ATT&CK Matrix for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
9 techniques 10 techniques 18 techniques 12 techniques 34 techniques 14 techniques 23 techniques 9 techniques 16 techniques 16 techniques 9 techniques 13 techniques