Files
2025-11-01 01:45:20 +00:00

336 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2defense-evasionT1055.011Process Injection: Extra Window Memory Injection1Process Injection via Extra Window Memory (EWM) x64 executable93ca40d2-336c-446d-bcef-87f14d438018powershell
3defense-evasionT1218.011Signed Binary Proxy Execution: Rundll321Rundll32 execute JavaScript Remote Payload With GetObject57ba4ce9-ee7a-4f27-9928-3c70c489b59dcommand_prompt
4defense-evasionT1218.011Signed Binary Proxy Execution: Rundll322Rundll32 execute VBscript command638730e7-7aed-43dc-bf8c-8117f805f5bbcommand_prompt
5defense-evasionT1218.011Signed Binary Proxy Execution: Rundll323Rundll32 execute VBscript command using Ordinal number32d1cf1b-cbc2-4c09-8d05-07ec5c83a821command_prompt
6defense-evasionT1218.011Signed Binary Proxy Execution: Rundll324Rundll32 advpack.dll Executiond91cae26-7fc1-457b-a854-34c8aad48c89command_prompt
7defense-evasionT1218.011Signed Binary Proxy Execution: Rundll325Rundll32 ieadvpack.dll Execution5e46a58e-cbf6-45ef-a289-ed7754603df9command_prompt
8defense-evasionT1218.011Signed Binary Proxy Execution: Rundll326Rundll32 syssetup.dll Execution41fa324a-3946-401e-bbdd-d7991c628125command_prompt
9defense-evasionT1218.011Signed Binary Proxy Execution: Rundll327Rundll32 setupapi.dll Execution71d771cd-d6b3-4f34-bc76-a63d47a10b19command_prompt
10defense-evasionT1218.011Signed Binary Proxy Execution: Rundll328Execution of HTA and VBS Files using Rundll32 and URL.dll22cfde89-befe-4e15-9753-47306b37a6e3command_prompt
11defense-evasionT1218.011Signed Binary Proxy Execution: Rundll329Launches an executable using Rundll32 and pcwutl.dll9f5d081a-ee5a-42f9-a04e-b7bdc487e676command_prompt
12defense-evasionT1218.011Signed Binary Proxy Execution: Rundll3210Execution of non-dll using rundll32.exeae3a8605-b26e-457c-b6b3-2702fd335bacpowershell
13defense-evasionT1218.011Signed Binary Proxy Execution: Rundll3211Rundll32 with Ordinal Value9fd5a74b-ba89-482a-8a3e-a5feaa3697b0command_prompt
14defense-evasionT1218.011Signed Binary Proxy Execution: Rundll3212Rundll32 with Control_RunDLLe4c04b6f-c492-4782-82c7-3bf75eb8077ecommand_prompt
15defense-evasionT1218.011Signed Binary Proxy Execution: Rundll3213Rundll32 with desk.cpl83a95136-a496-423c-81d3-1c6750133917command_prompt
16defense-evasionT1218.011Signed Binary Proxy Execution: Rundll3214Running DLL with .init extension and function2d5029f0-ae20-446f-8811-e7511b58e8b6command_prompt
17defense-evasionT1218.011Signed Binary Proxy Execution: Rundll3215Rundll32 execute command via FileProtocolHandlerf3ad3c5b-1db1-45c1-81bf-d3370ebab6c8command_prompt
18defense-evasionT1218.011Signed Binary Proxy Execution: Rundll3216Rundll32 execute payload by calling RouteTheCall8a7f56ee-10e7-444c-a139-0109438288ebpowershell
19defense-evasionT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
20defense-evasionT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM rule (freebsd)b17eacac-282d-4ca8-a240-46602cf863e3sh
21defense-evasionT1556.003Modify Authentication Process: Pluggable Authentication Modules3Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
22defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification1chmod - Change file or folder mode (numeric mode)34ca1464-de9d-40c6-8c77-690adf36a135sh
23defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification2chmod - Change file or folder mode (symbolic mode)fc9d6695-d022-4a80-91b1-381f5c35aff3sh
24defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification3chmod - Change file or folder mode (numeric mode) recursivelyea79f937-4a4d-4348-ace6-9916aec453a4sh
25defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification4chmod - Change file or folder mode (symbolic mode) recursively0451125c-b5f6-488f-993b-5a32b09f7d8fbash
26defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification5chown - Change file or folder ownership and groupd169e71b-85f9-44ec-8343-27093ff3dfc0bash
27defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification6chown - Change file or folder ownership and group recursivelyb78598be-ff39-448f-a463-adbf2a5b7848bash
28defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification7chown - Change file or folder mode ownership only967ba79d-f184-4e0e-8d09-6362b3162e99sh
29defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification8chown - Change file or folder ownership recursively3b015515-b3d8-44e9-b8cd-6fa84faf30b2bash
30defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification9chattr - Remove immutable file attributee7469fe2-ad41-4382-8965-99b94dd3c13fsh
31defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification10chflags - Remove immutable file attribute60eee3ea-2ebd-453b-a666-c52ce08d2709sh
32defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification11Chmod through c script973631cf-6680-4ffa-a053-045e1b6b67absh
33defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification12Chmod through c script (freebsd)da40b5fe-3098-4b3b-a410-ff177e49ee2esh
34defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification13Chown through c script18592ba1-5f88-4e3c-abc8-ab1c6042e389sh
35defense-evasionT1222.002File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification14Chown through c script (freebsd)eb577a19-b730-4918-9b03-c5edcf51dc4esh
36defense-evasionT1216.001Signed Script Proxy Execution: Pubprn1PubPrn.vbs Signed Script Bypass9dd29a1f-1e16-4862-be83-913b10a88f6ccommand_prompt
37defense-evasionT1006Direct Volume Access1Read volume boot sector via DOS device path (PowerShell)88f6327e-51ec-4bbf-b2e8-3fea534eab8bpowershell
38defense-evasionT1564.008Hide Artifacts: Email Hiding Rules1New-Inbox Rule to Hide E-mail in M36530f7d3d1-78e2-4bf0-9efa-a175b5fce2a9powershell
39defense-evasionT1027.013Obfuscated Files or Information: Encrypted/Encoded File1Decode Eicar File and Write to File7693ccaa-8d64-4043-92a5-a2eb70359535powershell
40defense-evasionT1027.013Obfuscated Files or Information: Encrypted/Encoded File2Decrypt Eicar File and Write to Fileb404caaa-12ce-43c7-9214-62a531c044f7powershell
41defense-evasionT1014Rootkit1Loadable Kernel Module based Rootkitdfb50072-e45a-4c75-a17e-a484809c8553sh
42defense-evasionT1014Rootkit2Loadable Kernel Module based Rootkit75483ef8-f10f-444a-bf02-62eb0e48db6fsh
43defense-evasionT1014Rootkit3dynamic-linker based rootkit (libprocesshider)1338bf0c-fd0c-48c0-9e65-329f18e2c0d3sh
44defense-evasionT1014Rootkit4Loadable Kernel Module based Rootkit (Diamorphine)0b996469-48c6-46e2-8155-a17f8b6c2247sh
45defense-evasionT1036.007Masquerading: Double File Extension1File Extension Masqueradingc7fa0c3b-b57f-4cba-9118-863bf4e653fccommand_prompt
46defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control1Bypass UAC using Event Viewer (cmd)5073adf8-9a50-4bd9-b298-a9bd2ead8af9command_prompt
47defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control2Bypass UAC using Event Viewer (PowerShell)a6ce9acf-842a-4af6-8f79-539be7608e2bpowershell
48defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control3Bypass UAC using Fodhelper58f641ea-12e3-499a-b684-44dee46bd182command_prompt
49defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control4Bypass UAC using Fodhelper - PowerShell3f627297-6c38-4e7d-a278-fc2563eaaeaapowershell
50defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control5Bypass UAC using ComputerDefaults (PowerShell)3c51abf2-44bf-42d8-9111-dc96ff66750fpowershell
51defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control6Bypass UAC by Mocking Trusted Directoriesf7a35090-6f7f-4f64-bb47-d657bf5b10c1command_prompt
52defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control7Bypass UAC using sdclt DelegateExecute3be891eb-4608-4173-87e8-78b494c029b7powershell
53defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control8Disable UAC using reg.exe9e8af564-53ec-407e-aaa8-3cb20c3af7f9command_prompt
54defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control9Bypass UAC using SilentCleanup task28104f8a-4ff1-4582-bcf6-699dce156608command_prompt
55defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control10UACME Bypass Method 238ceab7a2-563a-47d2-b5ba-0995211128d7command_prompt
56defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control11UACME Bypass Method 31b0f76240-9f33-4d34-90e8-3a7d501beb15command_prompt
57defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control12UACME Bypass Method 33e514bb03-f71c-4b22-9092-9f961ec6fb03command_prompt
58defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control13UACME Bypass Method 34695b2dac-423e-448e-b6ef-5b88e93011d6command_prompt
59defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control14UACME Bypass Method 3956163687-081f-47da-bb9c-7b231c5585cfcommand_prompt
60defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control15UACME Bypass Method 56235ec031-cd2d-465d-a7ae-68bab281e80ecommand_prompt
61defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control16UACME Bypass Method 59dfb1b667-4bb8-4a63-a85e-29936ea75f29command_prompt
62defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control17UACME Bypass Method 617825b576-744c-4555-856d-caf3460dc236command_prompt
63defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control18WinPwn - UAC Magic964d8bf8-37bc-4fd3-ba36-ad13761ebbccpowershell
64defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control19WinPwn - UAC Bypass ccmstp techniquef3c145f9-3c8d-422c-bd99-296a17a8f567powershell
65defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control20WinPwn - UAC Bypass DiskCleanup technique1ed67900-66cd-4b09-b546-2a0ef4431a0cpowershell
66defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control21WinPwn - UAC Bypass DccwBypassUAC technique2b61977b-ae2d-4ae4-89cb-5c36c89586bepowershell
67defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control22Disable UAC admin consent prompt via ConsentPromptBehaviorAdmin registry key251c5936-569f-42f4-9ac2-87a173b9e9b8powershell
68defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control23UAC Bypass with WSReset Registry Modification3b96673f-9c92-40f1-8a3e-ca060846f8d9powershell
69defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control24Disable UAC - Switch to the secure desktop when prompting for elevation via registry key85f3a526-4cfa-4fe7-98c1-dea99be025c7powershell
70defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control25Disable UAC notification via registry keys160a7c77-b00e-4111-9e45-7c2a44eda3fdcommand_prompt
71defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control26Disable ConsentPromptBehaviorAdmin via registry keysa768aaa2-2442-475c-8990-69cf33af0f4ecommand_prompt
72defense-evasionT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control27UAC bypassed by Utilizing ProgIDs registry.b6f4645c-34ea-4c7c-98f2-d5a2747efb08command_prompt
73defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
74defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching2Sudo usage (freebsd)2bf9a018-4664-438a-b435-cc6f8c6f71b1sh
75defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching3Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
76defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching4Unlimited sudo cache timeout (freebsd)a83ad6e8-6f24-4d7f-8f44-75f8ab742991sh
77defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching5Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
78defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching6Disable tty_tickets for sudo caching (freebsd)4df6a0fe-2bdd-4be8-8618-a6a19654a57ash
79defense-evasionT1542.001Pre-OS Boot: System Firmware1UEFI Persistence via Wpbbin.exe File Creationb8a49f03-e3c4-40f2-b7bb-9e8f8fdddbf1powershell
80defense-evasionT1574.011Hijack Execution Flow: Services Registry Permissions Weakness1Service Registry Permissions Weaknessf7536d63-7fd4-466f-89da-7e48d550752apowershell
81defense-evasionT1574.011Hijack Execution Flow: Services Registry Permissions Weakness2Service ImagePath Change with reg.exef38e9eea-e1d7-4ba6-b716-584791963827command_prompt
82defense-evasionT1036.005Masquerading: Match Legitimate Name or Location1Execute a process from a directory masquerading as the current parent directory812c3ab8-94b0-4698-a9bf-9420af23ce24sh
83defense-evasionT1036.005Masquerading: Match Legitimate Name or Location2Masquerade as a built-in system executable35eb8d16-9820-4423-a2a1-90c4f5edd9capowershell
84defense-evasionT1036.005Masquerading: Match Legitimate Name or Location3Masquerading cmd.exe as VEDetector.exe03ae82a6-9fa0-465b-91df-124d8ca5c4e8powershell
85defense-evasionT1564Hide Artifacts1Extract binary files via VBA6afe288a-8a8b-4d33-a629-8d03ba9dad3apowershell
86defense-evasionT1564Hide Artifacts2Create a Hidden User Called "$"2ec63cc2-4975-41a6-bf09-dffdfb610778command_prompt
87defense-evasionT1564Hide Artifacts3Create an "Administrator " user (with a space on the end)5bb20389-39a5-4e99-9264-aeb92a55a85cpowershell
88defense-evasionT1564Hide Artifacts4Create and Hide a Service with sc.exe333c7de0-6fbe-42aa-ac2b-c7e40b18246acommand_prompt
89defense-evasionT1564Hide Artifacts5Command Execution with NirCmd2748ab4a-1e0b-4cf2-a2b0-8ef765bec7bepowershell
90defense-evasionT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
91defense-evasionT1562.009Impair Defenses: Safe Boot Mode1Safe Mode Boot2a78362e-b79a-4482-8e24-be397bce4d85command_prompt
92defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
93defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks2Detect Virtualization Environment (FreeBSD)e129d73b-3e03-4ae9-bf1e-67fc8921e0fdsh
94defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks3Detect Virtualization Environment (Windows)502a7dc4-9d6f-4d28-abf2-f0e84692562dpowershell
95defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks4Detect Virtualization Environment via iorega960185f-aef6-4547-8350-d1ce16680d09sh
96defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks5Detect Virtualization Environment via WMI Manufacturer/Model Listing (Windows)4a41089a-48e0-47aa-82cb-5b81a463bc78powershell
97defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks6Detect Virtualization Environment using sysctl (hw.model)6beae646-eb4c-4730-95be-691a4094408csh
98defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks7Check if System Integrity Protection is enabled2b73cd9b-b2fb-4357-b9d7-c73c41d9e945sh
99defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks8Detect Virtualization Environment using system_profilere04d2e89-de15-4d90-92f9-a335c7337f0fsh
100defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs1rm -rf989cc1b1-3642-4260-a809-54f9dd559683sh
101defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs2rm -rfbd8ccc45-d632-481e-b7cf-c467627d68f9sh
102defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs3Delete log files using built-in log utility653d39cd-bae7-499a-898c-9fb96b8b5cd1sh
103defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs4Truncate system log files via truncate utility6290f8a8-8ee9-4661-b9cf-390031bf6973sh
104defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs5Truncate system log files via truncate utility (freebsd)14033063-ee04-4eaf-8f5d-ba07ca7a097csh
105defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs6Delete log files via cat utility by appending /dev/null or /dev/zeroc23bdb88-928d-493e-b46d-df2906a50941sh
106defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs7Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd)369878c6-fb04-48d6-8fc2-da9d97b3e054sh
107defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs8System log file deletion via find utilitybc8eeb4a-cc3e-45ec-aa6e-41e973da2558sh
108defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs9Overwrite macOS system log via echo utility0208ea60-98f1-4e8c-8052-930dce8f742csh
109defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs10Overwrite FreeBSD system log via echo utility11cb8ee1-97fb-4960-8587-69b8388ee9d9sh
110defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs11Real-time system log clearance/deletion848e43b3-4c0a-4e4c-b4c9-d1e8cea9651csh
111defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs12Delete system log files via unlink utility03013b4b-01db-437d-909b-1fdaa5010ee8sh
112defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs13Delete system log files via unlink utility (freebsd)45ad4abd-19bd-4c5f-a687-41f3eee8d8c2sh
113defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs14Delete system log files using shred utility86f0e4d5-3ca7-45fb-829d-4eda32b232bbsh
114defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs15Delete system log files using srm utilityb0768a5e-0f32-4e75-ae5b-d036edcf96b6sh
115defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs16Delete system log files using OSAScript810a465f-cd4f-47bc-b43e-d2de3b033eccsh
116defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs17Delete system log files using Applescripte62f8694-cbc7-468f-862c-b10cd07e1757sh
117defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs18Delete system journal logs via rm and journalctl utilitiesca50dd85-81ff-48ca-92e1-61f119cb1dcfsh
118defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs19Overwrite Linux Mail Spool1602ff76-ed7f-4c94-b550-2f727b4782d4bash
119defense-evasionT1070.002Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs20Overwrite Linux Logd304b2dc-90b4-4465-a650-16ddd503f7b5bash
120defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil1CheckIfInstallable method callffd9c807-d402-47d2-879d-f915cf2a3a94powershell
121defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil2InstallHelper method calld43a5bde-ae28-4c55-a850-3f4c80573503powershell
122defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil3InstallUtil class constructor method call9b7a7cfc-dd2e-43f5-a885-c0a3c270dd93powershell
123defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil4InstallUtil Install method call9f9968a6-601a-46ca-b7b7-6d4fe0f98f0bpowershell
124defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil5InstallUtil Uninstall method call - /U variant34428cfa-8e38-41e5-aff4-9e1f8f3a7b4bpowershell
125defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil6InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant06d9deba-f732-48a8-af8e-bdd6e4d98c1dpowershell
126defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil7InstallUtil HelpText method call5a683850-1145-4326-a0e5-e91ced3c6022powershell
127defense-evasionT1218.004Signed Binary Proxy Execution: InstallUtil8InstallUtil evasive invocation559e6d06-bb42-4307-bff7-3b95a8254badpowershell
128defense-evasionT1574.001Hijack Execution Flow: DLL1DLL Search Order Hijacking - amsi.dll8549ad4b-b5df-4a2d-a3d7-2aee9e7052a3command_prompt
129defense-evasionT1574.001Hijack Execution Flow: DLL2Phantom Dll Hijacking - WinAppXRT.dll46ed938b-c617-429a-88dc-d49b5c9ffedbcommand_prompt
130defense-evasionT1574.001Hijack Execution Flow: DLL3Phantom Dll Hijacking - ualapi.dll5898902d-c5ad-479a-8545-6f5ab3cfc87fcommand_prompt
131defense-evasionT1574.001Hijack Execution Flow: DLL4DLL Side-Loading using the Notepad++ GUP.exe binary65526037-7079-44a9-bda1-2cb624838040command_prompt
132defense-evasionT1574.001Hijack Execution Flow: DLL5DLL Side-Loading using the dotnet startup hook environment variabled322cdd7-7d60-46e3-9111-648848da7c02command_prompt
133defense-evasionT1574.001Hijack Execution Flow: DLL6DLL Search Order Hijacking,DLL Sideloading Of KeyScramblerIE.DLL Via KeyScrambler.EXEc095ad8e-4469-4d33-be9d-6f6d1fb21585powershell
134defense-evasionT1553.001Subvert Trust Controls: Gatekeeper Bypass1Gatekeeper Bypassfb3d46c6-9480-4803-8d7d-ce676e1f1a9bsh
135defense-evasionT1222.001File and Directory Permissions Modification: Windows File and Directory Permissions Modification1Take ownership using takeown utility98d34bb4-6e75-42ad-9c41-1dae7dc6a001command_prompt
136defense-evasionT1222.001File and Directory Permissions Modification: Windows File and Directory Permissions Modification2cacls - Grant permission to specified user or group recursivelya8206bcc-f282-40a9-a389-05d9c0263485command_prompt
137defense-evasionT1222.001File and Directory Permissions Modification: Windows File and Directory Permissions Modification3attrib - Remove read-only attributebec1e95c-83aa-492e-ab77-60c71bbd21b0command_prompt
138defense-evasionT1222.001File and Directory Permissions Modification: Windows File and Directory Permissions Modification4attrib - hide file32b979da-7b68-42c9-9a99-0e39900fc36ccommand_prompt
139defense-evasionT1222.001File and Directory Permissions Modification: Windows File and Directory Permissions Modification5Grant Full Access to folder for Everyone - Ryuk Ransomware Styleac7e6118-473d-41ec-9ac0-ef4f1d1ed2f6command_prompt
140defense-evasionT1222.001File and Directory Permissions Modification: Windows File and Directory Permissions Modification6SubInAcl Executiona8568b10-9ab9-4140-a523-1c72e0176924command_prompt
141defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec1Msiexec.exe - Execute Local MSI file with embedded JScripta059b6c4-e7d6-4b2e-bcd7-9b2b33191a04command_prompt
142defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec2Msiexec.exe - Execute Local MSI file with embedded VBScript8d73c7b0-c2b1-4ac1-881a-4aa644f76064command_prompt
143defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec3Msiexec.exe - Execute Local MSI file with an embedded DLL628fa796-76c5-44c3-93aa-b9d8214fd568command_prompt
144defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec4Msiexec.exe - Execute Local MSI file with an embedded EXEed3fa08a-ca18-4009-973e-03d13014d0e8command_prompt
145defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec5WMI Win32_Product Class - Execute Local MSI file with embedded JScript882082f0-27c6-4eec-a43c-9aa80bccdb30powershell
146defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec6WMI Win32_Product Class - Execute Local MSI file with embedded VBScriptcf470d9a-58e7-43e5-b0d2-805dffc05576powershell
147defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec7WMI Win32_Product Class - Execute Local MSI file with an embedded DLL32eb3861-30da-4993-897a-42737152f5f8powershell
148defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec8WMI Win32_Product Class - Execute Local MSI file with an embedded EXE55080eb0-49ae-4f55-a440-4167b7974f79powershell
149defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec9Msiexec.exe - Execute the DllRegisterServer function of a DLL0106ffa5-fab6-4c7d-82e3-e6b8867d5e5dcommand_prompt
150defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec10Msiexec.exe - Execute the DllUnregisterServer function of a DLLab09ec85-4955-4f9c-b8e0-6851baf4d47fcommand_prompt
151defense-evasionT1218.007Signed Binary Proxy Execution: Msiexec11Msiexec.exe - Execute Remote MSI file44a4bedf-ffe3-452e-bee4-6925ab125662command_prompt
152defense-evasionT1556.002Modify Authentication Process: Password Filter DLL1Install and Register Password Filter DLLa7961770-beb5-4134-9674-83d7e1fa865cpowershell
153defense-evasionT1556.002Modify Authentication Process: Password Filter DLL2Install Additional Authentication Packages91580da6-bc6e-431b-8b88-ac77180005f2powershell
154defense-evasionT1070.003Indicator Removal on Host: Clear Command History1Clear Bash history (rm)a934276e-2be5-4a36-93fd-98adbb5bd4fcsh
155defense-evasionT1070.003Indicator Removal on Host: Clear Command History2Clear Bash history (echo)cbf506a5-dd78-43e5-be7e-a46b7c7a0a11sh
156defense-evasionT1070.003Indicator Removal on Host: Clear Command History3Clear Bash history (cat dev/null)b1251c35-dcd3-4ea1-86da-36d27b54f31fsh
157defense-evasionT1070.003Indicator Removal on Host: Clear Command History4Clear Bash history (ln dev/null)23d348f3-cc5c-4ba9-bd0a-ae09069f0914sh
158defense-evasionT1070.003Indicator Removal on Host: Clear Command History5Clear Bash history (truncate)47966a1d-df4f-4078-af65-db6d9aa20739sh
159defense-evasionT1070.003Indicator Removal on Host: Clear Command History6Clear history of a bunch of shells7e6721df-5f08-4370-9255-f06d8a77af4csh
160defense-evasionT1070.003Indicator Removal on Host: Clear Command History7Clear and Disable Bash History Logging784e4011-bd1a-4ecd-a63a-8feb278512e6bash
161defense-evasionT1070.003Indicator Removal on Host: Clear Command History8Use Space Before Command to Avoid Logging to History53b03a54-4529-4992-852d-a00b4b7215a6sh
162defense-evasionT1070.003Indicator Removal on Host: Clear Command History9Disable Bash History Logging with SSH -T5f8abd62-f615-43c5-b6be-f780f25790a1sh
163defense-evasionT1070.003Indicator Removal on Host: Clear Command History10Clear Docker Container Logs553b39f9-1e8c-47b1-abf5-8daf7b0391e9bash
164defense-evasionT1070.003Indicator Removal on Host: Clear Command History11Prevent Powershell History Logging2f898b81-3e97-4abb-bc3f-a95138988370powershell
165defense-evasionT1070.003Indicator Removal on Host: Clear Command History12Clear Powershell History by Deleting History Fileda75ae8d-26d6-4483-b0fe-700e4df4f037powershell
166defense-evasionT1070.003Indicator Removal on Host: Clear Command History13Set Custom AddToHistoryHandler to Avoid History File Logging1d0d9aa6-6111-4f89-927b-53e8afae7f94powershell
167defense-evasionT1070.003Indicator Removal on Host: Clear Command History14Clear PowerShell Session History22c779cd-9445-4d3e-a136-f75adbf0315fpowershell
168defense-evasionT1202Indirect Command Execution1Indirect Command Execution - pcalua.exececfea7a-5f03-4cdd-8bc8-6f7c22862440command_prompt
169defense-evasionT1202Indirect Command Execution2Indirect Command Execution - forfiles.exe8b34a448-40d9-4fc3-a8c8-4bb286faf7dccommand_prompt
170defense-evasionT1202Indirect Command Execution3Indirect Command Execution - conhost.execf3391e0-b482-4b02-87fc-ca8362269b29command_prompt
171defense-evasionT1202Indirect Command Execution4Indirect Command Execution - Scriptrunner.exe0fd14730-6226-4f5e-8d67-43c65f1be940powershell
172defense-evasionT1202Indirect Command Execution5Indirect Command Execution - RunMRU Dialogde323a93-2f18-4bd5-ba60-d6fca6aeff76powershell
173defense-evasionT1140Deobfuscate/Decode Files or Information1Deobfuscate/Decode Files Or Informationdc6fe391-69e6-4506-bd06-ea5eeb4082f8command_prompt
