logo
TLCTC & MITRE ATT&CK Mapping v18.1
All Clusters
All Tactics
All Platforms
0 Total Techniques
0 Mapped
0 Visible
Page 1 of 1

Loading database...

Summary

698
Total Techniques
222 parent + 476 sub-techniques
604
In-Scope (Mapped)
Mapped to TLCTC clusters
94
Out-of-Scope (N/A)
Reconnaissance & Resource Development
100%
Mapping Coverage
All techniques have mapping arguments

Key Mapping Decisions Applied

Tactic Primary Cluster(s) Rationale
Reconnaissance N/A Pre-attack, outside TLCTC scope
Resource Development N/A Pre-attack infrastructure preparation
Initial Access #2, #4, #8, #9, #10 Depends on entry vector (exploit, creds, physical, social, supply chain)
Execution #1 → #7 Function abuse enables FEC execution (per R-EXEC)
Persistence #1 → #7 System config abuse + malware deployment
Privilege Escalation #1, #1 → #7 Function abuse with optional FEC
Defense Evasion #1, #7, #1 → #7 Function abuse or malware features
Credential Access #1 → #4, #4, #1 or #7 Acquisition via various means, application = #4 (per R-CRED)
Discovery #1 Using designed functionality for enumeration (per R-ABUSE)
Lateral Movement #4 → #1 Identity theft + function abuse
Collection #1 Legitimate function abuse for data gathering
Command and Control #7 Malware communication features
Exfiltration #1 or #7 Function abuse or malware capabilities
Impact #6, #7, #1 Flooding, malware, or function abuse