| T1558.003_Windows | Steal or Forge Kerberos Tickets: Kerberoasting | Windows | Credential Access | MITRE ATT&CK |
| T1606.002 | SAML Tokens | | Credential Access | MITRE ATT&CK |
| T1619_AWS | Cloud Storage Object Discovery(AWS) | AWS | Discovery | MITRE ATT&CK |
| T0814 | Denial of Service | | Inhibit Response Function | MITRE ATT&CK |
| T0822 | External Remote Services | | Initial Access | MITRE ATT&CK |
| T0843_ICS | Program Download | OT | Lateral Movement | MITRE ATT&CK |
| T0866_ICS | Exploitation of Remote Services | OT | Initial Access, Lateral Movement | MITRE ATT&CK |
| T1069.002_Windows | Permission Groups Discovery: Domain Groups | Windows | Discovery | MITRE ATT&CK |
| T1098.001_AWS | Account Manipulation: Additional Cloud Credentials | AWS | Persistence | MITRE ATT&CK |
| T1098.003 | Additional Cloud Roles | | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1557.001_Windows | Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay | Windows | Credential Access, Collection | MITRE ATT&CK |
| T1649 | Steal or Forge Authentication Certificates | | Credential Access | MITRE ATT&CK |
| T1133_AWS | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK |
| T1003.006_Windows | OS Credential Dumping: DCSync | Windows | Credential Access | MITRE ATT&CK |
| T1012 | Query Registry | | Discovery | MITRE ATT&CK |
| T1048.001_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
| T1059.001 | Powershell | | Execution | MITRE ATT&CK |
| T1078.001_ICS | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.003 | Local Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1098.001 | Additional Cloud Credentials | | Persistence | MITRE ATT&CK |
| T1098.004 | SSH Authorized Keys | | Privilege Escalation, Persistence | MITRE ATT&CK |
| T1212_Windows | Exploitation for Credential Access (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1218.007 | Msiexec | | Defense Evasion | MITRE ATT&CK |
| T1218.007_Windows | System Binary Proxy Execution: Msiexec | Windows | Defense Evasion | MITRE ATT&CK |
| T1482 | Domain Trust Discovery | | Discovery | MITRE ATT&CK |
| T1495 | Firmware Corruption | | Impact | MITRE ATT&CK |
| T1537 | Transfer Data to Cloud Account | | Exfiltration | MITRE ATT&CK |
| T1548_Windows | Abuse Elevation Control Mechanism | Windows | Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1558.003 | Kerberoasting | | Credential Access | MITRE ATT&CK |
| T1558.004_Windows | Steal or Forge Kerberos Tickets: AS-REP Roasting | Windows | Credential Access | MITRE ATT&CK |
| T1574.007_Windows | Path Interception by PATH Environment Variable | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1619 | Cloud Storage Object Discovery | | Discovery | MITRE ATT&CK |
| T1648 | Serverless Execution | | Execution | MITRE ATT&CK |
| T1648_AWS | Serverless Execution | AWS | Execution | MITRE ATT&CK |
| T1048.001 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
| T1592.002_PRE | Gather Victim Host Information: Software | PRE | Reconnaissance | MITRE ATT&CK |
| T1003.004 | LSA Secrets | | Credential Access | MITRE ATT&CK |
| T1574.010_Windows | Hijack Execution Flow: Services File Permissions Weakness | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1003.003 | NTDS | | Credential Access | MITRE ATT&CK |
| T1087.004 | Cloud Account | | Discovery | MITRE ATT&CK |
| T1098.003_Azure | Account Manipulation: Additional Cloud Roles (Azure) | Entra ID | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1484.002_Azure | Domain Policy Modification: Trust Modification(Azure) | Entra ID | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1550.001_Windows | Material: Application Access Token | Windows | Lateral Movement, Defense Evasion | MITRE ATT&CK |
| T1580 | Cloud Infrastructure Discovery | | Discovery | MITRE ATT&CK |
| T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | | Credential Access, Collection | MITRE ATT&CK |
| T0812 | Default Credentials | | Lateral Movement | MITRE ATT&CK |
| T0891 | Hardcoded Credentials | | Lateral Movement, Persistence | MITRE ATT&CK |
| T1133_Azure | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK |
| T1133 | External Remote Services | | Persistence, Initial Access | MITRE ATT&CK |
| T0846 | Remote System Discovery | | Discovery | MITRE ATT&CK |