174defense-evasionT1140Deobfuscate/Decode Files or Information2Certutil Rename and Decode71abc534-3c05-4d0c-80f7-cbe93cb2aa94command_prompt
175defense-evasionT1140Deobfuscate/Decode Files or Information3Base64 decoding with Python356dc0e8-684f-4428-bb94-9313998ad608sh
176defense-evasionT1140Deobfuscate/Decode Files or Information4Base64 decoding with Perl6604d964-b9f6-4d4b-8ce8-499829a14d0ash
177defense-evasionT1140Deobfuscate/Decode Files or Information5Base64 decoding with shell utilitiesb4f6a567-a27a-41e5-b8ef-ac4b4008bb7esh
178defense-evasionT1140Deobfuscate/Decode Files or Information6Base64 decoding with shell utilities (freebsd)b6097712-c42e-4174-b8f2-4b1e1a5bbb3dsh
179defense-evasionT1140Deobfuscate/Decode Files or Information7FreeBSD b64encode Shebang in CLI18ee2002-66e8-4518-87c5-c0ec9c8299acsh
180defense-evasionT1140Deobfuscate/Decode Files or Information8Hex decoding with shell utilities005943f9-8dd5-4349-8b46-0313c0a9f973sh
181defense-evasionT1140Deobfuscate/Decode Files or Information9Linux Base64 Encoded Shebang in CLI3a15c372-67c1-4430-ac8e-ec06d641ce4dsh
182defense-evasionT1140Deobfuscate/Decode Files or Information10XOR decoding and command execution using Pythonc3b65cd5-ee51-4e98-b6a3-6cbdec138efcbash
183defense-evasionT1140Deobfuscate/Decode Files or Information11Expand CAB with expand.exe9f8b1c54-cb76-4d5e-bb1f-2f5c0e8f5a11command_prompt
184defense-evasionT1562Impair Defenses1Windows Disable LSA Protection40075d5f-3a70-4c66-9125-f72bee87247dcommand_prompt
185defense-evasionT1562Impair Defenses2Disable journal logging via systemctl utilityc3a377f9-1203-4454-aa35-9d391d34768fsh
186defense-evasionT1562Impair Defenses3Disable journal logging via sed utility12e5551c-8d5c-408e-b3e4-63f53b03379fsh
187defense-evasionT1055.003Thread Execution Hijacking1Thread Execution Hijacking578025d5-faa9-4f6d-8390-aae527d503e1powershell
188defense-evasionT1036Masquerading1System File Copied to Unusual Location51005ac7-52e2-45e0-bdab-d17c6d4916cdpowershell
189defense-evasionT1036Masquerading2Malware Masquerading and Execution from Zip File4449c89b-ec82-43a4-89c1-91e2f1abeeccpowershell
190defense-evasionT1070.008Email Collection: Mailbox Manipulation1Copy and Delete Mailbox Data on Windowsd29f01ea-ac72-4efc-8a15-bea64b77fabfpowershell
191defense-evasionT1070.008Email Collection: Mailbox Manipulation2Copy and Delete Mailbox Data on Linux25e2be0e-96f7-4417-bd16-a4a2500e3802bash
192defense-evasionT1070.008Email Collection: Mailbox Manipulation3Copy and Delete Mailbox Data on macOS3824130e-a6e4-4528-8091-3a52eeb540f6bash
193defense-evasionT1070.008Email Collection: Mailbox Manipulation4Copy and Modify Mailbox Data on Windowsedddff85-fee0-499d-9501-7d4d2892e79bpowershell
194defense-evasionT1070.008Email Collection: Mailbox Manipulation5Copy and Modify Mailbox Data on Linux6d99f93c-da56-49e3-b195-163090ace4f6bash
195defense-evasionT1070.008Email Collection: Mailbox Manipulation6Copy and Modify Mailbox Data on macOS8a0b1579-5a36-483a-9cde-0236983e1665bash
196defense-evasionT1055Process Injection1Shellcode execution via VBA1c91e740-1729-4329-b779-feba6e71d048powershell
197defense-evasionT1055Process Injection2Remote Process Injection in LSASS via mimikatz3203ad24-168e-4bec-be36-f79b13ef8a83command_prompt
198defense-evasionT1055Process Injection3Section View Injectionc6952f41-6cf0-450a-b352-2ca8dae7c178powershell
199defense-evasionT1055Process Injection4Dirty Vanity process Injection49543237-25db-497b-90df-d0a0a6e8fe2cpowershell
200defense-evasionT1055Process Injection5Read-Write-Execute process Injection0128e48e-8c1a-433a-a11a-a5387384f1e1powershell
201defense-evasionT1055Process Injection6Process Injection with Go using UuidFromStringA WinAPI2315ce15-38b6-46ac-a3eb-5e21abef2545powershell
202defense-evasionT1055Process Injection7Process Injection with Go using EtwpCreateEtwThread WinAPI7362ecef-6461-402e-8716-7410e1566400powershell
203defense-evasionT1055Process Injection8Remote Process Injection with Go using RtlCreateUserThread WinAPIa0c1725f-abcd-40d6-baac-020f3cf94ecdpowershell
204defense-evasionT1055Process Injection9Remote Process Injection with Go using CreateRemoteThread WinAPI69534efc-d5f5-4550-89e6-12c6457b9eddpowershell
205defense-evasionT1055Process Injection10Remote Process Injection with Go using CreateRemoteThread WinAPI (Natively)2a4ab5c1-97ad-4d6d-b5d3-13f3a6c94e39powershell
206defense-evasionT1055Process Injection11Process Injection with Go using CreateThread WinAPI2871ed59-3837-4a52-9107-99500ebc87cbpowershell
207defense-evasionT1055Process Injection12Process Injection with Go using CreateThread WinAPI (Natively)2a3c7035-d14f-467a-af94-933e49fe6786powershell
208defense-evasionT1055Process Injection13UUID custom process Injection0128e48e-8c1a-433a-a11a-a5304734f1e1powershell
209defense-evasionT1218Signed Binary Proxy Execution1mavinject - Inject DLL into running processc426dacf-575d-4937-8611-a148a86a5e61command_prompt
210defense-evasionT1218Signed Binary Proxy Execution2Register-CimProvider - Execute evil dllad2c17ed-f626-4061-b21e-b9804a6f3655command_prompt
211defense-evasionT1218Signed Binary Proxy Execution3InfDefaultInstall.exe .inf Execution54ad7d5a-a1b5-472c-b6c4-f8090fb2daefcommand_prompt
212defense-evasionT1218Signed Binary Proxy Execution4ProtocolHandler.exe Downloaded a Suspicious Filedb020456-125b-4c8b-a4a7-487df8afb5a2command_prompt
213defense-evasionT1218Signed Binary Proxy Execution5Microsoft.Workflow.Compiler.exe Payload Execution7cbb0f26-a4c1-4f77-b180-a009aa05637epowershell
214defense-evasionT1218Signed Binary Proxy Execution6Renamed Microsoft.Workflow.Compiler.exe Payload Executions4cc40fd7-87b8-4b16-b2d7-57534b86b911powershell
215defense-evasionT1218Signed Binary Proxy Execution7Invoke-ATHRemoteFXvGPUDisablementCommand base test9ebe7901-7edf-45c0-b5c7-8366300919dbpowershell
216defense-evasionT1218Signed Binary Proxy Execution8DiskShadow Command Execution0e1483ba-8f0c-425d-b8c6-42736e058eaapowershell
217defense-evasionT1218Signed Binary Proxy Execution9Load Arbitrary DLL via Wuauclt (Windows Update Client)49fbd548-49e9-4bb7-94a6-3769613912b8command_prompt
218defense-evasionT1218Signed Binary Proxy Execution10Lolbin Gpscript logon option5bcda9cd-8e85-48fa-861d-b5a85d91d48ccommand_prompt
219defense-evasionT1218Signed Binary Proxy Execution11Lolbin Gpscript startup optionf8da74bb-21b8-4af9-8d84-f2c8e4a220e3command_prompt
220defense-evasionT1218Signed Binary Proxy Execution12Lolbas ie4uinit.exe use as proxy13c0804e-615e-43ad-b223-2dfbacd0b0b3command_prompt
221defense-evasionT1218Signed Binary Proxy Execution13LOLBAS CustomShellHost to Spawn Processb1eeb683-90bb-4365-bbc2-2689015782fepowershell
222defense-evasionT1218Signed Binary Proxy Execution14Provlaunch.exe Executes Arbitrary Command via Registry Keyab76e34f-28bf-441f-a39c-8db4835b89cccommand_prompt
223defense-evasionT1218Signed Binary Proxy Execution15LOLBAS Msedge to Spawn Processe5eedaed-ad42-4c1e-8783-19529738a349powershell
224defense-evasionT1218Signed Binary Proxy Execution16System Binary Proxy Execution - Wlrmdr Lolbin7816c252-b728-4ea6-a683-bd9441ca0b71powershell
225defense-evasionT1070.006Indicator Removal on Host: Timestomp1Set a file's access timestamp5f9113d5-ed75-47ed-ba23-ea3573d05810sh
226defense-evasionT1070.006Indicator Removal on Host: Timestomp2Set a file's modification timestamp20ef1523-8758-4898-b5a2-d026cc3d2c52sh
227defense-evasionT1070.006Indicator Removal on Host: Timestomp3Set a file's creation timestamp8164a4a6-f99c-4661-ac4f-80f5e4e78d2bsh
228defense-evasionT1070.006Indicator Removal on Host: Timestomp4Modify file timestamps using reference file631ea661-d661-44b0-abdb-7a7f3fc08e50sh
229defense-evasionT1070.006Indicator Removal on Host: Timestomp5Windows - Modify file creation timestamp with PowerShellb3b2c408-2ff0-4a33-b89b-1cb46a9e6a9cpowershell
230defense-evasionT1070.006Indicator Removal on Host: Timestomp6Windows - Modify file last modified timestamp with PowerShellf8f6634d-93e1-4238-8510-f8a90a20dcf2powershell
231defense-evasionT1070.006Indicator Removal on Host: Timestomp7Windows - Modify file last access timestamp with PowerShellda627f63-b9bd-4431-b6f8-c5b44d061a62powershell
232defense-evasionT1070.006Indicator Removal on Host: Timestomp8Windows - Timestomp a Filed7512c33-3a75-4806-9893-69abc3ccdd43powershell
233defense-evasionT1070.006Indicator Removal on Host: Timestomp9MacOS - Timestomp Date Modified87fffff4-d371-4057-a539-e3b24c37e564sh
234defense-evasionT1070.006Indicator Removal on Host: Timestomp10Event Log Manipulations- Time slipping via Powershell7bcf83bf-f5ef-425c-9d9a-71618ad9ed12powershell
