Abuse Elevation Control Mechanism
Access Token Manipulation
Deobfuscate/Decode Files or Information
Domain or Tenant Policy Modification
Execution Guardrails
T1480.001Environmental Keying
Exploitation for Defense Evasion
File and Directory Permissions Modification
T1222.001Windows File and Directory Permissions Modification
T1222.002Linux and Mac File and Directory Permissions Modification
Hide Artifacts
T1564.001Hidden Files and Directories
T1564.002Hidden Users
T1564.003Hidden Window
T1564.004NTFS File Attributes
T1564.005Hidden File System
T1564.006Run Virtual Instance
T1564.007VBA Stomping
T1564.008Email Hiding Rules
T1564.009Resource Forking
T1564.010Process Argument Spoofing
T1564.011Ignore Process Interrupts
T1564.012File/Path Exclusions
Impair Defenses
T1562.001Disable or Modify Tools
T1562.002Disable Windows Event Logging
T1562.003Impair Command History Logging
T1562.004Disable or Modify System Firewall
T1562.006Indicator Blocking
T1562.007Disable or Modify Cloud Firewall
T1562.008Disable or Modify Cloud Logs
T1562.009Safe Mode Boot
T1562.010Downgrade Attack
T1562.011Spoof Security Alerting
T1562.012Disable or Modify Linux Audit System
Indicator Removal
T1070.001Clear Windows Event Logs
T1070.002Clear Linux or Mac System Logs
T1070.003Clear Command History
T1070.004File Deletion
T1070.005Network Share Connection Removal
T1070.006Timestomp
T1070.007Clear Network Connection History and Configurations
T1070.008Clear Mailbox Data
T1070.009Clear Persistence
Indirect Command Execution
Masquerading
T1036.001Invalid Code Signature
T1036.002Right-to-Left Override
T1036.003Rename System Utilities
T1036.004Masquerade Task or Service
T1036.005Match Legitimate Name or Location
T1036.006Space after Filename
T1036.007Double File Extension
T1036.008Masquerade File Type
T1036.009Break Process Trees
T1036.010Masquerade Account Name
Modify Authentication Process
Modify Cloud Compute Infrastructure
T1578.001Create Snapshot
T1578.002Create Cloud Instance
T1578.003Delete Cloud Instance
T1578.004Revert Cloud Instance
T1578.005Modify Cloud Compute Configurations
Modify System Image
T1601.001Patch System Image
T1601.002Downgrade System Image
Network Boundary Bridging
T1599.001Network Address Translation Traversal
Obfuscated Files or Information
T1027.001Binary Padding
T1027.002Software Packing
T1027.003Steganography
T1027.004Compile After Delivery
T1027.005Indicator Removal from Tools
T1027.006HTML Smuggling
T1027.007Dynamic API Resolution
T1027.008Stripped Payloads
T1027.009Embedded Payloads
T1027.010Command Obfuscation
T1027.011Fileless Storage
T1027.012LNK Icon Smuggling
T1027.013Encrypted/Encoded File
T1027.014Polymorphic Code
T1027.015Compression
Subvert Trust Controls
T1553.001Gatekeeper Bypass
T1553.002Code Signing
T1553.003SIP and Trust Provider Hijacking
T1553.004Install Root Certificate
T1553.005Mark-of-the-Web Bypass
T1553.006Code Signing Policy Modification
System Binary Proxy Execution
T1218.001Compiled HTML File
T1218.002Control Panel
T1218.003CMSTP
T1218.004InstallUtil
T1218.005Mshta
T1218.007Msiexec
T1218.008Odbcconf
T1218.009Regsvcs/Regasm
T1218.010Regsvr32
T1218.011Rundll32
T1218.012Verclsid
T1218.013Mavinject
T1218.014MMC
T1218.015Electron Applications
System Script Proxy Execution
T1216.001PubPrn
T1216.002SyncAppvPublishingServer
Trusted Developer Utilities Proxy Execution
T1127.001MSBuild
T1127.002ClickOnce
Unused/Unsupported Cloud Regions
Use Alternate Authentication Material
T1550.001Application Access Token
T1550.002Pass the Hash
T1550.003Pass the Ticket
T1550.004Web Session Cookie
Virtualization/Sandbox Evasion
T1497.001System Checks
T1497.002User Activity Based Checks
T1497.003Time Based Evasion
Weaken Encryption
T1600.001Reduce Key Space
T1600.002Disable Crypto Hardware