T1499.004 | Application or System Exploitation | | Impact | MITRE ATT&CK |
T1555.004 | Windows Credential Manager | | Credential Access | MITRE ATT&CK |
T1550.001_Windows | Material: Application Access Token | Windows | Lateral Movement, Defense Evasion | MITRE ATT&CK |
T1528_AWS | Steal Application Access Token (AWS) | AWS | Collection | MITRE ATT&CK |
T1082 | System Information Discovery | | Discovery | MITRE ATT&CK |
T1190 | Exploit Public-Facing Application | | Initial Access, Persistence | MITRE ATT&CK |
T1078.004_Azure | Valid Accounts: Cloud Accounts | Entra ID | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1087.004 | Cloud Account | | Discovery | MITRE ATT&CK |
T1133_Windows | External Remote Services (Windows) | Windows | Persistence, Initial Access | MITRE ATT&CK |
T1133_Azure | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK |
T1087.004_AWS | Account Discovery: Cloud Account (AWS) | AWS | Discovery | MITRE ATT&CK |
T1204.002_AWS | User Execution: Malicious File (AWS) | AWS | Execution | MITRE ATT&CK |
T1648_AWS | Serverless Execution | AWS | Execution | MITRE ATT&CK |
T1021.007 | Cloud Services | | Lateral Movement | MITRE ATT&CK |
T1098.004 | SSH Authorized Keys | | Privilege Escalation, Persistence | MITRE ATT&CK |
T1078.002_Windows | Valid Accounts: Domain Accounts | Windows | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1069.002 | Domain Groups | | Discovery | MITRE ATT&CK |
T1098.001_AWS | Account Manipulation: Additional Cloud Credentials | AWS | Persistence | MITRE ATT&CK |
T1098.003_Azure | Account Manipulation: Additional Cloud Roles (Azure) | Entra ID | Persistence, Privilege Escalation | MITRE ATT&CK |
T1526 | Cloud Service Discovery | | Discovery | MITRE ATT&CK |
T1003.003 | NTDS | | Credential Access | MITRE ATT&CK |
T1003.001_Windows | OS Credential Dumping: LSASS Memory | Windows | Credential Access | MITRE ATT&CK |
T1003.002_Windows | OS Credential Dumping: Security Account Manager | Windows | Credential Access | MITRE ATT&CK |
T1021.002_Windows | Remote Services: SMB/Windows Admin Shares | Windows | Lateral Movement | MITRE ATT&CK |
T1047_Windows | Windows Management Instrumentation | Windows | Execution | MITRE ATT&CK |
T1048.002_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
T1053.005_Windows | Scheduled Task/Job: Scheduled Task | Windows | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
T1059.001_Windows | Command and Scripting Interpreter: PowerShell (Windows) | Windows | Execution | MITRE ATT&CK |
T1211_Windows | Exploitation for Defense Evasion (Windows) | Windows | Defense Evasion | MITRE ATT&CK |
T1547.002_Windows | Boot or Logon Autostart Execution: Authentication Package | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
T1547.005_Windows | Boot or Logon Autostart Execution: Security Support Provider | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
T1135_Windows | Network Share Discovery (Windows) | Windows | Discovery | MITRE ATT&CK |
T1012 | Query Registry | | Discovery | MITRE ATT&CK |
T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
T1059.003 | Windows Command Shell | | Execution | MITRE ATT&CK |
T1068 | Exploitation for Privilege Escalation | | Privilege Escalation | MITRE ATT&CK |
T1078.001 | Default Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1078.003 | Local Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1212 | Exploitation for Credential Access | | Credential Access | MITRE ATT&CK |
T1495 | Firmware Corruption | | Impact | MITRE ATT&CK |
T1574.007 | Path Interception by PATH Environment Variable | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
T1069.003_AWS | Permission Groups Discovery: Cloud Groups (AWS) | AWS | Discovery | MITRE ATT&CK |
T1580_AWS | Cloud Infrastructure Discovery(AWS) | AWS | Discovery | MITRE ATT&CK |
T1530_AWS | Data from Cloud Storage Object (AWS) | AWS | Collection | MITRE ATT&CK |
T1098.001 | Additional Cloud Credentials | | Persistence | MITRE ATT&CK |
T1530 | Data from Cloud Storage | | Collection | MITRE ATT&CK |
T1537 | Transfer Data to Cloud Account | | Exfiltration | MITRE ATT&CK |
T1555.006 | Cloud Secrets Management Stores | | Credential Access | MITRE ATT&CK |
T1648 | Serverless Execution | | Execution | MITRE ATT&CK |
T1003.004_Windows | OS Credential Dumping: LSA Secrets | Windows | Credential Access | MITRE ATT&CK |