Android Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Android platform. The techniques below are known to target mobile devices running Android operating systems. The Matrix contains information for the Android platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
7 techniques 4 techniques 7 techniques 3 techniques 16 techniques 4 techniques 8 techniques 2 techniques 13 techniques 9 techniques 2 techniques 10 techniques
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
7 techniques 4 techniques 7 techniques 3 techniques 16 techniques 4 techniques 8 techniques 2 techniques 13 techniques 9 techniques 2 techniques 10 techniques