| T1110.003 | Password Spraying | | Credential Access | MITRE ATT&CK |
| T1110.003_Windows | Brute Force: Password Spraying (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1110.004 | Credential Stuffing | | Credential Access | MITRE ATT&CK |
| T1134.005_Windows | Access Token Manipulation: SID-History Injection | Windows | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1195.002 | Compromise Software Supply Chain | | Initial Access | MITRE ATT&CK |
| T1195.002_Windows | Supply Chain Compromise: Compromise Software Supply Chain | Windows | Initial Access | MITRE ATT&CK |
| T1207_Windows | Rogue Domain Controller | Windows | Defense Evasion | MITRE ATT&CK |
| T1555.004 | Windows Credential Manager | | Credential Access | MITRE ATT&CK |
| T1555.004_Windows | Credentials from Password Stores: Windows Credential Manager | Windows | Credential Access | MITRE ATT&CK |
| T1555.006 | Cloud Secrets Management Stores | | Credential Access | MITRE ATT&CK |
| T1558.001_Windows | Steal or Forge Kerberos Tickets: Golden Ticket | Windows | Credential Access | MITRE ATT&CK |
| T1565.003 | Runtime Data Manipulation | | Impact | MITRE ATT&CK |
| T1574.007 | Path Interception by PATH Environment Variable | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1606.002_Azure | Forge Web Credentials:SAML Tokens(Azure) | Entra ID | Credential Access | MITRE ATT&CK |
| T1615_Windows | Group Policy Discovery | Windows | Discovery | MITRE ATT&CK |
| T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
| T1048.003 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
| T1550.001 | Application Access Token | | Lateral Movement, Defense Evasion | MITRE ATT&CK |
| T1526 | Cloud Service Discovery | | Discovery | MITRE ATT&CK |
| T0812_ICS | Default Credentials | OT | Lateral Movement | MITRE ATT&CK |
| T0820_ICS | Exploitation for Evasion | OT | Evasion | MITRE ATT&CK |
| T0891_ICS | Hardcoded Credentials | OT | Lateral Movement, Persistence | MITRE ATT&CK |
| T1003.003_Windows | OS Credential Dumping: NTDS | Windows | Credential Access | MITRE ATT&CK |
| T1078.002 | Domain Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.002_Windows | Valid Accounts: Domain Accounts | Windows | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1082 | System Information Discovery | | Discovery | MITRE ATT&CK |
| T1098.001_Azure | Account Manipulation: Additional Cloud Credentials | Entra ID | Persistence | MITRE ATT&CK |
| T1484.002 | Trust Modification | | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1528_AWS | Steal Application Access Token (AWS) | AWS | Collection | MITRE ATT&CK |
| T1548.005 | Temporary Elevated Cloud Access | | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
| T1059.009 | Cloud API | | Execution | MITRE ATT&CK |
| T1592.002 | Software | | Reconnaissance | MITRE ATT&CK |
| T1595.001 | Scanning IP Blocks | | Reconnaissance | MITRE ATT&CK |
| T1133_Windows | External Remote Services (Windows) | Windows | Persistence, Initial Access | MITRE ATT&CK |
| T1003.001 | LSASS Memory | | Credential Access | MITRE ATT&CK |
| T1003.002_Windows | OS Credential Dumping: Security Account Manager | Windows | Credential Access | MITRE ATT&CK |
| T1003.006 | DCSync | | Credential Access | MITRE ATT&CK |
| T1012_Windows | Query Registry | Windows | Discovery | MITRE ATT&CK |
| T1021.001 | Remote Desktop Protocol | | Lateral Movement | MITRE ATT&CK |
| T1021.007 | Cloud Services | | Lateral Movement | MITRE ATT&CK |
| T1040_Windows | Network Sniffing (Windows) | Windows | Credential Access, Discovery | MITRE ATT&CK |
| T1047_Windows | Windows Management Instrumentation | Windows | Execution | MITRE ATT&CK |
| T1053.005_Windows | Scheduled Task/Job: Scheduled Task | Windows | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
| T1059.004 | Unix Shell | | Execution | MITRE ATT&CK |
| T1059.005 | Windows Command Shell | | Execution | MITRE ATT&CK |
| T1068 | Exploitation for Privilege Escalation | | Privilege Escalation | MITRE ATT&CK |
| T1069.001 | Local Groups | | Discovery | MITRE ATT&CK |
| T1083 | File and Directory Discovery | | Discovery | MITRE ATT&CK |
| T1110.004_Windows | Brute Force: Credential Stuffing (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1114.002 | Remote Email Collection | | Collection | MITRE ATT&CK |