| T1003.008_Windows | OS Credential Dumping: /etc/passwd and /etc/shadow | Linux | Credential Access | MITRE ATT&CK |
| T1007 | System Service Discovery | | Discovery | MITRE ATT&CK |
| T1007_Windows | System Service Discovery (Windows) | Windows | Discovery | MITRE ATT&CK |
| T1021.002 | SMB/Windows Admin Shares | | Lateral Movement | MITRE ATT&CK |
| T1021.002_Windows | Remote Services: SMB/Windows Admin Shares | Windows | Lateral Movement | MITRE ATT&CK |
| T1021.006 | Windows Remote Management | | Lateral Movement | MITRE ATT&CK |
| T1021.007_Azure | Remote Services: Cloud Services | Azure | Lateral Movement | MITRE ATT&CK |
| T1047 | Windows Management Instrumentation | | Execution | MITRE ATT&CK |
| T1059.003 | Windows Command Shell | | Execution | MITRE ATT&CK |
| T1059.004_Linux | Command and Scripting Interpreter: Unix Shell | Linux | Execution | MITRE ATT&CK |
| T1059.006 | Python | | Execution | MITRE ATT&CK |
| T1069.001_Windows | Permission Groups Discovery: Local Groups | Windows | Discovery | MITRE ATT&CK |
| T1069.003_AWS | Permission Groups Discovery: Cloud Groups (AWS) | AWS | Discovery | MITRE ATT&CK |
| T1072 | Software Deployment Tools | | Execution, Lateral Movement | MITRE ATT&CK |
| T1110.001 | Password Guessing | | Credential Access | MITRE ATT&CK |
| T1135 | Network Share Discovery | | Discovery | MITRE ATT&CK |
| T1135_Windows | Network Share Discovery (Windows) | Windows | Discovery | MITRE ATT&CK |
| T1219_Windows | Remote Access Software | Windows | Command and Control | MITRE ATT&CK |
| T1547.002_Windows | Boot or Logon Autostart Execution: Authentication Package | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1548.005_Azure | Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access | Entra ID | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1552.002 | Credentials in Registry | | Credential Access | MITRE ATT&CK |
| T1552.005_AWS | Cloud Instance Metadata API | AWS | Credential Access | MITRE ATT&CK |
| T1574.011_Windows | Hijack Execution Flow: Services Registry Permissions Weakness | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1212 | Exploitation for Credential Access | | Credential Access | MITRE ATT&CK |
| T0820 | Exploitation for Evasion | | Evasion | MITRE ATT&CK |
| T0843 | Program Download | | Lateral Movement | MITRE ATT&CK |
| T0845_ICS | Program Upload | OT | Collection | MITRE ATT&CK |
| T1078.004 | Cloud Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.004_Azure | Valid Accounts: Cloud Accounts | Entra ID | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1190_Aws | Exploit Public-Facing Application (Aws) | Aws | Initial Access, Persistence | MITRE ATT&CK |
| T0866 | Exploitation of Remote Services | | Initial Access, Lateral Movement | MITRE ATT&CK |
| T1595.001_PRE | Active Scanning: Scanning IP Blocks | PRE | Reconnaissance | MITRE ATT&CK |
| T0846_ICS | Remote System Discovery | OT | Discovery | MITRE ATT&CK |
| T1003.001_Windows | OS Credential Dumping: LSASS Memory | Windows | Credential Access | MITRE ATT&CK |
| T1003.002 | Security Account Manager | | Credential Access | MITRE ATT&CK |
| T1003.004_Windows | OS Credential Dumping: LSA Secrets | Windows | Credential Access | MITRE ATT&CK |
| T1003.008 | /etc/passwd and /etc/shadow | | Credential Access | MITRE ATT&CK |
| T1021.001_Windows | Remote Services: Remote Desktop Protocol | Windows | Lateral Movement | MITRE ATT&CK |
| T1021.003 | Distributed Component Object Model | | Lateral Movement | MITRE ATT&CK |
| T1021.006_Windows | Remote Services: Windows Remote Management | Windows | Lateral Movement | MITRE ATT&CK |
| T1037.003_Windows | Boot or Logon Initialization Scripts: Network Logon Script (Windows) | Windows | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1053.005 | Scheduled Task | | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
| T1059.001_Windows | Command and Scripting Interpreter: PowerShell (Windows) | Windows | Execution | MITRE ATT&CK |
| T1059.003_Windows | Command and Scripting Interpreter: Windows Command Shell | Windows | Execution | MITRE ATT&CK |
| T1059.006_Windows | Command and Scripting Interpreter: Python (Windows) | Windows | Execution | MITRE ATT&CK |
| T1068_Windows | Exploitation for Privilege Escalation (Windows) | Windows | Privilege Escalation | MITRE ATT&CK |
| T1078.001 | Default Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.003_Windows | Valid Accounts: Local Accounts | Windows | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1087.004_Azure | Account Discovery:Cloud Account(Azure) | Entra ID | Discovery | MITRE ATT&CK |
| T1110.001_Windows | Brute Force: Password Guessing (Windows) | Windows | Credential Access | MITRE ATT&CK |