| T1595.001 | Scanning IP Blocks |  | Reconnaissance | MITRE ATT&CK | 
| T1595.001_PRE | Active Scanning: Scanning IP Blocks | PRE | Reconnaissance | MITRE ATT&CK | 
| T1592.002_PRE | Gather Victim Host Information: Software | PRE | Reconnaissance | MITRE ATT&CK | 
| T1592.002 | Software |  | Reconnaissance | MITRE ATT&CK | 
| T1133_AWS | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK | 
| T1133_Windows | External Remote Services (Windows) | Windows | Persistence, Initial Access | MITRE ATT&CK | 
| T1133_Azure | External Remote Services | Windows | Initial Access, Persistence | MITRE ATT&CK | 
| T1133 | External Remote Services |  | Persistence, Initial Access | MITRE ATT&CK | 
| T1190 | Exploit Public-Facing Application |  | Initial Access, Persistence | MITRE ATT&CK | 
| T1012_Windows | Query Registry | Windows | Discovery | MITRE ATT&CK | 
| T1048.003_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK | 
| T1059.003_Windows | Command and Scripting Interpreter: Windows Command Shell | Windows | Execution | MITRE ATT&CK | 
| T1078.003_Windows | Valid Accounts: Local Accounts | Windows | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK | 
| T1203_Windows | Exploitation for Client Execution (Windows) | Windows | Execution | MITRE ATT&CK | 
| T1495_Windows | Firmware Corruption | Windows | Impact | MITRE ATT&CK | 
| T1574.011_Windows | Hijack Execution Flow: Services Registry Permissions Weakness | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK | 
| T1021.002 | SMB/Windows Admin Shares |  | Lateral Movement | MITRE ATT&CK | 
| T1048.001 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol |  | Exfiltration | MITRE ATT&CK | 
| T1135 | Network Share Discovery |  | Discovery | MITRE ATT&CK | 
| T1195.002 | Compromise Software Supply Chain |  | Initial Access | MITRE ATT&CK | 
| T1210 | Exploitation of Remote Services |  | Lateral Movement | MITRE ATT&CK | 
| T1574.011 | Services Registry Permissions Weakness |  | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK | 
| T1606.002 | SAML Tokens |  | Credential Access | MITRE ATT&CK | 
| 1078.001 | Valid Accounts: Default Accounts | Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK | 
| T1021.001_Windows | Remote Services: Remote Desktop Protocol | Windows | Lateral Movement | MITRE ATT&CK | 
| T1021.006_Windows | Remote Services: Windows Remote Management | Windows | Lateral Movement | MITRE ATT&CK | 
| T1059.004_Linux | Command and Scripting Interpreter: Unix Shell | Linux | Execution | MITRE ATT&CK | 
| T1068_Windows | Exploitation for Privilege Escalation (Windows) | Windows | Privilege Escalation | MITRE ATT&CK | 
| T1552.005_AWS | Cloud Instance Metadata API | AWS | Credential Access | MITRE ATT&CK | 
| T1555.004_Windows | Credentials from Password Stores: Windows Credential Manager | Windows | Credential Access | MITRE ATT&CK | 
| T1574.007_Windows | Path Interception by PATH Environment Variable | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK | 
| T0873_ICS | Project File Infection | OT | Persistence | MITRE ATT&CK | 
| T1003.008 | /etc/passwd and /etc/shadow |  | Credential Access | MITRE ATT&CK | 
| T1059.001 | Powershell |  | Execution | MITRE ATT&CK | 
| T1499.004 | Application or System Exploitation |  | Impact | MITRE ATT&CK | 
| T1555.004 | Windows Credential Manager |  | Credential Access | MITRE ATT&CK | 
| T1550.001 | Application Access Token |  | Lateral Movement, Defense Evasion | MITRE ATT&CK | 
| T0814_ICS | Denial of Service | OT | Inhibit Response Function | MITRE ATT&CK | 
| T0891_ICS | Hardcoded Credentials | OT | Lateral Movement, Persistence | MITRE ATT&CK | 
| T1078.002_Windows | Valid Accounts: Domain Accounts | Windows | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK | 
| T0812 | Default Credentials |  | Lateral Movement | MITRE ATT&CK | 
| T1069.002 | Domain Groups |  | Discovery | MITRE ATT&CK | 
| T1190_Aws | Exploit Public-Facing Application (Aws) | Aws | Initial Access, Persistence | MITRE ATT&CK | 
| T0866 | Exploitation of Remote Services |  | Initial Access, Lateral Movement | MITRE ATT&CK | 
| T1003.003 | NTDS |  | Credential Access | MITRE ATT&CK | 
| T1003.001_Windows | OS Credential Dumping: LSASS Memory | Windows | Credential Access | MITRE ATT&CK | 
| T1003.002_Windows | OS Credential Dumping: Security Account Manager | Windows | Credential Access | MITRE ATT&CK | 
| T1021.002_Windows | Remote Services: SMB/Windows Admin Shares | Windows | Lateral Movement | MITRE ATT&CK | 
| T1047_Windows | Windows Management Instrumentation | Windows | Execution | MITRE ATT&CK | 
| T1048.002_Windows | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (Windows) | Windows | Exfiltration | MITRE ATT&CK |