| T1526 | Cloud Service Discovery | | Discovery | MITRE ATT&CK |
| T1012 | Query Registry | | Discovery | MITRE ATT&CK |
| T1048.001_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
| T1059.001 | Powershell | | Execution | MITRE ATT&CK |
| T1078.001_ICS | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.003 | Local Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1212_Windows | Exploitation for Credential Access (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1218.007 | Msiexec | | Defense Evasion | MITRE ATT&CK |
| T1218.007_Windows | System Binary Proxy Execution: Msiexec | Windows | Defense Evasion | MITRE ATT&CK |
| T1495 | Firmware Corruption | | Impact | MITRE ATT&CK |
| T1574.007_Windows | Path Interception by PATH Environment Variable | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1048.001 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
| T1098.001 | Additional Cloud Credentials | | Persistence | MITRE ATT&CK |
| T1098.004 | SSH Authorized Keys | | Privilege Escalation, Persistence | MITRE ATT&CK |
| T1537 | Transfer Data to Cloud Account | | Exfiltration | MITRE ATT&CK |
| T1619 | Cloud Storage Object Discovery | | Discovery | MITRE ATT&CK |
| T1648 | Serverless Execution | | Execution | MITRE ATT&CK |
| T1648_AWS | Serverless Execution | AWS | Execution | MITRE ATT&CK |
| T1574.010 | Services File Permissions Weakness | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1190 | Exploit Public-Facing Application | | Initial Access, Persistence | MITRE ATT&CK |
| T1078.004 | Cloud Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.004_Azure | Valid Accounts: Cloud Accounts | Entra ID | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1069.003 | Cloud Groups | | Discovery | MITRE ATT&CK |
| T1003.001_Windows | OS Credential Dumping: LSASS Memory | Windows | Credential Access | MITRE ATT&CK |
| T1003.002 | Security Account Manager | | Credential Access | MITRE ATT&CK |
| T1003.004_Windows | OS Credential Dumping: LSA Secrets | Windows | Credential Access | MITRE ATT&CK |
| T1003.008 | /etc/passwd and /etc/shadow | | Credential Access | MITRE ATT&CK |
| T1021.001_Windows | Remote Services: Remote Desktop Protocol | Windows | Lateral Movement | MITRE ATT&CK |
| T1021.003 | Distributed Component Object Model | | Lateral Movement | MITRE ATT&CK |
| T1021.006_Windows | Remote Services: Windows Remote Management | Windows | Lateral Movement | MITRE ATT&CK |
| T1053.005 | Scheduled Task | | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
| T1059.001_Windows | Command and Scripting Interpreter: PowerShell (Windows) | Windows | Execution | MITRE ATT&CK |
| T1059.003_Windows | Command and Scripting Interpreter: Windows Command Shell | Windows | Execution | MITRE ATT&CK |
| T1059.006_Windows | Command and Scripting Interpreter: Python (Windows) | Windows | Execution | MITRE ATT&CK |
| T1068_Windows | Exploitation for Privilege Escalation (Windows) | Windows | Privilege Escalation | MITRE ATT&CK |
| T1078.001 | Default Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.003_Windows | Valid Accounts: Local Accounts | Windows | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1195.002 | Compromise Software Supply Chain | | Initial Access | MITRE ATT&CK |
| T1195.002_Windows | Supply Chain Compromise: Compromise Software Supply Chain | Windows | Initial Access | MITRE ATT&CK |
| T1555.004 | Windows Credential Manager | | Credential Access | MITRE ATT&CK |
| T1555.004_Windows | Credentials from Password Stores: Windows Credential Manager | Windows | Credential Access | MITRE ATT&CK |
| T1574.007 | Path Interception by PATH Environment Variable | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1606.002_Azure | Forge Web Credentials:SAML Tokens(Azure) | Entra ID | Credential Access | MITRE ATT&CK |
| T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
| T1048.003 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
| T1098.001_Azure | Account Manipulation: Additional Cloud Credentials | Entra ID | Persistence | MITRE ATT&CK |
| T1548.005 | Temporary Elevated Cloud Access | | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1059.009 | Cloud API | | Execution | MITRE ATT&CK |
| T1087.004 | Cloud Account | | Discovery | MITRE ATT&CK |
| T1098.003_Azure | Account Manipulation: Additional Cloud Roles (Azure) | Entra ID | Persistence, Privilege Escalation | MITRE ATT&CK |