MITRE Tags

Below are the default MITRE tags in Scanner. These are populated in the list of tags on the detection rule create and edit pages.

  • tactics.ta0043.reconnaissance

  • tactics.ta0042.resource_development

  • tactics.ta0001.initial_access

  • tactics.ta0002.execution

  • tactics.ta0003.persistence

  • tactics.ta0004.privilege_escalation

  • tactics.ta0005.defense_evasion

  • tactics.ta0006.credential_access

  • tactics.ta0007.discovery

  • tactics.ta0008.lateral_movement

  • tactics.ta0009.collection

  • tactics.ta0011.command_and_control

  • tactics.ta0010.exfiltration

  • tactics.ta0040.impact

  • techniques.t1001.data_obfuscation

  • techniques.t1003.os_credential_dumping

  • techniques.t1005.data_from_local_system

  • techniques.t1006.direct_volume_access

  • techniques.t1007.system_service_discovery

  • techniques.t1008.fallback_channels

  • techniques.t1010.application_window_discovery

  • techniques.t1011.exfiltration_over_other_network_medium

  • techniques.t1012.query_registry

  • techniques.t1014.rootkit

  • techniques.t1016.system_network_configuration_discovery

  • techniques.t1018.remote_system_discovery

  • techniques.t1020.automated_exfiltration

  • techniques.t1021.remote_services

  • techniques.t1025.data_from_removable_media

  • techniques.t1027.obfuscated_files_or_information

  • techniques.t1029.scheduled_transfer

  • techniques.t1030.data_transfer_size_limits

  • techniques.t1033.system_owner_user_discovery

  • techniques.t1036.masquerading

  • techniques.t1037.boot_or_logon_initialization_scripts

  • techniques.t1039.data_from_network_shared_drive

  • techniques.t1040.network_sniffing

  • techniques.t1041.exfiltration_over_c2_channel

  • techniques.t1046.network_service_scanning

  • techniques.t1047.windows_management_instrumentation

  • techniques.t1048.exfiltration_over_alternative_protocol

  • techniques.t1049.system_network_connections_discovery

  • techniques.t1052.exfiltration_over_physical_medium

  • techniques.t1053.scheduled_task_job

  • techniques.t1055.process_injection

  • techniques.t1056.input_capture

  • techniques.t1057.process_discovery

  • techniques.t1059.command_and_scripting_interpreter

  • techniques.t1068.exploitation_for_privilege_escalation

  • techniques.t1069.permission_groups_discovery

  • techniques.t1070.indicator_removal_on_host

  • techniques.t1071.application_layer_protocol

  • techniques.t1072.software_deployment_tools

  • techniques.t1074.data_staged

  • techniques.t1078.valid_accounts

  • techniques.t1080.taint_shared_content

  • techniques.t1082.system_information_discovery

  • techniques.t1083.file_and_directory_discovery

  • techniques.t1087.account_discovery

  • techniques.t1090.proxy

  • techniques.t1091.replication_through_removable_media

  • techniques.t1092.communication_through_removable_media

  • techniques.t1095.non_application_layer_protocol

  • techniques.t1098.account_manipulation

  • techniques.t1102.web_service

  • techniques.t1104.multi_stage_channels

  • techniques.t1105.ingress_tool_transfer

  • techniques.t1106.native_api

  • techniques.t1110.brute_force

  • techniques.t1111.two_factor_authentication_interception

  • techniques.t1112.modify_registry

  • techniques.t1113.screen_capture

  • techniques.t1114.email_collection

  • techniques.t1115.clipboard_data

  • techniques.t1119.automated_collection

  • techniques.t1120.peripheral_device_discovery

  • techniques.t1123.audio_capture

  • techniques.t1124.system_time_discovery

  • techniques.t1125.video_capture

  • techniques.t1127.trusted_developer_utilities_proxy_execution

  • techniques.t1129.shared_modules

  • techniques.t1132.data_encoding

  • techniques.t1133.external_remote_services

  • techniques.t1134.access_token_manipulation

  • techniques.t1135.network_share_discovery

  • techniques.t1136.create_account

  • techniques.t1137.office_application_startup

  • techniques.t1140.deobfuscate_decode_files_or_information

  • techniques.t1176.browser_extensions

  • techniques.t1185.browser_session_hijacking

  • techniques.t1187.forced_authentication

  • techniques.t1189.drive_by_compromise

  • techniques.t1190.exploit_public_facing_application

  • techniques.t1195.supply_chain_compromise

  • techniques.t1197.bits_jobs

  • techniques.t1199.trusted_relationship

  • techniques.t1200.hardware_additions

  • techniques.t1201.password_policy_discovery

  • techniques.t1202.indirect_command_execution

  • techniques.t1203.exploitation_for_client_execution

  • techniques.t1204.user_execution

  • techniques.t1205.traffic_signaling

  • techniques.t1207.rogue_domain_controller

