Windows Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise. The Matrix contains information for the Windows platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
9 techniques 10 techniques 17 techniques 12 techniques 32 techniques 13 techniques 22 techniques 9 techniques 15 techniques 16 techniques 8 techniques 13 techniques
Last modified: 27 October 2020
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
9 techniques 10 techniques 17 techniques 12 techniques 32 techniques 13 techniques 22 techniques 9 techniques 15 techniques 16 techniques 8 techniques 13 techniques
Last modified: 27 October 2020