| T1069.001_Windows | Permission Groups Discovery: Local Groups | Windows | Discovery | MITRE ATT&CK |
| T1135 | Network Share Discovery | | Discovery | MITRE ATT&CK |
| T1135_Windows | Network Share Discovery (Windows) | Windows | Discovery | MITRE ATT&CK |
| T1219_Windows | Remote Access Software | Windows | Command and Control | MITRE ATT&CK |
| T1547.002_Windows | Boot or Logon Autostart Execution: Authentication Package | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1552.002 | Credentials in Registry | | Credential Access | MITRE ATT&CK |
| T1552.005_AWS | Cloud Instance Metadata API | AWS | Credential Access | MITRE ATT&CK |
| T1574.011_Windows | Hijack Execution Flow: Services Registry Permissions Weakness | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1212 | Exploitation for Credential Access | | Credential Access | MITRE ATT&CK |
| T0812_ICS | Default Credentials | OT | Lateral Movement | MITRE ATT&CK |
| T0820_ICS | Exploitation for Evasion | OT | Evasion | MITRE ATT&CK |
| T0891_ICS | Hardcoded Credentials | OT | Lateral Movement, Persistence | MITRE ATT&CK |
| T1003.003_Windows | OS Credential Dumping: NTDS | Windows | Credential Access | MITRE ATT&CK |
| T1078.002 | Domain Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.002_Windows | Valid Accounts: Domain Accounts | Windows | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1082 | System Information Discovery | | Discovery | MITRE ATT&CK |
| T1484.002 | Trust Modification | | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1528_AWS | Steal Application Access Token (AWS) | AWS | Collection | MITRE ATT&CK |
| T1556.007 | Hybrid Identity | | Credential Access, Defense Evasion, Persistence | MITRE ATT&CK |
| T1574.010_Windows | Hijack Execution Flow: Services File Permissions Weakness | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1003.004 | LSA Secrets | | Credential Access | MITRE ATT&CK |
| T0820 | Exploitation for Evasion | | Evasion | MITRE ATT&CK |
| T0843 | Program Download | | Lateral Movement | MITRE ATT&CK |
| T0845_ICS | Program Upload | OT | Collection | MITRE ATT&CK |
| T1190_Aws | Exploit Public-Facing Application (Aws) | Aws | Initial Access, Persistence | MITRE ATT&CK |
| T0866 | Exploitation of Remote Services | | Initial Access, Lateral Movement | MITRE ATT&CK |
| T1003.003 | NTDS | | Credential Access | MITRE ATT&CK |
| T1484.002_Azure | Domain Policy Modification: Trust Modification(Azure) | Entra ID | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1550.001_Windows | Material: Application Access Token | Windows | Lateral Movement, Defense Evasion | MITRE ATT&CK |
| T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | | Credential Access, Collection | MITRE ATT&CK |
| T0812 | Default Credentials | | Lateral Movement | MITRE ATT&CK |
| T0891 | Hardcoded Credentials | | Lateral Movement, Persistence | MITRE ATT&CK |
| T1037.003 | Network Logon Script | | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1059.009_Azure | Command and Scripting Interpreter: Cloud API | Entra ID | Execution | MITRE ATT&CK |
| T1069.003_Azure | Permission Groups Discovery:Cloud Groups(Azure) | Entra ID | Discovery | MITRE ATT&CK |
| T1087.004_AWS | Account Discovery: Cloud Account (AWS) | AWS | Discovery | MITRE ATT&CK |
| T1204.002_AWS | User Execution: Malicious File (AWS) | AWS | Execution | MITRE ATT&CK |
| T1482_Windows | Domain Trust Discovery | Windows | Discovery | MITRE ATT&CK |
| T1484.001_Windows | Domain Policy Modification: Group Policy Modification | Windows | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1528 | Steal Application Access Token | | Collection | MITRE ATT&CK |
| T1548 | Abuse Elevation Control Mechanism | | Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1550.003 | Pass the Ticket | | Defense Evasion, Lateral Movement | MITRE ATT&CK |
| T1556.001 | Domain Controller Authentication | | Credential Access, Defense Evasion, Persistence | MITRE ATT&CK |
| T1558.003_Windows | Steal or Forge Kerberos Tickets: Kerberoasting | Windows | Credential Access | MITRE ATT&CK |
| T1619_AWS | Cloud Storage Object Discovery(AWS) | AWS | Discovery | MITRE ATT&CK |
| T1098.001_AWS | Account Manipulation: Additional Cloud Credentials | AWS | Persistence | MITRE ATT&CK |
| T1098.003 | Additional Cloud Roles | | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1003.006_Windows | OS Credential Dumping: DCSync | Windows | Credential Access | MITRE ATT&CK |
| T1098.001 | Additional Cloud Credentials | | Persistence | MITRE ATT&CK |
| T1098.004 | SSH Authorized Keys | | Privilege Escalation, Persistence | MITRE ATT&CK |