
|
|
|
|
 Event Triggered Execution |
 Re-opened Applications |
 Disable or Modify System Firewall |
 Multi-Factor Authentication Interception |
 Software Discovery |
|
|
 Non-Standard Encoding |
|
|
|
|
 Unix Shell Configuration Modification |
 TCC Manipulation |
 Electron Applications |
 Modify Authentication Process |
 Debugger Evasion |
|
|
 Web Protocols |
|
|
|
|
 Startup Items |
 At |
 Code Signing Policy Modification |
|
 System Time Discovery |
|
|
 Ingress Tool Transfer |
|
|
|
|
 Domain Accounts |
 Dylib Hijacking |
 Binary Padding |
|
|
|
|
 Hide Infrastructure |
|
|
|
|
 Launch Agent |
 Local Accounts |
 Default Accounts |
|
|
|
|
 Steganography |
|
|
|
|
 Server Software Component |
|
 Dynamic Linker Hijacking |
|
|
|
|
 Fallback Channels |
|
|
|
|
 Installer Packages |
|
 File and Directory Permissions Modification |
|
|
|
|
 Internal Proxy |
|
|
|
|
 RC Scripts |
|
 Abuse Elevation Control Mechanism |
|
|
|
|
 Dead Drop Resolver |
|
|
|
|
 Create Account |
|
 Setuid and Setgid |
|
|
|
|
 Junk Data |
|
|
|
|
 Re-opened Applications |
|
 Indicator Blocking |
|
|
|
|
|
|
|
|
|
 Power Settings |
|
 Right-to-Left Override |
|
|
|
|
|
|
|
|
|
 At |
|
 Component Firmware |
|
|
|
|
|
|
|
|
|
 Modify Authentication Process |
|
 Indicator Removal |
|
|
|
|
|
|
|
|
|
 Dylib Hijacking |
|
 Masquerade Task or Service |
|
|
|
|
|
|
|
|
|
 Local Accounts |
|
 Plist File Modification |
|
|
|
|
|
|
|
|
|
|
|
 Pre-OS Boot |
|
|
|
|
|
|
|
|
|
|
|
 Downgrade Attack |
|
|
|
|
|
|
|
|
|
|
|
 Virtualization/Sandbox Evasion |
|
|
|
|
|
|
|
|
|
|
|
 Execution Guardrails |
|
|
|
|
|
|
|
|
|
|
|
 Port Knocking |
|
|
|
|
|
|
|
|
|
|
|
 Hidden Users |
|
|
|
|
|
|
|
|
|
|
|
 Impair Command History Logging |
|
|
|
|
|
|
|
|
|
|
|
 User Activity Based Checks |
|
|
|
|
|
|
|
|
|
|
|
 Disable or Modify Tools |
|
|
|
|
|
|
|
|
|
|
|
 Hijack Execution Flow |
|
|
|
|
|
|
|
|
|
|
|
 Indicator Removal from Tools |
|
|
|
|
|
|
|
|
|
|
|
 Valid Accounts |
|
|
|
|
|
|
|
|
|
|
|
 Resource Forking |
|
|
|
|
|
|
|
|
|
|
|
 Obfuscated Files or Information |
|
|
|
|
|
|
|
|
|
|
|
 Multi-Factor Authentication |
|
|
|
|
|
|
|
|
|
|
|
 Invalid Code Signature |
|
|
|
|
|
|
|
|
|
|
|
 Run Virtual Instance |
|
|
|
|
|
|
|
|
|
|
|
 Subvert Trust Controls |
|
|
|
|
|
|
|
|
|
|
|
 Elevated Execution with Prompt |
|
|
|
|
|
|
|
|
|
|
|
 Rename System Utilities |
|
|
|
|
|
|
|
|
|
|
|
 Spoof Security Alerting |
|
|
|
|
|
|
|
|
|
|
|
 Steganography |
|
|
|
|
|
|
|
|
|
|
|
 Domain Accounts |
|
|
|
|
|
|
|
|
|
|
|
 Install Root Certificate |
|
|
|
|
|
|
|
|
|
|
|
 Compile After Delivery |
|
|
|
|
|
|
|
|
|
|
|
 VBA Stomping |
|
|
|
|
|
|
|
|
|
|
|
 Impersonation |
|
|
|
|
|
|
|
|
|
|
|
 Hidden Window |
|
|
|
|
|
|
|
|
|
|
|
 Clear Persistence |
|
|
|
|
|
|
|
|
|
|
|
 HTML Smuggling |
|
|
|
|
|
|
|
|
|
|
|
 Command Obfuscation |
|
|
|
|
|
|
|
|
|
|
|
 File Deletion |
|
|
|
|
|
|
|
|
|
|
|
 Software Packing |
|
|
|
|
|
|
|
|
|
|
|
 Hidden File System |
|
|
|
|
|
|
|
|
|
|
|
 Debugger Evasion |
|
|
|
|
|
|
|
|
|
|
|
 Space after Filename |
|
|
|
|
|
|
|
|
|
|
|
 TCC Manipulation |
|
|
|
|
|
|
|
|
|
|
|
 Hidden Files and Directories |
|
|
|
|
|
|
|
|
|
|
|
 Environmental Keying |
|
|
|
|
|
|
|
|
|
|
|
 Modify Authentication Process |
|
|
|
|
|
|
|
|
|
|
|
 Dylib Hijacking |
|
|
|
|
|
|
|
|
|
|
|
 Local Accounts |
|
|
|
|
|
|
|
|
|
|
|
 Exploitation for Defense Evasion |
|
|
|
|
|
|
|