MITRE Tags
Below are the default MITRE tags in Scanner. These are populated in the list of tags on the detection rule create and edit pages.
tactics.ta0043.reconnaissancetactics.ta0042.resource_developmenttactics.ta0001.initial_accesstactics.ta0002.executiontactics.ta0003.persistencetactics.ta0004.privilege_escalationtactics.ta0005.defense_evasiontactics.ta0006.credential_accesstactics.ta0007.discoverytactics.ta0008.lateral_movementtactics.ta0009.collectiontactics.ta0011.command_and_controltactics.ta0010.exfiltrationtactics.ta0040.impacttechniques.t1001.data_obfuscationtechniques.t1003.os_credential_dumpingtechniques.t1005.data_from_local_systemtechniques.t1006.direct_volume_accesstechniques.t1007.system_service_discoverytechniques.t1008.fallback_channelstechniques.t1010.application_window_discoverytechniques.t1011.exfiltration_over_other_network_mediumtechniques.t1012.query_registrytechniques.t1014.rootkittechniques.t1016.system_network_configuration_discoverytechniques.t1018.remote_system_discoverytechniques.t1020.automated_exfiltrationtechniques.t1021.remote_servicestechniques.t1025.data_from_removable_mediatechniques.t1027.obfuscated_files_or_informationtechniques.t1029.scheduled_transfertechniques.t1030.data_transfer_size_limitstechniques.t1033.system_owner_user_discoverytechniques.t1036.masqueradingtechniques.t1037.boot_or_logon_initialization_scriptstechniques.t1039.data_from_network_shared_drivetechniques.t1040.network_sniffingtechniques.t1041.exfiltration_over_c2_channeltechniques.t1046.network_service_scanningtechniques.t1047.windows_management_instrumentationtechniques.t1048.exfiltration_over_alternative_protocoltechniques.t1049.system_network_connections_discoverytechniques.t1052.exfiltration_over_physical_mediumtechniques.t1053.scheduled_task_jobtechniques.t1055.process_injectiontechniques.t1056.input_capturetechniques.t1057.process_discoverytechniques.t1059.command_and_scripting_interpretertechniques.t1068.exploitation_for_privilege_escalationtechniques.t1069.permission_groups_discoverytechniques.t1070.indicator_removal_on_hosttechniques.t1071.application_layer_protocoltechniques.t1072.software_deployment_toolstechniques.t1074.data_stagedtechniques.t1078.valid_accountstechniques.t1080.taint_shared_contenttechniques.t1082.system_information_discoverytechniques.t1083.file_and_directory_discoverytechniques.t1087.account_discoverytechniques.t1090.proxytechniques.t1091.replication_through_removable_mediatechniques.t1092.communication_through_removable_mediatechniques.t1095.non_application_layer_protocoltechniques.t1098.account_manipulationtechniques.t1102.web_servicetechniques.t1104.multi_stage_channelstechniques.t1105.ingress_tool_transfertechniques.t1106.native_apitechniques.t1110.brute_forcetechniques.t1111.two_factor_authentication_interceptiontechniques.t1112.modify_registrytechniques.t1113.screen_capturetechniques.t1114.email_collectiontechniques.t1115.clipboard_datatechniques.t1119.automated_collectiontechniques.t1120.peripheral_device_discoverytechniques.t1123.audio_capturetechniques.t1124.system_time_discoverytechniques.t1125.video_capturetechniques.t1127.trusted_developer_utilities_proxy_executiontechniques.t1129.shared_modulestechniques.t1132.data_encodingtechniques.t1133.external_remote_servicestechniques.t1134.access_token_manipulationtechniques.t1135.network_share_discoverytechniques.t1136.create_accounttechniques.t1137.office_application_startuptechniques.t1140.deobfuscate_decode_files_or_informationtechniques.t1176.browser_extensionstechniques.t1185.browser_session_hijackingtechniques.t1187.forced_authenticationtechniques.t1189.drive_by_compromisetechniques.t1190.exploit_public_facing_applicationtechniques.t1195.supply_chain_compromisetechniques.t1197.bits_jobstechniques.t1199.trusted_relationshiptechniques.t1200.hardware_additionstechniques.t1201.password_policy_discoverytechniques.t1202.indirect_command_executiontechniques.t1203.exploitation_for_client_executiontechniques.t1204.user_executiontechniques.t1205.traffic_signalingtechniques.t1207.rogue_domain_controllertechniques.t1210