  • techniques.t1210.exploitation_of_remote_services

  • techniques.t1211.exploitation_for_defense_evasion

  • techniques.t1212.exploitation_for_credential_access

  • techniques.t1213.data_from_information_repositories

  • techniques.t1216.signed_script_proxy_execution

  • techniques.t1217.browser_bookmark_discovery

  • techniques.t1218.signed_binary_proxy_execution

  • techniques.t1219.remote_access_software

  • techniques.t1220.xsl_script_processing

  • techniques.t1221.template_injection

  • techniques.t1222.file_and_directory_permissions_modification

  • techniques.t1480.execution_guardrails

  • techniques.t1482.domain_trust_discovery

  • techniques.t1484.domain_policy_modification

  • techniques.t1485.data_destruction

  • techniques.t1486.data_encrypted_for_impact

  • techniques.t1489.service_stop

  • techniques.t1490.inhibit_system_recovery

  • techniques.t1491.defacement

  • techniques.t1495.firmware_corruption

  • techniques.t1496.resource_hijacking

  • techniques.t1497.virtualization_sandbox_evasion

  • techniques.t1498.network_denial_of_service

  • techniques.t1499.endpoint_denial_of_service

  • techniques.t1505.server_software_component

  • techniques.t1518.software_discovery

  • techniques.t1525.implant_internal_image

  • techniques.t1526.cloud_service_discovery

  • techniques.t1528.steal_application_access_token

  • techniques.t1529.system_shutdown_reboot

  • techniques.t1530.data_from_cloud_storage_object

  • techniques.t1531.account_access_removal

  • techniques.t1534.internal_spearphishing

  • techniques.t1535.unused_unsupported_cloud_regions

  • techniques.t1537.transfer_data_to_cloud_account

  • techniques.t1538.cloud_service_dashboard

  • techniques.t1539.steal_web_session_cookie

  • techniques.t1542.pre_os_boot

  • techniques.t1543.create_or_modify_system_process

  • techniques.t1546.event_triggered_execution

  • techniques.t1547.boot_or_logon_autostart_execution

  • techniques.t1548.abuse_elevation_control_mechanism

  • techniques.t1550.use_alternate_authentication_material

  • techniques.t1552.unsecured_credentials

  • techniques.t1553.subvert_trust_controls

  • techniques.t1554.compromise_client_software_binary

  • techniques.t1555.credentials_from_password_stores

  • techniques.t1556.modify_authentication_process

  • techniques.t1557.adversary_in_the_middle

  • techniques.t1558.steal_or_forge_kerberos_tickets

  • techniques.t1559.inter_process_communication

  • techniques.t1560.archive_collected_data

  • techniques.t1561.disk_wipe

  • techniques.t1562.impair_defenses

  • techniques.t1563.remote_service_session_hijacking

  • techniques.t1564.hide_artifacts

  • techniques.t1565.data_manipulation

  • techniques.t1566.phishing

  • techniques.t1567.exfiltration_over_web_service

  • techniques.t1568.dynamic_resolution

  • techniques.t1569.system_services

  • techniques.t1570.lateral_tool_transfer

  • techniques.t1571.non_standard_port

  • techniques.t1572.protocol_tunneling

  • techniques.t1573.encrypted_channel

  • techniques.t1574.hijack_execution_flow

  • techniques.t1578.modify_cloud_compute_infrastructure

  • techniques.t1580.cloud_infrastructure_discovery

  • techniques.t1583.acquire_infrastructure

  • techniques.t1584.compromise_infrastructure

  • techniques.t1585.establish_accounts

  • techniques.t1586.compromise_accounts

  • techniques.t1587.develop_capabilities

  • techniques.t1588.obtain_capabilities

  • techniques.t1589.gather_victim_identity_information

  • techniques.t1590.gather_victim_network_information

  • techniques.t1591.gather_victim_org_information

  • techniques.t1592.gather_victim_host_information

  • techniques.t1593.search_open_websites_domains

  • techniques.t1594.search_victim_owned_websites

  • techniques.t1595.active_scanning

  • techniques.t1596.search_open_technical_databases

  • techniques.t1597.search_closed_sources

  • techniques.t1598.phishing_for_information

  • techniques.t1599.network_boundary_bridging

  • techniques.t1600.weaken_encryption

  • techniques.t1601.modify_system_image

  • techniques.t1602.data_from_configuration_repository

  • techniques.t1606.forge_web_credentials

  • techniques.t1608.stage_capabilities

  • techniques.t1609.container_administration_command

  • techniques.t1610.deploy_container

  • techniques.t1611.escape_to_host

  • techniques.t1612.build_image_on_host

  • techniques.t1613.container_and_resource_discovery

  • techniques.t1614.system_location_discovery

  • techniques.t1615.group_policy_discovery

  • techniques.t1619.cloud_storage_object_discovery

  • techniques.t1620.reflective_code_loading

Last updated

Was this helpful?