235defense-evasionT1620Reflective Code Loading1WinPwn - Reflectively load Mimik@tz into memory56b9589c-9170-4682-8c3d-33b86ecb5119powershell
236defense-evasionT1497.003Time Based Evasion1Delay execution with ping8b87dd03-8204-478c-bac3-3959f6528de3sh
237defense-evasionT1218.003Signed Binary Proxy Execution: CMSTP1CMSTP Executing Remote Scriptlet34e63321-9683-496b-bbc1-7566bc55e624command_prompt
238defense-evasionT1218.003Signed Binary Proxy Execution: CMSTP2CMSTP Executing UAC Bypass748cb4f6-2fb3-4e97-b7ad-b22635a09ab0command_prompt
239defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging1Disable Windows IIS HTTP Logging69435dcf-c66f-4ec0-a8b1-82beb76b34dbpowershell
240defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging2Disable Windows IIS HTTP Logging via PowerShella957fb0f-1e85-49b2-a211-413366784b1epowershell
241defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging3Kill Event Log Service Threads41ac52ba-5d5e-40c0-b267-573ed90489bdpowershell
242defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging4Impair Windows Audit Log Policy5102a3a7-e2d7-4129-9e45-f483f2e0eea8command_prompt
243defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging5Clear Windows Audit Policy Config913c0e4e-4b37-4b78-ad0b-90e7b25010f6command_prompt
244defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging6Disable Event Logging with wevtutilb26a3340-dad7-4360-9176-706269c74103command_prompt
245defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging7Makes Eventlog blind with Phant0m3ddf3d03-f5d6-462a-ad76-2c5ff7b6d741command_prompt
246defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging8Modify Event Log Channel Access Permissions via Registry - PowerShell8e81d090-0cd6-4d46-863c-eec11311298fpowershell
247defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging9Modify Event Log Channel Access Permissions via Registry 2 - PowerShell85e6eff8-3ed4-4e03-ae50-aa6a404898a5powershell
248defense-evasionT1562.002Impair Defenses: Disable Windows Event Logging10Modify Event Log Access Permissions via Registry - PowerShella0cb81f8-44d0-4ac4-a8f3-c5c7f43a12c1powershell
249defense-evasionT1218.002Signed Binary Proxy Execution: Control Panel1Control Panel Items037e9d8a-9e46-4255-8b33-2ae3b545ca6fcommand_prompt
250defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall1Disable Microsoft Defender Firewall88d05800-a5e4-407e-9b53-ece4174f197fcommand_prompt
251defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall2Disable Microsoft Defender Firewall via Registryafedc8c4-038c-4d82-b3e5-623a95f8a612command_prompt
252defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall3Allow SMB and RDP on Microsoft Defender Firewalld9841bf8-f161-4c73-81e9-fd773a5ff8c1command_prompt
253defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall4Opening ports for proxy - HARDRAIN15e57006-79dd-46df-9bf9-31bc24fb5a80command_prompt
254defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall5Open a local port through Windows Firewall to any profile9636dd6e-7599-40d2-8eee-ac16434f35edpowershell
255defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall6Allow Executable Through Firewall Located in Non-Standard Location6f5822d2-d38d-4f48-9bfc-916607ff6b8cpowershell
256defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall7Stop/Start UFW firewallfe135572-edcd-49a2-afe6-1d39521c5a9ash
257defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall8Stop/Start Packet Filter0ca82ed1-0a94-4774-9a9a-a2c83a8022b7sh
258defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall9Stop/Start UFW firewall systemctl9fd99609-1854-4f3c-b47b-97d9a5972bd1sh
259defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall10Turn off UFW logging8a95b832-2c2a-494d-9cb0-dc9dd97c8badsh
260defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall11Add and delete UFW firewall rulesb2563a4e-c4b8-429c-8d47-d5bcb227ba7ash
261defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall12Add and delete Packet Filter rules8b23cae1-66c1-41c5-b79d-e095b6098b5bsh
262defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall13Edit UFW firewall user.rules filebeaf815a-c883-4194-97e9-fdbbb2bbdd7csh
263defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall14Edit UFW firewall ufw.conf filec1d8c4eb-88da-4927-ae97-c7c25893803bsh
264defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall15Edit UFW firewall sysctl.conf filec4ae0701-88d3-4cd8-8bce-4801ed9f97e4sh
265defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall16Edit UFW firewall main configuration file7b697ece-8270-46b5-bbc7-6b9e27081831sh
266defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall17Tail the UFW firewall log file419cca0c-fa52-4572-b0d7-bc7c6f388a27sh
267defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall18Disable iptables7784c64e-ed0b-4b65-bf63-c86db229fd56sh
268defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall19Modify/delete iptables firewall rules899a7fb5-d197-4951-8614-f19ac4a73ad4sh
269defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall20LockBit Black - Unusual Windows firewall registry modification -cmda4651931-ebbb-4cde-9363-ddf3d66214cbcommand_prompt
270defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall21LockBit Black - Unusual Windows firewall registry modification -Powershell80b453d1-eec5-4144-bf08-613a6c3ffe12powershell
271defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall22Blackbit - Disable Windows Firewall using netsh firewall91f348e6-3760-4997-a93b-2ceee7f254eecommand_prompt
272defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall23ESXi - Disable Firewall via Esxclibac8a340-be64-4491-a0cc-0985cb227f5acommand_prompt
273defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall24Set a firewall rule using New-NetFirewallRule94be7646-25f6-467e-af23-585fb13000c8powershell
274defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall25ESXi - Set Firewall to PASS Traffica67e8aea-ea7c-4c3b-9b1b-8c2957c3091dcommand_prompt
275defense-evasionT1553.003Subvert Trust Controls: SIP and Trust Provider Hijacking1SIP (Subject Interface Package) Hijacking via Custom DLLe12f5d8d-574a-4e9d-8a84-c0e8b4a8a675command_prompt
276defense-evasionT1562.012Impair Defenses: Disable or Modify Linux Audit System1Delete all auditd rules using auditctl33a29ab1-cabb-407f-9448-269041bf2856sh
277defense-evasionT1562.012Impair Defenses: Disable or Modify Linux Audit System2Disable auditd using auditctl7906f0a6-b527-46ee-9026-6e81a9184e08sh
278defense-evasionT1207Rogue Domain Controller1DCShadow (Active Directory)0f4c5eb0-98a0-4496-9c3d-656b4f2bc8f6powershell
279defense-evasionT1553.006Subvert Trust Controls: Code Signing Policy Modification1Code Signing Policy Modificationbb6b51e1-ab92-45b5-aeea-e410d06405f8command_prompt
280defense-evasionT1610Deploy a container1Deploy Docker container59aa6f26-7620-417e-9318-589e0fb7a372bash
281defense-evasionT1112Modify Registry1Modify Registry of Current User Profile - cmd1324796b-d0f6-455a-b4ae-21ffee6aa6b9command_prompt
282defense-evasionT1112Modify Registry2Modify Registry of Local Machine - cmd282f929a-6bc5-42b8-bd93-960c3ba35afecommand_prompt
283defense-evasionT1112Modify Registry3Modify registry to store logon credentialsc0413fb5-33e2-40b7-9b6f-60b29f4a7a18command_prompt
284defense-evasionT1112Modify Registry4Use Powershell to Modify registry to store logon credentials68254a85-aa42-4312-a695-38b7276307f8powershell
285defense-evasionT1112Modify Registry5Add domain to Trusted sites Zonecf447677-5a4e-4937-a82c-e47d254afd57powershell
286defense-evasionT1112Modify Registry6Javascript in registry15f44ea9-4571-4837-be9e-802431a7bfaepowershell
287defense-evasionT1112Modify Registry7Change Powershell Execution Policy to Bypassf3a6cceb-06c9-48e5-8df8-8867a6814245powershell
288defense-evasionT1112Modify Registry8BlackByte Ransomware Registry Changes - CMD4f4e2f9f-6209-4fcf-9b15-3b7455706f5bcommand_prompt
289defense-evasionT1112Modify Registry9BlackByte Ransomware Registry Changes - Powershell0b79c06f-c788-44a2-8630-d69051f1123dpowershell
290defense-evasionT1112Modify Registry10Disable Windows Registry Toolac34b0f7-0f85-4ac0-b93e-3ced2bc69bb8command_prompt
291defense-evasionT1112Modify Registry11Disable Windows CMD applicationd2561a6d-72bd-408c-b150-13efe1801c2apowershell
292defense-evasionT1112Modify Registry12Disable Windows Task Manager applicationaf254e70-dd0e-4de6-9afe-a994d9ea8b62command_prompt
293defense-evasionT1112Modify Registry13Disable Windows Notification Centerc0d6d67f-1f63-42cc-95c0-5fd6b20082adcommand_prompt
294defense-evasionT1112Modify Registry14Disable Windows Shutdown Button6e0d1131-2d7e-4905-8ca5-d6172f05d03dcommand_prompt
295defense-evasionT1112Modify Registry15Disable Windows LogOff Buttone246578a-c24d-46a7-9237-0213ff86fb0ccommand_prompt