.exploitation_of_remote_servicestechniques.t1211.exploitation_for_defense_evasiontechniques.t1212.exploitation_for_credential_accesstechniques.t1213.data_from_information_repositoriestechniques.t1216.signed_script_proxy_executiontechniques.t1217.browser_bookmark_discoverytechniques.t1218.signed_binary_proxy_executiontechniques.t1219.remote_access_softwaretechniques.t1220.xsl_script_processingtechniques.t1221.template_injectiontechniques.t1222.file_and_directory_permissions_modificationtechniques.t1480.execution_guardrailstechniques.t1482.domain_trust_discoverytechniques.t1484.domain_policy_modificationtechniques.t1485.data_destructiontechniques.t1486.data_encrypted_for_impacttechniques.t1489.service_stoptechniques.t1490.inhibit_system_recoverytechniques.t1491.defacementtechniques.t1495.firmware_corruptiontechniques.t1496.resource_hijackingtechniques.t1497.virtualization_sandbox_evasiontechniques.t1498.network_denial_of_servicetechniques.t1499.endpoint_denial_of_servicetechniques.t1505.server_software_componenttechniques.t1518.software_discoverytechniques.t1525.implant_internal_imagetechniques.t1526.cloud_service_discoverytechniques.t1528.steal_application_access_tokentechniques.t1529.system_shutdown_reboottechniques.t1530.data_from_cloud_storage_objecttechniques.t1531.account_access_removaltechniques.t1534.internal_spearphishingtechniques.t1535.unused_unsupported_cloud_regionstechniques.t1537.transfer_data_to_cloud_accounttechniques.t1538.cloud_service_dashboardtechniques.t1539.steal_web_session_cookietechniques.t1542.pre_os_boottechniques.t1543.create_or_modify_system_processtechniques.t1546.event_triggered_executiontechniques.t1547.boot_or_logon_autostart_executiontechniques.t1548.abuse_elevation_control_mechanismtechniques.t1550.use_alternate_authentication_materialtechniques.t1552.unsecured_credentialstechniques.t1553.subvert_trust_controlstechniques.t1554.compromise_client_software_binarytechniques.t1555.credentials_from_password_storestechniques.t1556.modify_authentication_processtechniques.t1557.adversary_in_the_middletechniques.t1558.steal_or_forge_kerberos_ticketstechniques.t1559.inter_process_communicationtechniques.t1560.archive_collected_datatechniques.t1561.disk_wipetechniques.t1562.impair_defensestechniques.t1563.remote_service_session_hijackingtechniques.t1564.hide_artifactstechniques.t1565.data_manipulationtechniques.t1566.phishingtechniques.t1567.exfiltration_over_web_servicetechniques.t1568.dynamic_resolutiontechniques.t1569.system_servicestechniques.t1570.lateral_tool_transfertechniques.t1571.non_standard_porttechniques.t1572.protocol_tunnelingtechniques.t1573.encrypted_channeltechniques.t1574.hijack_execution_flowtechniques.t1578.modify_cloud_compute_infrastructuretechniques.t1580.cloud_infrastructure_discoverytechniques.t1583.acquire_infrastructuretechniques.t1584.compromise_infrastructuretechniques.t1585.establish_accountstechniques.t1586.compromise_accountstechniques.t1587.develop_capabilitiestechniques.t1588.obtain_capabilitiestechniques.t1589.gather_victim_identity_informationtechniques.t1590.gather_victim_network_informationtechniques.t1591.gather_victim_org_informationtechniques.t1592.gather_victim_host_informationtechniques.t1593.search_open_websites_domainstechniques.t1594.search_victim_owned_websitestechniques.t1595.active_scanningtechniques.t1596.search_open_technical_databasestechniques.t1597.search_closed_sourcestechniques.t1598.phishing_for_informationtechniques.t1599.network_boundary_bridgingtechniques.t1600.weaken_encryptiontechniques.t1601.modify_system_imagetechniques.t1602.data_from_configuration_repositorytechniques.t1606.forge_web_credentialstechniques.t1608.stage_capabilitiestechniques.t1609.container_administration_commandtechniques.t1610.deploy_containertechniques.t1611.escape_to_hosttechniques.t1612.build_image_on_hosttechniques.t1613.container_and_resource_discoverytechniques.t1614.system_location_discoverytechniques.t1615.group_policy_discoverytechniques.t1619.cloud_storage_object_discoverytechniques.t1620.reflective_code_loading
Last updated
Was this helpful?