Skip to main content
Free
Intel
Hub
/
Sign In
MITRE ATT&CK Mapping
Articles mapped to MITRE ATT&CK techniques. Select a technique to view matching articles.
Navigator Layer (30d)
7d Layer
90d Layer
Initial Access
T1566
Phishing
T1566.001
Spearphishing Attachment
T1566.002
Spearphishing Link
T1190
Exploit Public-Facing Application
T1133
External Remote Services
T1078
Valid Accounts
T1195
Supply Chain Compromise
T1189
Drive-by Compromise
Execution
T1059
Command and Scripting Interpreter
T1059.001
PowerShell
T1203
Exploitation for Client Execution
T1204
User Execution
Persistence
T1053
Scheduled Task/Job
T1547
Boot or Logon Autostart Execution
T1543
Create or Modify System Process
Privilege Escalation
T1548
Abuse Elevation Control Mechanism
T1068
Exploitation for Privilege Escalation
Defense Evasion
T1027
Obfuscated Files or Information
T1562
Impair Defenses
T1070
Indicator Removal
Credential Access
T1110
Brute Force
T1555
Credentials from Password Stores
T1003
OS Credential Dumping
T1557
Adversary-in-the-Middle
T1556
Modify Authentication Process
Discovery
T1046
Network Service Discovery
Lateral Movement
T1021
Remote Services
Command and Control
T1071
Application Layer Protocol
T1573
Encrypted Channel
T1572
Protocol Tunneling
Exfiltration
T1041
Exfiltration Over C2 Channel
T1567
Exfiltration Over Web Service
Impact
T1486
Data Encrypted for Impact
T1489
Service Stop
T1498
Network Denial of Service
T1491
Defacement
T1529
System Shutdown/Reboot
Resource Development
T1583
Acquire Infrastructure
T1588
Obtain Capabilities
Reconnaissance
T1592
Gather Victim Host Information
T1598
Phishing for Information