296defense-evasionT1112Modify Registry16Disable Windows Change Password Featured4a6da40-618f-454d-9a9e-26af552aaeb0command_prompt
297defense-evasionT1112Modify Registry17Disable Windows Lock Workstation Feature3dacb0d2-46ee-4c27-ac1b-f9886bf91a56command_prompt
298defense-evasionT1112Modify Registry18Activate Windows NoDesktop Group Policy Feature93386d41-525c-4a1b-8235-134a628dee17command_prompt
299defense-evasionT1112Modify Registry19Activate Windows NoRun Group Policy Featured49ff3cc-8168-4123-b5b3-f057d9abbd55command_prompt
300defense-evasionT1112Modify Registry20Activate Windows NoFind Group Policy Featureffbb407e-7f1d-4c95-b22e-548169db1fbdcommand_prompt
301defense-evasionT1112Modify Registry21Activate Windows NoControlPanel Group Policy Featurea450e469-ba54-4de1-9deb-9023a6111690command_prompt
302defense-evasionT1112Modify Registry22Activate Windows NoFileMenu Group Policy Feature5e27bdb4-7fd9-455d-a2b5-4b4b22c9dea4command_prompt
303defense-evasionT1112Modify Registry23Activate Windows NoClose Group Policy Feature12f50e15-dbc6-478b-a801-a746e8ba1723command_prompt
304defense-evasionT1112Modify Registry24Activate Windows NoSetTaskbar Group Policy Featured29b7faf-7355-4036-9ed3-719bd17951edcommand_prompt
305defense-evasionT1112Modify Registry25Activate Windows NoTrayContextMenu Group Policy Feature4d72d4b1-fa7b-4374-b423-0fe326da49d2command_prompt
306defense-evasionT1112Modify Registry26Activate Windows NoPropertiesMyDocuments Group Policy Feature20fc9daa-bd48-4325-9aff-81b967a84b1dcommand_prompt
307defense-evasionT1112Modify Registry27Hide Windows Clock Group Policy Feature8023db1e-ad06-4966-934b-b6a0ae52689ecommand_prompt
308defense-evasionT1112Modify Registry28Windows HideSCAHealth Group Policy Featurea4637291-40b1-4a96-8c82-b28f1d73e54ecommand_prompt
309defense-evasionT1112Modify Registry29Windows HideSCANetwork Group Policy Feature3e757ce7-eca0-411a-9583-1c33b8508d52command_prompt
310defense-evasionT1112Modify Registry30Windows HideSCAPower Group Policy Feature8d85a5d8-702f-436f-bc78-fcd9119496fccommand_prompt
311defense-evasionT1112Modify Registry31Windows HideSCAVolume Group Policy Feature7f037590-b4c6-4f13-b3cc-e424c5ab8adecommand_prompt
312defense-evasionT1112Modify Registry32Windows Modify Show Compress Color And Info Tip Registry795d3248-0394-4d4d-8e86-4e8df2a2693fcommand_prompt
313defense-evasionT1112Modify Registry33Windows Powershell Logging Disabled95b25212-91a7-42ff-9613-124aca6845a8command_prompt
314defense-evasionT1112Modify Registry34Windows Add Registry Value to Load Service in Safe Mode without Network1dd59fb3-1cb3-4828-805d-cf80b4c3bbb5command_prompt
315defense-evasionT1112Modify Registry35Windows Add Registry Value to Load Service in Safe Mode with Networkc173c948-65e5-499c-afbe-433722ed5bd4command_prompt
316defense-evasionT1112Modify Registry36Disable Windows Toast Notifications003f466a-6010-4b15-803a-cbb478a314d7command_prompt
317defense-evasionT1112Modify Registry37Disable Windows Security Center Notifications45914594-8df6-4ea9-b3cc-7eb9321a807ecommand_prompt
318defense-evasionT1112Modify Registry38Suppress Win Defender Notificationsc30dada3-7777-4590-b970-dc890b8cf113command_prompt
319defense-evasionT1112Modify Registry39Allow RDP Remote Assistance Feature86677d0e-0b5e-4a2b-b302-454175f9aa9ecommand_prompt
320defense-evasionT1112Modify Registry40NetWire RAT Registry Key Creation65704cd4-6e36-4b90-b6c1-dc29a82c8e56command_prompt
321defense-evasionT1112Modify Registry41Ursnif Malware Registry Key Creationc375558d-7c25-45e9-bd64-7b23a97c1db0command_prompt
322defense-evasionT1112Modify Registry42Terminal Server Client Connection History Cleared3448824b-3c35-4a9e-a8f5-f887f68bea21command_prompt
323defense-evasionT1112Modify Registry43Disable Windows Error Reporting Settingsd2c9e41e-cd86-473d-980d-b6403562e3e1command_prompt
324defense-evasionT1112Modify Registry44DisallowRun Execution Of Certain Applications71db768a-5a9c-4047-b5e7-59e01f188e84command_prompt
325defense-evasionT1112Modify Registry45Enabling Restricted Admin Mode via Command_Promptfe7974e5-5813-477b-a7bd-311d4f535e83command_prompt
326defense-evasionT1112Modify Registry46Mimic Ransomware - Enable Multiple User Sessions39f1f378-ba8a-42b3-96dc-2a6540cfc1e3command_prompt
327defense-evasionT1112Modify Registry47Mimic Ransomware - Allow Multiple RDP Sessions per User35727d9e-7a7f-4d0c-a259-dc3906d6e8b9command_prompt
328defense-evasionT1112Modify Registry48Event Viewer Registry Modification - Redirection URL6174be7f-5153-4afd-92c5-e0c3b7cdb5aecommand_prompt
329defense-evasionT1112Modify Registry49Event Viewer Registry Modification - Redirection Program81483501-b8a5-4225-8b32-52128e2f69dbcommand_prompt
330defense-evasionT1112Modify Registry50Enabling Remote Desktop Protocol via Remote Registrye3ad8e83-3089-49ff-817f-e52f8c948090command_prompt
331defense-evasionT1112Modify Registry51Disable Win Defender Notification12e03af7-79f9-4f95-af48-d3f12f28a260command_prompt
332defense-evasionT1112Modify Registry52Disable Windows OS Auto Update01b20ca8-c7a3-4d86-af59-059f15ed5474command_prompt
333defense-evasionT1112Modify Registry53Disable Windows Auto Reboot for current logon user396f997b-c5f8-4a96-bb2c-3c8795cf459dcommand_prompt
334defense-evasionT1112Modify Registry54Windows Auto Update Option to Notify before download335a6b15-b8d2-4a3f-a973-ad69aa2620d7command_prompt
335defense-evasionT1112Modify Registry55Do Not Connect To Win Updated1de3767-99c2-4c6c-8c5a-4ba4586474c8command_prompt
336defense-evasionT1112Modify Registry56Tamper Win Defender Protection3b625eaa-c10d-4635-af96-3eae7d2a2f3ccommand_prompt
337defense-evasionT1112Modify Registry57Snake Malware Registry Blob8318ad20-0488-4a64-98f4-72525a012f6bpowershell
338defense-evasionT1112Modify Registry58Allow Simultaneous Download Registry37950714-e923-4f92-8c7c-51e4b6fffbf6command_prompt
339defense-evasionT1112Modify Registry59Modify Internet Zone Protocol Defaults in Current User Registry - cmdc88ef166-50fa-40d5-a80c-e2b87d4180f7command_prompt
340defense-evasionT1112Modify Registry60Modify Internet Zone Protocol Defaults in Current User Registry - PowerShellb1a4d687-ba52-4057-81ab-757c3dc0d3b5powershell
341defense-evasionT1112Modify Registry61Activities To Disable Secondary Authentication Detected By Modified Registry Value.c26fb85a-fa50-4fab-a64a-c51f5dc538d5command_prompt
342defense-evasionT1112Modify Registry62Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value.ffeddced-bb9f-49c6-97f0-3d07a509bf94command_prompt
343defense-evasionT1112Modify Registry63Scarab Ransomware Defense Evasion Activitiesca8ba39c-3c5a-459f-8e15-280aec65a910command_prompt
344defense-evasionT1112Modify Registry64Disable Remote Desktop Anti-Alias Setting Through Registry61d35188-f113-4334-8245-8c6556d43909command_prompt
345defense-evasionT1112Modify Registry65Disable Remote Desktop Security Settings Through Registry4b81bcfa-fb0a-45e9-90c2-e3efe5160140command_prompt
346defense-evasionT1112Modify Registry66Disabling ShowUI Settings of Windows Error Reporting (WER)09147b61-40f6-4b2a-b6fb-9e73a3437c96command_prompt
347defense-evasionT1112Modify Registry67Enable Proxy Settingseb0ba433-63e5-4a8c-a9f0-27c4192e1336command_prompt
348defense-evasionT1112Modify Registry68Set-Up Proxy Serverd88a3d3b-d016-4939-a745-03638aafd21bcommand_prompt
349defense-evasionT1112Modify Registry69RDP Authentication Level Override7e7b62e9-5f83-477d-8935-48600f38a3c6command_prompt
350defense-evasionT1112Modify Registry70Enable RDP via Registry (fDenyTSConnections)16bdbe52-371c-4ccf-b708-79fba61f1db4command_prompt
351defense-evasionT1112Modify Registry71Disable Windows Prefetch Through Registry7979dd41-2045-48b2-a54e-b1bc2415c9dacommand_prompt
352defense-evasionT1112Modify Registry72Setting Shadow key in Registry for RDP Shadowingac494fe5-81a4-4897-af42-e774cf005ecbpowershell
353defense-evasionT1112Modify Registry73Flush Shimcacheecbd533e-b45d-4239-aeff-b857c6f6d68bcommand_prompt
354defense-evasionT1112Modify Registry74Disable Windows Remote Desktop Protocol5f8e36de-37ca-455e-b054-a2584f043c06command_prompt
355defense-evasionT1112Modify Registry75Enforce Smart Card Authentication Through Registry4c4bf587-fe7f-448f-ba8d-1ecec9db88becommand_prompt
356defense-evasionT1112Modify Registry76Requires the BitLocker PIN for Pre-boot authentication26fc7375-a551-4336-90d7-3f2817564304command_prompt
357defense-evasionT1112Modify Registry77Modify EnableBDEWithNoTPM Registry entrybacb3e73-8161-43a9-8204-a69fe0e4b482command_prompt
358defense-evasionT1112Modify Registry78Modify UseTPM Registry entry7c8c7bd8-0a5c-4514-a6a3-0814c5a98cf0command_prompt
359defense-evasionT1112Modify Registry79Modify UseTPMPIN Registry entry10b33fb0-c58b-44cd-8599-b6da5ad6384ccommand_prompt
