The test uses Powershell attacks for most of the part, C# (high level programming language) malware and office macros - all of these using different techniques and known exploit frameworks including pen-testing tools. What good would pen-test tools be if AVs could easily defeat them?
ESET and Kaspersky have a strong monitoring against powershell attacks as evident from their own analysis blogs and these tests. They also arguably have among the best "in-memory" scanners (among the AVs), that they have documented in their whitepapers. So it wouldn't be so surprising.
I think Avast/AVG are also not behind, especially since cruelsister suggested.
Detection of malware written in high-level programming language is an ESET DNA strong-point. I do not remember the attack exactly, but Kaspersky's memory protection along with its FW was among the first to detect and block a new state-sponsored malware (no, I am not talking about Duqu 2.0).
I do not think this test is very much advanced either. Just good enough to filter which products can still not handle such known types of targeted attacks, now that one would expect them to :
Many others not participating just indicate they're either not prepared or are not confident about their efficacy.
I believe
@Andy Ful has a good grasp of some of these tools like Metasploit
In another
famous test, ESET, Kaspersky and AVG/Avast were among the few to block in-memory powershell attack using Mimikatz, though ESET did not succeed in the final test.