Published: 29th June
Hover over each tactic heading to reveal data source & technique:
Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network.
DATA SOURCES
• Application Log Content
• File Creation
• Network Connection Creation
• Network Traffic Content
• Process Creation
• Application Log Content
• Network Traffic Flow
• Logon Session Creation
• User Account Authentication
MITRE Techniques
•T1566 Phishing
•T1078 Valid Accounts
Execution consists of techniques that result in adversary-controlled code running on a local or remote system.
DATA SOURCES
MITRE Techniques
Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network.
DATA SOURCES
MITRE Techniques
Credential Access consists of techniques for stealing credentials like account names and passwords.
DATA SOURCES
MITRE Techniques
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network.
DATA SOURCES
MITRE Techniques
Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network.
DATA SOURCES
MITRE Techniques
Exfiltration consists of techniques that adversaries may use to steal data from your network.
DATA SOURCES
MITRE Techniques