MITRE ATT&CK Coverage
Observed techniques mapped to the ATT&CK framework
107
Total Events
108
Technique Hits
9
Unique Techniques
T1592
Most Common (17 hits)
ATT&CK Matrix Heatmap
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Active ScanningT159512
Gather Victim Host InformationT159217
Exploit Public-Facing ApplicationT119015
External Remote ServicesT113310
Command and Scripting InterpreterT1059
Unix ShellT1059.00414
Indicator RemovalT107013
Unsecured CredentialsT155216
Credentials In FilesT1552.0011
Exfiltration Over C2 ChannelT104110
Heat scale:
1-5
6-20
20+
Observed Techniques
T1592Gather Victim Host InformationT1552Unsecured CredentialsT1190Exploit Public-Facing ApplicationT1059.004Unix ShellT1070Indicator RemovalT1595Active ScanningT1041Exfiltration Over C2 ChannelT1133External Remote ServicesT1552.001Credentials In Files