| T0843_ICS | Program Download | OT | Lateral Movement | MITRE ATT&CK |
| T0866_ICS | Exploitation of Remote Services | OT | Initial Access, Lateral Movement | MITRE ATT&CK |
| T0843 | Program Download | | Lateral Movement | MITRE ATT&CK |
| T0814_ICS | Denial of Service | OT | Inhibit Response Function | MITRE ATT&CK |
| T0891_ICS | Hardcoded Credentials | OT | Lateral Movement, Persistence | MITRE ATT&CK |
| T0812 | Default Credentials | | Lateral Movement | MITRE ATT&CK |
| T1133_Windows | External Remote Services (Windows) | Windows | Persistence, Initial Access | MITRE ATT&CK |
| 1078.001 | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1021.001_Windows | Remote Services: Remote Desktop Protocol | Windows | Lateral Movement | MITRE ATT&CK |
| T1021.006_Windows | Remote Services: Windows Remote Management | Windows | Lateral Movement | MITRE ATT&CK |
| T1059.004_Linux | Command and Scripting Interpreter: Unix Shell | Linux | Execution | MITRE ATT&CK |
| T1068_Windows | Exploitation for Privilege Escalation (Windows) | Windows | Privilege Escalation | MITRE ATT&CK |
| T1552.005_AWS | Cloud Instance Metadata API | AWS | Credential Access | MITRE ATT&CK |
| T1555.004_Windows | Credentials from Password Stores: Windows Credential Manager | Windows | Credential Access | MITRE ATT&CK |
| T1574.007_Windows | Path Interception by PATH Environment Variable | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T0873_ICS | Project File Infection | OT | Persistence | MITRE ATT&CK |
| T1003.008 | /etc/passwd and /etc/shadow | | Credential Access | MITRE ATT&CK |
| T1059.001 | Powershell | | Execution | MITRE ATT&CK |
| T1499.004 | Application or System Exploitation | | Impact | MITRE ATT&CK |
| T1555.004 | Windows Credential Manager | | Credential Access | MITRE ATT&CK |
| T1007_Windows | System Service Discovery (Windows) | Windows | Discovery | MITRE ATT&CK |
| T1040_Windows | Network Sniffing (Windows) | Windows | Credential Access, Discovery | MITRE ATT&CK |
| T1048.001_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
| T1069.001_Windows | Permission Groups Discovery: Local Groups | Windows | Discovery | MITRE ATT&CK |
| T1195.002_Windows | Supply Chain Compromise: Compromise Software Supply Chain | Windows | Initial Access | MITRE ATT&CK |
| T1212_Windows | Exploitation for Credential Access (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1518.001_Windows | Software Discovery: Security Software Discovery | Windows | Discovery | MITRE ATT&CK |
| T1003.001 | LSASS Memory | | Credential Access | MITRE ATT&CK |
| T1003.002 | Security Account Manager | | Credential Access | MITRE ATT&CK |
| T1007 | System Service Discovery | | Discovery | MITRE ATT&CK |
| T1021.001 | Remote Desktop Protocol | | Lateral Movement | MITRE ATT&CK |
| T1021.006 | Windows Remote Management | | Lateral Movement | MITRE ATT&CK |
| T1053.005 | Scheduled Task | | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
| T1059.004 | Unix Shell | | Execution | MITRE ATT&CK |
| T1059.006 | Python | | Execution | MITRE ATT&CK |
| T1069.001 | Local Groups | | Discovery | MITRE ATT&CK |
| T1203 | Exploitation for Client Execution | | Execution | MITRE ATT&CK |
| T1518.001 | Security Software Discovery | | Discovery | MITRE ATT&CK |
| T1547.002 | Authentication Package | | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1552.005 | Cloud Instance Metadata API | | Credential Access | MITRE ATT&CK |
| T1003.004_Windows | OS Credential Dumping: LSA Secrets | Windows | Credential Access | MITRE ATT&CK |
| T1003.008_Windows | OS Credential Dumping: /etc/passwd and /etc/shadow | Linux | Credential Access | MITRE ATT&CK |
| T1059.005_Windows | Command and Scripting Interpreter: Visual Basic | Windows | Execution | MITRE ATT&CK |
| T1059.006_Windows | Command and Scripting Interpreter: Python (Windows) | Windows | Execution | MITRE ATT&CK |
| T1078.001_ICS | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1210_Windows | Exploitation of Remote Services (Windows) | Windows | Lateral Movement | MITRE ATT&CK |
| T1218.007_Windows | System Binary Proxy Execution: Msiexec | Windows | Defense Evasion | MITRE ATT&CK |
| T1219_Windows | Remote Access Software | Windows | Command and Control | MITRE ATT&CK |
| T1552.002_Windows | Unsecured Credentials: Credentials in Registry
| Windows | Credential Access | MITRE ATT&CK |
| T1574.009_Windows | Path Interception by Unquoted Path | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |