T1048.002_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
T1053.005_Windows | Scheduled Task/Job: Scheduled Task | Windows | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
T1059.001_Windows | Command and Scripting Interpreter: PowerShell (Windows) | Windows | Execution | MITRE ATT&CK |
T1211_Windows | Exploitation for Defense Evasion (Windows) | Windows | Defense Evasion | MITRE ATT&CK |
T1547.002_Windows | Boot or Logon Autostart Execution: Authentication Package | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
T1547.005_Windows | Boot or Logon Autostart Execution: Security Support Provider | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
T1135_Windows | Network Share Discovery (Windows) | Windows | Discovery | MITRE ATT&CK |
T1012 | Query Registry | | Discovery | MITRE ATT&CK |
T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
T1059.003 | Windows Command Shell | | Execution | MITRE ATT&CK |
T1068 | Exploitation for Privilege Escalation | | Privilege Escalation | MITRE ATT&CK |
T1078.001 | Default Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1078.003 | Local Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1212 | Exploitation for Credential Access | | Credential Access | MITRE ATT&CK |
T1495 | Firmware Corruption | | Impact | MITRE ATT&CK |
T1574.007 | Path Interception by PATH Environment Variable | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
T1133 | External Remote Services | | Persistence, Initial Access | MITRE ATT&CK |
T1003.004_Windows | OS Credential Dumping: LSA Secrets | Windows | Credential Access | MITRE ATT&CK |
T1003.008_Windows | OS Credential Dumping: /etc/passwd and /etc/shadow | Linux | Credential Access | MITRE ATT&CK |
T1059.005_Windows | Command and Scripting Interpreter: Visual Basic | Windows | Execution | MITRE ATT&CK |
T1059.006_Windows | Command and Scripting Interpreter: Python (Windows) | Windows | Execution | MITRE ATT&CK |
T1078.001_ICS | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1210_Windows | Exploitation of Remote Services (Windows) | Windows | Lateral Movement | MITRE ATT&CK |
T1218.007_Windows | System Binary Proxy Execution: Msiexec | Windows | Defense Evasion | MITRE ATT&CK |
T1219_Windows | Remote Access Software | Windows | Command and Control | MITRE ATT&CK |
T1552.002_Windows | Unsecured Credentials: Credentials in Registry
| Windows | Credential Access | MITRE ATT&CK |
T1574.009_Windows | Path Interception by Unquoted Path | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
T1606.002_Azure | Forge Web Credentials:SAML Tokens(Azure) | Entra ID | Credential Access | MITRE ATT&CK |
T1021.003 | Distributed Component Object Model | | Lateral Movement | MITRE ATT&CK |
T1040 | Network Sniffing | | Credential Access, Discovery | MITRE ATT&CK |
T1047 | Windows Management Instrumentation | | Execution | MITRE ATT&CK |
T1048.003 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
T1059.005 | Windows Command Shell | | Execution | MITRE ATT&CK |
T1211 | Exploitation for Defense Evasion | | Defense Evasion | MITRE ATT&CK |
T1218.007 | Msiexec | | Defense Evasion | MITRE ATT&CK |
T1219 | Remote Access Software | | Command and Control | MITRE ATT&CK |
T1547.005 | Security Support Provider | | Persistence, Privilege Escalation | MITRE ATT&CK |
T1552.002 | Credentials in Registry | | Credential Access | MITRE ATT&CK |
T1574.009 | Path Interception by Unquoted Path | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
T1007_Windows | System Service Discovery (Windows) | Windows | Discovery | MITRE ATT&CK |
T1040_Windows | Network Sniffing (Windows) | Windows | Credential Access, Discovery | MITRE ATT&CK |
T1048.001_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
T1069.001_Windows | Permission Groups Discovery: Local Groups | Windows | Discovery | MITRE ATT&CK |
T1195.002_Windows | Supply Chain Compromise: Compromise Software Supply Chain | Windows | Initial Access | MITRE ATT&CK |
T1212_Windows | Exploitation for Credential Access (Windows) | Windows | Credential Access | MITRE ATT&CK |
T1518.001_Windows | Software Discovery: Security Software Discovery | Windows | Discovery | MITRE ATT&CK |
T1003.001 | LSASS Memory | | Credential Access | MITRE ATT&CK |
T1003.002 | Security Account Manager | | Credential Access | MITRE ATT&CK |
T1007 | System Service Discovery | | Discovery | MITRE ATT&CK |
T1021.001 | Remote Desktop Protocol | | Lateral Movement | MITRE ATT&CK |