| T1592.002_PRE | Gather Victim Host Information: Software | PRE | Reconnaissance | MITRE ATT&CK |
| T1133_Windows | External Remote Services (Windows) | Windows | Persistence, Initial Access | MITRE ATT&CK |
| T1592.002 | Software | | Reconnaissance | MITRE ATT&CK |
| T1595.001 | Scanning IP Blocks | | Reconnaissance | MITRE ATT&CK |
| T1595.001_PRE | Active Scanning: Scanning IP Blocks | PRE | Reconnaissance | MITRE ATT&CK |
| T1133_AWS | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK |
| T1133_Azure | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK |
| T1133 | External Remote Services | | Persistence, Initial Access | MITRE ATT&CK |
| T1190 | Exploit Public-Facing Application | | Initial Access, Persistence | MITRE ATT&CK |
| 1078.001 | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T0873_ICS | Project File Infection | OT | Persistence | MITRE ATT&CK |
| T1040 | Network Sniffing | | Credential Access, Discovery | MITRE ATT&CK |
| T1048.002_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
| T1048.003_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
| T1059.005_Windows | Command and Scripting Interpreter: Visual Basic | Windows | Execution | MITRE ATT&CK |
| T1203 | Exploitation for Client Execution | | Execution | MITRE ATT&CK |
| T1210_Windows | Exploitation of Remote Services (Windows) | Windows | Lateral Movement | MITRE ATT&CK |
| T1547.005 | Security Support Provider | | Persistence, Privilege Escalation | MITRE ATT&CK |
| T1552.005 | Cloud Instance Metadata API | | Credential Access | MITRE ATT&CK |
| T1606.002 | SAML Tokens | | Credential Access | MITRE ATT&CK |
| T1012 | Query Registry | | Discovery | MITRE ATT&CK |
| T1048.001_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |
| T1059.001 | Powershell | | Execution | MITRE ATT&CK |
| T1078.001_ICS | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1078.003 | Local Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
| T1212_Windows | Exploitation for Credential Access (Windows) | Windows | Credential Access | MITRE ATT&CK |
| T1218.007 | Msiexec | | Defense Evasion | MITRE ATT&CK |
| T1218.007_Windows | System Binary Proxy Execution: Msiexec | Windows | Defense Evasion | MITRE ATT&CK |
| T1495 | Firmware Corruption | | Impact | MITRE ATT&CK |
| T1574.007_Windows | Path Interception by PATH Environment Variable | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1048.001 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | | Exfiltration | MITRE ATT&CK |
| T0814_ICS | Denial of Service | OT | Inhibit Response Function | MITRE ATT&CK |
| T1069.002 | Domain Groups | | Discovery | MITRE ATT&CK |
| T1574.010 | Services File Permissions Weakness | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
| T1003.001 | LSASS Memory | | Credential Access | MITRE ATT&CK |
| T1003.002_Windows | OS Credential Dumping: Security Account Manager | Windows | Credential Access | MITRE ATT&CK |
| T1012_Windows | Query Registry | Windows | Discovery | MITRE ATT&CK |
| T1021.001 | Remote Desktop Protocol | | Lateral Movement | MITRE ATT&CK |
| T1040_Windows | Network Sniffing (Windows) | Windows | Credential Access, Discovery | MITRE ATT&CK |
| T1047_Windows | Windows Management Instrumentation | Windows | Execution | MITRE ATT&CK |
| T1053.005_Windows | Scheduled Task/Job: Scheduled Task | Windows | Execution, Persistence, Privilege Escalation | MITRE ATT&CK |
| T1059.004 | Unix Shell | | Execution | MITRE ATT&CK |
| T1059.005 | Windows Command Shell | | Execution | MITRE ATT&CK |
| T1068 | Exploitation for Privilege Escalation | | Privilege Escalation | MITRE ATT&CK |
| T1069.001 | Local Groups | | Discovery | MITRE ATT&CK |
| T1203_Windows | Exploitation for Client Execution (Windows) | Windows | Execution | MITRE ATT&CK |
| T1211 | Exploitation for Defense Evasion | | Defense Evasion | MITRE ATT&CK |
| T1211_Windows | Exploitation for Defense Evasion (Windows) | Windows | Defense Evasion | MITRE ATT&CK |
| T1219 | Remote Access Software | | Command and Control | MITRE ATT&CK |
| T1495_Windows | Firmware Corruption | Windows | Impact | MITRE ATT&CK |