360defense-evasionT1112Modify Registry80Modify UseTPMKey Registry entryc8480c83-a932-446e-a919-06a1fd1e512acommand_prompt
361defense-evasionT1112Modify Registry81Modify UseTPMKeyPIN Registry entry02d8b9f7-1a51-4011-8901-2d55cca667f9command_prompt
362defense-evasionT1112Modify Registry82Modify EnableNonTPM Registry entrye672a340-a933-447c-954c-d68db38a09b1command_prompt
363defense-evasionT1112Modify Registry83Modify UsePartialEncryptionKey Registry entryb5169fd5-85c8-4b2c-a9b6-64cc0b9febefcommand_prompt
364defense-evasionT1112Modify Registry84Modify UsePIN Registry entry3ac0b30f-532f-43c6-8f01-fb657aaed7e4command_prompt
365defense-evasionT1112Modify Registry85Abusing Windows TelemetryController Registry Key for Persistence4469192c-2d2d-4a3a-9758-1f31d937a92bcommand_prompt
366defense-evasionT1112Modify Registry86Modify RDP-Tcp Initial Program Registry Entryc691cee2-8d17-4395-b22f-00644c7f1c2dcommand_prompt
367defense-evasionT1112Modify Registry87Abusing MyComputer Disk Cleanup Path for Persistencef2915249-4485-42e2-96b7-9bf34328d497command_prompt
368defense-evasionT1112Modify Registry88Abusing MyComputer Disk Fragmentation Path for Persistence3235aafe-b49d-451b-a1f1-d979fa65ddafcommand_prompt
369defense-evasionT1112Modify Registry89Abusing MyComputer Disk Backup Path for Persistence599f3b5c-0323-44ed-bb63-4551623bf675command_prompt
370defense-evasionT1112Modify Registry90Adding custom paths for application execution573d15da-c34e-4c59-a7d2-18f20d92dfa3command_prompt
371defense-evasionT1574.008Hijack Execution Flow: Path Interception by Search Order Hijacking1powerShell Persistence via hijacking default modules - Get-Variable.exe1561de08-0b4b-498e-8261-e922f3494aaepowershell
372defense-evasionT1027.001Obfuscated Files or Information: Binary Padding1Pad Binary to Change Hash - Linux/macOS ddffe2346c-abd5-4b45-a713-bf5f1ebd573ash
373defense-evasionT1027.001Obfuscated Files or Information: Binary Padding2Pad Binary to Change Hash using truncate command - Linux/macOSe22a9e89-69c7-410f-a473-e6c212cd2292sh
374defense-evasionT1484.001Domain Policy Modification: Group Policy Modification1LockBit Black - Modify Group policy settings -cmd9ab80952-74ee-43da-a98c-1e740a985f28command_prompt
375defense-evasionT1484.001Domain Policy Modification: Group Policy Modification2LockBit Black - Modify Group policy settings -Powershellb51eae65-5441-4789-b8e8-64783c26c1d1powershell
376defense-evasionT1078.001Valid Accounts: Default Accounts1Enable Guest account with RDP capability and admin privileges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
377defense-evasionT1078.001Valid Accounts: Default Accounts2Activate Guest Accountaa6cb8c4-b582-4f8e-b677-37733914abdacommand_prompt
378defense-evasionT1078.001Valid Accounts: Default Accounts3Enable Guest Account on macOS0315bdff-4178-47e9-81e4-f31a6d23f7e4sh
379defense-evasionT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
380defense-evasionT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
381defense-evasionT1574.006Hijack Execution Flow: LD_PRELOAD3Dylib Injection via DYLD_INSERT_LIBRARIES4d66029d-7355-43fd-93a4-b63ba92ea1bebash
382defense-evasionT1070.001Indicator Removal on Host: Clear Windows Event Logs1Clear Logse6abb60e-26b8-41da-8aae-0c35174b0967command_prompt
383defense-evasionT1070.001Indicator Removal on Host: Clear Windows Event Logs2Delete System Logs Using Clear-EventLogb13e9306-3351-4b4b-a6e8-477358b0b498powershell
384defense-evasionT1070.001Indicator Removal on Host: Clear Windows Event Logs3Clear Event Logs via VBA1b682d84-f075-4f93-9a89-8a8de19ffd6epowershell
385defense-evasionT1222File and Directory Permissions Modification1Enable Local and Remote Symbolic Links via fsutil6c4ac96f-d4fa-44f4-83ca-56d8f4a55c02command_prompt
386defense-evasionT1222File and Directory Permissions Modification2Enable Local and Remote Symbolic Links via reg.exe78bef0d4-57fb-417d-a67a-b75ae02ea3abcommand_prompt
387defense-evasionT1222File and Directory Permissions Modification3Enable Local and Remote Symbolic Links via Powershell6cd715aa-20ac-4be1-a8f1-dda7bae160bdpowershell
388defense-evasionT1134.002Create Process with Token1Access Token Manipulationdbf4f5a9-b8e0-46a3-9841-9ad71247239epowershell
389defense-evasionT1134.002Create Process with Token2WinPwn - Get SYSTEM shell - Pop System Shell using Token Manipulation techniqueccf4ac39-ec93-42be-9035-90e2f26bcd92powershell
390defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
391defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid2Make and modify binary from C source (freebsd)dd580455-d84b-481b-b8b0-ac96f3b1dc4csh
392defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid3Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
393defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid4Set a SetUID flag on file (freebsd)9be9b827-ff47-4e1b-bef8-217db6fb7283sh
394defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid5Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
395defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid6Set a SetGID flag on file (freebsd)1f73af33-62a8-4bf1-bd10-3bea931f2c0dsh
396defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid7Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
397defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid8Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
398defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid9Do reconnaissance for files that have the setuid bit set8e36da01-cd29-45fd-be72-8a0fcaad4481sh
399defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid10Do reconnaissance for files that have the setgid bit set3fb46e17-f337-4c14-9f9a-a471946533e2sh
400defense-evasionT1218.008Signed Binary Proxy Execution: Odbcconf1Odbcconf.exe - Execute Arbitrary DLL2430498b-06c0-4b92-a448-8ad263c388e2command_prompt
401defense-evasionT1218.008Signed Binary Proxy Execution: Odbcconf2Odbcconf.exe - Load Response File331ce274-f9c9-440b-9f8c-a1006e1fce0bcommand_prompt
402defense-evasionT1562.006Impair Defenses: Indicator Blocking1Auditing Configuration Changes on Linux Host212cfbcf-4770-4980-bc21-303e37abd0e3bash
403defense-evasionT1562.006Impair Defenses: Indicator Blocking2Auditing Configuration Changes on FreeBSD Hostcedaf7e7-28ee-42ab-ba13-456abd35d1bdsh
404defense-evasionT1562.006Impair Defenses: Indicator Blocking3Logging Configuration Changes on Linux Host7d40bc58-94c7-4fbb-88d9-ebce9fcdb60cbash
405defense-evasionT1562.006Impair Defenses: Indicator Blocking4Logging Configuration Changes on FreeBSD Host6b8ca3ab-5980-4321-80c3-bcd77c8daed8sh
406defense-evasionT1562.006Impair Defenses: Indicator Blocking5Disable Powershell ETW Provider - Windows6f118276-121d-4c09-bb58-a8fb4a72ee84powershell
407defense-evasionT1562.006Impair Defenses: Indicator Blocking6Disable .NET Event Tracing for Windows Via Registry (cmd)8a4c33be-a0d3-434a-bee6-315405edbd5bcommand_prompt
408defense-evasionT1562.006Impair Defenses: Indicator Blocking7Disable .NET Event Tracing for Windows Via Registry (powershell)19c07a45-452d-4620-90ed-4c34fffbe758powershell
409defense-evasionT1562.006Impair Defenses: Indicator Blocking8LockBit Black - Disable the ETW Provider of Windows Defender -cmdf6df0b8e-2c83-44c7-ba5e-0fa4386bec41command_prompt
410defense-evasionT1562.006Impair Defenses: Indicator Blocking9LockBit Black - Disable the ETW Provider of Windows Defender -Powershell69fc085b-5444-4879-8002-b24c8e1a3e02powershell
411defense-evasionT1562.006Impair Defenses: Indicator Blocking10Disable .NET Event Tracing for Windows Via Environment Variable HKCU Registry - Cmdfdac1f79-b833-4bab-b4a1-11b1ed676a4bcommand_prompt
412defense-evasionT1562.006Impair Defenses: Indicator Blocking11Disable .NET Event Tracing for Windows Via Environment Variable HKCU Registry - PowerShellb42c1f8c-399b-47ae-8fd8-763181395feepowershell
413defense-evasionT1562.006Impair Defenses: Indicator Blocking12Disable .NET Event Tracing for Windows Via Environment Variable HKLM Registry - Cmd110b4281-43fe-405f-a184-5d8eaf228ebfcommand_prompt
414defense-evasionT1562.006Impair Defenses: Indicator Blocking13Disable .NET Event Tracing for Windows Via Environment Variable HKLM Registry - PowerShell4d61779d-be7f-425c-b560-0cafb2522911powershell
415defense-evasionT1562.006Impair Defenses: Indicator Blocking14Block Cybersecurity communication by leveraging Windows Name Resolution Policy Table1174b5df-2c33-490f-8854-f5eb80c907capowershell
416defense-evasionT1070Indicator Removal on Host1Indicator Removal using FSUtilb4115c7a-0e92-47f0-a61e-17e7218b2435command_prompt
417defense-evasionT1070Indicator Removal on Host2Indicator Manipulation using FSUtil96e86706-6afd-45b6-95d6-108d23eaf2e9powershell
