T1021.006 | Windows Remote Management | | Lateral Movement | MITRE ATT&CK |
T1053.005 | Scheduled Task | | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
T1059.004 | Unix Shell | | Execution | MITRE ATT&CK |
T1059.006 | Python | | Execution | MITRE ATT&CK |
T1069.001 | Local Groups | | Discovery | MITRE ATT&CK |
T1203 | Exploitation for Client Execution | | Execution | MITRE ATT&CK |
T1518.001 | Security Software Discovery | | Discovery | MITRE ATT&CK |
T1547.002 | Authentication Package | | Persistence, Privilege Escalation | MITRE ATT&CK |
T1552.005 | Cloud Instance Metadata API | | Credential Access | MITRE ATT&CK |
T0820 | Exploitation for Evasion | | Evasion | MITRE ATT&CK |
T0820_ICS | Exploitation for Evasion | OT | Evasion | MITRE ATT&CK |
T0845_ICS | Program Upload | OT | Collection | MITRE ATT&CK |
T0814 | Denial of Service | | Inhibit Response Function | MITRE ATT&CK |
T0891 | Hardcoded Credentials | | Lateral Movement, Persistence | MITRE ATT&CK |
T0812_ICS | Default Credentials | OT | Lateral Movement | MITRE ATT&CK |
T0843_ICS | Program Download | OT | Lateral Movement | MITRE ATT&CK |
T0866_ICS | Exploitation of Remote Services | OT | Initial Access, Lateral Movement | MITRE ATT&CK |
T1550.001_Windows | Material: Application Access Token | Windows | Lateral Movement, Defense Evasion | MITRE ATT&CK |
T1528_AWS | Steal Application Access Token (AWS) | AWS | Collection | MITRE ATT&CK |
T0843 | Program Download | | Lateral Movement | MITRE ATT&CK |
T1082 | System Information Discovery | | Discovery | MITRE ATT&CK |
T1133_Azure | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK |
T1190 | Exploit Public-Facing Application | | Initial Access, Persistence | MITRE ATT&CK |
T1592.002_PRE | Gather Victim Host Information: Software | PRE | Reconnaissance | MITRE ATT&CK |
T1592.002 | Software | | Reconnaissance | MITRE ATT&CK |
T1595.001_PRE | Active Scanning: Scanning IP Blocks | PRE | Reconnaissance | MITRE ATT&CK |
T1595.001 | Scanning IP Blocks | | Reconnaissance | MITRE ATT&CK |
T1087.004_AWS | Account Discovery: Cloud Account (AWS) | AWS | Discovery | MITRE ATT&CK |
T1204.002_AWS | User Execution: Malicious File (AWS) | AWS | Execution | MITRE ATT&CK |
T1648_AWS | Serverless Execution | AWS | Execution | MITRE ATT&CK |
T0846 | Remote System Discovery | | Discovery | MITRE ATT&CK |
T1021.007 | Cloud Services | | Lateral Movement | MITRE ATT&CK |
T1098.004 | SSH Authorized Keys | | Privilege Escalation, Persistence | MITRE ATT&CK |
T1069.003_AWS | Permission Groups Discovery: Cloud Groups (AWS) | AWS | Discovery | MITRE ATT&CK |
T1580_AWS | Cloud Infrastructure Discovery(AWS) | AWS | Discovery | MITRE ATT&CK |
T1021.007_Azure | Remote Services: Cloud Services | Azure | Lateral Movement | MITRE ATT&CK |
T1580 | Cloud Infrastructure Discovery | | Discovery | MITRE ATT&CK |
WAS.112684 | Client Side Template Injection | Web Application | Injection | OWASP |
WAS.113634 | Server-Side Inclusion Injection | | Injection | OWASP |
WAS.98117 | Blind SQL Injection (differential analysis) | | Injection | OWASP |
WAS.98118 | Blind SQL Injection (timing attack) | | Injection | OWASP |
WAS.98127 | LDAP Injection | | Injection | OWASP |
T1537_AWS | Transfer Data to Cloud Account | AWS | Exfiltration | MITRE ATT&CK |
T1619_AWS | Cloud Storage Object Discovery(AWS) | AWS | Discovery | MITRE ATT&CK |
T1528 | Steal Application Access Token | | Collection | MITRE ATT&CK |
T1619 | Cloud Storage Object Discovery | | Discovery | MITRE ATT&CK |
T0846_ICS | Remote System Discovery | OT | Discovery | MITRE ATT&CK |
T1530_AWS | Data from Cloud Storage Object (AWS) | AWS | Collection | MITRE ATT&CK |
T1098.001 | Additional Cloud Credentials | | Persistence | MITRE ATT&CK |
T1530 | Data from Cloud Storage | | Collection | MITRE ATT&CK |