Defense Evasion

Id Name
4 Abuse Elevation Control Mechanism
5 Access Token Manipulation
19 Application Access Token
30 Asynchronous Procedure Call
37 BITS Jobs
40 Binary Padding
43 Bootkit
49 Build Image on Host
51 Bypass User Account Control
53 CMSTP
54 COR_PROFILER
57 Clear Command History
58 Clear Linux or Mac System Logs
59 Clear Windows Event Logs
64 Cloud Accounts
70 Code Signing
73 Code Signing Policy Modification
77 Compile After Delivery
78 Compiled HTML File
79 Component Firmware
94 Control Panel
96 Create Cloud Instance
97 Create Process with Token
98 Create Snapshot
109 DLL Search Order Hijacking
110 DLL Side-Loading
132 Default Accounts
133 Delete Cloud Instance
134 Deobfuscate/Decode Files or Information
135 Deploy Container
142 Direct Volume Access
143 Disable Cloud Logs
144 Disable Crypto Hardware
145 Disable Windows Event Logging
146 Disable or Modify Cloud Firewall
147 Disable or Modify System Firewall
148 Disable or Modify Tools
155 Domain Accounts
156 Domain Controller Authentication
160 Domain Policy Modification
163 Domain Trust Modification
166 Downgrade System Image
169 Dylib Hijacking
171 Dynamic Linker Hijacking
173 Dynamic-link Library Injection
174 Elevated Execution with Prompt
185 Environmental Keying
190 Executable Installer File Permissions Weakness
191 Execution Guardrails
207 Exploitation for Defense Evasion
215 Extra Window Memory Injection
218 File Deletion
221 File and Directory Permissions Modification
227 Gatekeeper Bypass
234 Group Policy Modification
238 Hidden File System
239 Hidden Files and Directories
240 Hidden Users
241 Hidden Window
242 Hide Artifacts
243 Hijack Execution Flow
249 Impair Command History Logging
250 Impair Defenses
252 Indicator Blocking
253 Indicator Removal from Tools
254 Indicator Removal on Host
255 Indirect Command Execution
260 Install Root Certificate
261 InstallUtil
267 Invalid Code Signature
275 LC_MAIN Hijacking
286 Linux and Mac File and Directory Permissions Modification
289 Local Accounts
295 MSBuild
297 Make and Impersonate Token
305 Mark-of-the-Web Bypass
306 Masquerade Task or Service
307 Masquerading
308 Match Legitimate Name or Location
309 Modify Authentication Process
310 Modify Cloud Compute Infrastructure
311 Modify Registry
312 Modify System Image
313 Mshta
314 Msiexec
319 NTFS File Attributes
322 Network Address Translation Traversal
323 Network Boundary Bridging
325 Network Device Authentication
331 Network Share Connection Removal
341 Obfuscated Files or Information
343 Odbcconf
351 Parent PID Spoofing
352 Pass the Hash
353 Pass the Ticket
355 Password Filter DLL
360 Patch System Image
362 Path Interception by PATH Environment Variable
363 Path Interception by Search Order Hijacking
364 Path Interception by Unquoted Path
370 Pluggable Authentication Modules
371 Port Knocking
373 Portable Executable Injection
376 Pre-OS Boot
380 Proc Memory
382 Process Doppelgänging
383 Process Hollowing
384 Process Injection
388 Ptrace System Calls
389 PubPrn
395 ROMMONkit
397 Reduce Key Space
398 Redundant Access
401 Regsvcs/Regasm
402 Regsvr32
410 Rename System Utilities
413 Revert Cloud Instance
414 Right-to-Left Override
415 Rogue Domain Controller
416 Rootkit
417 Run Virtual Instance
418 Rundll32
421 SID-History Injection
422 SIP and Trust Provider Hijacking
436 Scripting
452 Services File Permissions Weakness
453 Services Registry Permissions Weakness
454 Setuid and Setgid
459 Signed Binary Proxy Execution
460 Signed Script Proxy Execution
468 Software Packing
470 Space after Filename
483 Steganography
486 Subvert Trust Controls
487 Sudo and Sudo Caching
490 System Checks
491 System Firmware
503 TFTP Boot
505 Template Injection
506 Thread Execution Hijacking
507 Thread Local Storage
509 Time Based Evasion
511 Timestomp
512 Token Impersonation/Theft
515 Traffic Signaling
520 Trusted Developer Utilities Proxy Execution
526 Unused/Unsupported Cloud Regions
529 Use Alternate Authentication Material
530 User Activity Based Checks
532 VBA Stomping
533 VDSO Hijacking
535 Valid Accounts
536 Verclsid
540 Virtualization/Sandbox Evasion
545 Weaken Encryption
552 Web Session Cookie
556 Windows File and Directory Permissions Modification
563 XSL Script Processing