MITRE ATT&CK

Technique-Level Coverage Across Windows and macOS

BallisKit tools map to specific ATT&CK technique IDs, enabling red teams to verify scenario accuracy against threat intelligence reports.

What is MITRE ATT&CK

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. It documents how threat actors operate, from initial compromise through data exfiltration, and provides a common taxonomy that offensive and defensive security teams use to communicate, plan, and validate.

ATT&CK serves as the shared language between threat intelligence providers, red teams, blue teams, and regulators. When a TI report documents that a threat actor uses specific techniques, the red team must reproduce those techniques, not substitute generic alternatives. ATT&CK IDs make that mapping explicit and verifiable.

  • Tactics - The adversary's tactical goal, the "why" behind an action (e.g., Initial Access, Persistence, Defense Evasion)
  • Techniques - The "how" - specific methods used to achieve a tactical goal (e.g., Phishing, Process Injection)
  • Sub-techniques - More granular variants of a technique (e.g., T1566.001 Spearphishing Attachment under T1566 Phishing)
  • Procedures - Specific implementations of techniques by real threat actors or tools

Why ATT&CK Matters for Red Teams

TIBER-EU Compliance

The Threat Intelligence Report specifies ATT&CK technique IDs the red team must reproduce. Tools must map directly to those IDs for the engagement to satisfy regulatory requirements.

Scenario Accuracy Verification

Regulators and white teams verify red team execution against documented techniques. Mapped coverage proves fidelity between the TI report and the actual attack simulation.

Consistent Reporting

ATT&CK IDs in engagement reports create auditable, comparable results across engagements and teams. Technique-level documentation removes ambiguity from deliverables.

Combined Technique Coverage by Tactic

All ATT&CK techniques covered by BallisKit tools, organized by adversary tactic. Each technique card shows the ATT&CK ID, implementation detail, and which product(s) provide coverage.

Initial Access

5 techniques
T1566
Phishing
HTML smuggling, Office lure delivery, DMG/PKG/.app delivery via phishing
MacroPack ProDarwinOps
T1566.001
Spearphishing Attachment
Office document delivery (.docm, .xlsm, .pptm)
MacroPack Pro
T1566.002
Spearphishing Link
URL file and HTML-based delivery
MacroPack Pro
T1204.002
Malicious File
LNK, Office, ClickOnce, PDF, .app, DMG, PKG, VSIX execution
MacroPack ProDarwinOps
T1105
Ingress Tool Transfer
ClickOnce, MSI, and dropper templates
MacroPack Pro

Execution

7 techniques
T1059.005
Visual Basic
VBS and VBA macro execution
MacroPack Pro
T1059.007
JavaScript
HTA, WSF, XSL script execution
MacroPack Pro
T1059.002
AppleScript / JXA
JXA (JavaScript for Automation) execution and remote loading
DarwinOps
T1218.005
Mshta
MSHTA proxy execution method
MacroPack Pro
T1218.010
Regsvr32
Regsvr32 / scrobj.dll proxy execution
MacroPack Pro
T1218.011
Rundll32
Rundll32 DLL proxy execution
MacroPack Pro
T1106
Native API
Direct and indirect syscalls bypassing userland hooks
ShellcodePack

Persistence

3 techniques
T1543.001
Launch Agent
LaunchAgent plist-based persistence
DarwinOps
T1543.004
Launch Daemon
System-level persistence via LaunchDaemon
DarwinOps
T1647
Plist Modification
LaunchAgent and LaunchDaemon plist injection
DarwinOps

Privilege Escalation

5 techniques
T1548.002
Bypass UAC
UAC bypass for privilege escalation
MacroPack Pro
T1548.001
Setuid and Setgid
SUID/SGID binary abuse for privilege escalation
DarwinOps
T1548.004
Elevated Execution with Prompt
osascript-based fake system dialog for credential capture
DarwinOps
T1134.004
Parent PID Spoofing
PPID_SPOOF template - forge process ancestry
MacroPack Pro
T1574.004
Dylib Hijacking
Exploit dynamic library load order for code execution
DarwinOps

Defense Evasion

13 techniques
T1055.012
Process Hollowing
RunPE template - hollow legitimate process and inject shellcode
MacroPack Pro
T1055
Process Injection
Threadless execution, process injection variants
ShellcodePack
T1027
Obfuscated Files or Information
Multi-layer encryption, polymorphic transformation
ShellcodePack
T1027.010
Command Obfuscation
Dosfuscate cmd.exe obfuscation
MacroPack Pro
T1027.002
Software Packing
Multi-layer encryption stacking
ShellcodePack
T1221
Template Injection
CVE-2022-30190 (Follina) MSDT template injection
MacroPack Pro
T1553.005
Mark-of-the-Web Bypass
ISO/container delivery bypasses MoTW propagation
MacroPack Pro
T1553.001
Gatekeeper Bypass
Payload generation compatible with Gatekeeper bypass techniques
DarwinOps
T1628.003
Hidden Window
--no-dock flag suppresses Dock appearance
DarwinOps
T1562.001
Disable or Modify Tools
ETW patching, AMSI bypass, DLL unhooking
ShellcodePack
T1574.002
DLL Side-Loading
DLL proxying and sideloading
ShellcodePack
T1036.001
Invalid Code Signature
Certificate spoofing on output binaries
ShellcodePack
T1620
Reflective Code Loading
Reflective DLL loading
ShellcodePack

Credential Access

1 technique
T1056.002
GUI Input Capture
Fake UI privilege prompts (osascript password capture)
DarwinOps

Product Technique Summary

MacroPack Pro

Windows
16+
ATT&CK techniques covered
  • Initial Access
  • Execution
  • Privilege Escalation
  • Defense Evasion
View MacroPack Pro

ShellcodePack

Windows
8+
ATT&CK techniques covered
  • Execution
  • Defense Evasion
View ShellcodePack

DarwinOps

macOS
12+
ATT&CK techniques covered
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
View DarwinOps
TIBER-EU

ATT&CK Coverage for TIBER-EU Engagements

TIBER-EU mandates that red teams reproduce specific threat actor techniques documented in the Threat Intelligence Report. BallisKit's mapped ATT&CK coverage across Windows and macOS enables red teams to demonstrate technique-level fidelity between the TI report and the executed adversary simulation.

Learn how BallisKit supports TIBER-EU

Evaluate BallisKit for Your Next Engagement

Professional email required. Response within 24 hours.