418defense-evasionT1550.003Use Alternate Authentication Material: Pass the Ticket1Mimikatz Kerberos Ticket Attackdbf38128-7ba7-4776-bedf-cc2eed432098command_prompt
419defense-evasionT1550.003Use Alternate Authentication Material: Pass the Ticket2Rubeus Kerberos Pass The Ticketa2fc4ec5-12c6-4fb4-b661-961f23f359cbpowershell
420defense-evasionT1036.004Masquerading: Masquerade Task or Service1Creating W32Time similar named service using schtasksf9f2fe59-96f7-4a7d-ba9f-a9783200d4c9command_prompt
421defense-evasionT1036.004Masquerading: Masquerade Task or Service2Creating W32Time similar named service using scb721c6ef-472c-4263-a0d9-37f1f4ecff66command_prompt
422defense-evasionT1036.004Masquerading: Masquerade Task or Service3linux rename /proc/pid/comm using prctlf0e3aaea-5cd9-4db6-a077-631dd19b27a8sh
423defense-evasionT1036.004Masquerading: Masquerade Task or Service4Hiding a malicious process with bind mountsad4b73c2-d6e2-4d8b-9868-4c6f55906e01sh
424defense-evasionT1055.004Process Injection: Asynchronous Procedure Call1Process Injection via C#611b39b7-e243-4c81-87a4-7145a90358b1command_prompt
425defense-evasionT1055.004Process Injection: Asynchronous Procedure Call2EarlyBird APC Queue Injection in Go73785dd2-323b-4205-ab16-bb6f06677e14powershell
426defense-evasionT1055.004Process Injection: Asynchronous Procedure Call3Remote Process Injection with Go using NtQueueApcThreadEx WinAPI4cc571b1-f450-414a-850f-879baf36aa06powershell
427defense-evasionT1647Plist File Modification1Plist Modification394a538e-09bb-4a4a-95d1-b93cf12682a8manual
428defense-evasionT1553.005Subvert Trust Controls: Mark-of-the-Web Bypass1Mount ISO image002cca30-4778-4891-878a-aaffcfa502fapowershell
429defense-evasionT1553.005Subvert Trust Controls: Mark-of-the-Web Bypass2Mount an ISO image and run executable from the ISO42f22b00-0242-4afc-a61b-0da05041f9ccpowershell
430defense-evasionT1553.005Subvert Trust Controls: Mark-of-the-Web Bypass3Remove the Zone.Identifier alternate data stream64b12afc-18b8-4d3f-9eab-7f6cae7c73f9powershell
431defense-evasionT1553.005Subvert Trust Controls: Mark-of-the-Web Bypass4Execute LNK file from ISOc2587b8d-743d-4985-aa50-c83394eaeb68powershell
432defense-evasionT1612Build Image on Host1Build Image On Host2db30061-589d-409b-b125-7b473944f9b3sh
433defense-evasionT1055.002Process Injection: Portable Executable Injection1Portable Executable Injection578025d5-faa9-4f6d-8390-aae739d503e1powershell
434defense-evasionT1562.010Impair Defenses: Downgrade Attack1ESXi - Change VIB acceptance level to CommunitySupported via PowerCLI062f92c9-28b1-4391-a5f8-9d8ca6852091powershell
435defense-evasionT1562.010Impair Defenses: Downgrade Attack2ESXi - Change VIB acceptance level to CommunitySupported via ESXCLI14d55b96-b2f5-428d-8fed-49dc4d9dd616command_prompt
436defense-evasionT1562.010Impair Defenses: Downgrade Attack3PowerShell Version 2 Downgrade47c96489-2f55-4774-a6df-39faff428f6fpowershell
437defense-evasionT1218.005Signed Binary Proxy Execution: Mshta1Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject1483fab9-4f52-4217-a9ce-daa9d7747caecommand_prompt
438defense-evasionT1218.005Signed Binary Proxy Execution: Mshta2Mshta executes VBScript to execute malicious command906865c3-e05f-4acc-85c4-fbc185455095command_prompt
439defense-evasionT1218.005Signed Binary Proxy Execution: Mshta3Mshta Executes Remote HTML Application (HTA)c4b97eeb-5249-4455-a607-59f95485cb45powershell
440defense-evasionT1218.005Signed Binary Proxy Execution: Mshta4Invoke HTML Application - Jscript Engine over Local UNC Simulating Lateral Movement007e5672-2088-4853-a562-7490ddc19447powershell
441defense-evasionT1218.005Signed Binary Proxy Execution: Mshta5Invoke HTML Application - Jscript Engine Simulating Double Click58a193ec-131b-404e-b1ca-b35cf0b18c33powershell
442defense-evasionT1218.005Signed Binary Proxy Execution: Mshta6Invoke HTML Application - Direct download from URI39ceed55-f653-48ac-bd19-aceceaf525dbpowershell
443defense-evasionT1218.005Signed Binary Proxy Execution: Mshta7Invoke HTML Application - JScript Engine with Rundll32 and Inline Protocol Handlere7e3a525-7612-4d68-a5d3-c4649181b8afpowershell
444defense-evasionT1218.005Signed Binary Proxy Execution: Mshta8Invoke HTML Application - JScript Engine with Inline Protocol Handlerd3eaaf6a-cdb1-44a9-9ede-b6c337d0d840powershell
445defense-evasionT1218.005Signed Binary Proxy Execution: Mshta9Invoke HTML Application - Simulate Lateral Movement over UNC Pathb8a8bdb2-7eae-490d-8251-d5e0295b2362powershell
446defense-evasionT1218.005Signed Binary Proxy Execution: Mshta10Mshta used to Execute PowerShell8707a805-2b76-4f32-b1c0-14e558205772command_prompt
447defense-evasionT1134.001Access Token Manipulation: Token Impersonation/Theft1Named pipe client impersonation90db9e27-8e7c-4c04-b602-a45927884966powershell
448defense-evasionT1134.001Access Token Manipulation: Token Impersonation/Theft2`SeDebugPrivilege` token duplication34f0a430-9d04-4d98-bcb5-1989f14719f0powershell
449defense-evasionT1134.001Access Token Manipulation: Token Impersonation/Theft3Launch NSudo Executable7be1bc0f-d8e5-4345-9333-f5f67d742cb9powershell
450defense-evasionT1134.001Access Token Manipulation: Token Impersonation/Theft4Bad Potato9c6d799b-c111-4749-a42f-ec2f8cb51448powershell
451defense-evasionT1134.001Access Token Manipulation: Token Impersonation/Theft5Juicy Potatof095e373-b936-4eb4-8d22-f47ccbfbe64apowershell
452defense-evasionT1564.002Hide Artifacts: Hidden Users1Create Hidden User using UniqueID < 5004238a7f0-a980-4fff-98a2-dfc0a363d507sh
453defense-evasionT1564.002Hide Artifacts: Hidden Users2Create Hidden User using IsHidden optionde87ed7b-52c3-43fd-9554-730f695e7f31sh
454defense-evasionT1564.002Hide Artifacts: Hidden Users3Create Hidden User in Registry173126b7-afe4-45eb-8680-fa9f6400431ccommand_prompt
455defense-evasionT1562.003Impair Defenses: Impair Command History Logging1Disable history collection4eafdb45-0f79-4d66-aa86-a3e2c08791f5sh
456defense-evasionT1562.003Impair Defenses: Impair Command History Logging2Disable history collection (freebsd)cada55b4-8251-4c60-819e-8ec1b33c9306sh
457defense-evasionT1562.003Impair Defenses: Impair Command History Logging3Mac HISTCONTROL468566d5-83e5-40c1-b338-511e1659628dmanual
458defense-evasionT1562.003Impair Defenses: Impair Command History Logging4Clear bash history878794f7-c511-4199-a950-8c28b3ed8e5bbash
459defense-evasionT1562.003Impair Defenses: Impair Command History Logging5Setting the HISTCONTROL environment variable10ab786a-028e-4465-96f6-9e83ca6c5f24bash
460defense-evasionT1562.003Impair Defenses: Impair Command History Logging6Setting the HISTFILESIZE environment variable5cafd6c1-2f43-46eb-ac47-a5301ba0a618bash
461defense-evasionT1562.003Impair Defenses: Impair Command History Logging7Setting the HISTSIZE environment variable386d3850-2ce7-4508-b56b-c0558922c814sh
462defense-evasionT1562.003Impair Defenses: Impair Command History Logging8Setting the HISTFILE environment variableb3dacb6c-a9e3-44ec-bf87-38db60c5cad1bash
463defense-evasionT1562.003Impair Defenses: Impair Command History Logging9Setting the HISTFILE environment variable (freebsd)f7308845-6da8-468e-99f2-4271f2f5bb67sh
464defense-evasionT1562.003Impair Defenses: Impair Command History Logging10Setting the HISTIGNORE environment variablef12acddb-7502-4ce6-a146-5b62c59592f1bash
465defense-evasionT1562.003Impair Defenses: Impair Command History Logging11Disable Windows Command Line Auditing using reg.exe1329d5ab-e10e-4e5e-93d1-4d907eb656e5command_prompt
466defense-evasionT1562.003Impair Defenses: Impair Command History Logging12Disable Windows Command Line Auditing using Powershell Cmdlet95f5c72f-6dfe-45f3-a8c1-d8faa07176fapowershell
467defense-evasionT1134.004Access Token Manipulation: Parent PID Spoofing1Parent PID Spoofing using PowerShell069258f4-2162-46e9-9a25-c9c6c56150d2powershell
468defense-evasionT1134.004Access Token Manipulation: Parent PID Spoofing2Parent PID Spoofing - Spawn from Current Process14920ebd-1d61-491a-85e0-fe98efe37f25powershell
469defense-evasionT1134.004Access Token Manipulation: Parent PID Spoofing3Parent PID Spoofing - Spawn from Specified Processcbbff285-9051-444a-9d17-c07cd2d230ebpowershell
470defense-evasionT1134.004Access Token Manipulation: Parent PID Spoofing4Parent PID Spoofing - Spawn from svchost.exee9f2b777-3123-430b-805d-5cedc66ab591powershell
471defense-evasionT1134.004Access Token Manipulation: Parent PID Spoofing5Parent PID Spoofing - Spawn from New Process2988133e-561c-4e42-a15f-6281e6a9b2dbpowershell
472defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File1Compiled HTML Help Local Payload5cb87818-0d7c-4469-b7ef-9224107aebe8command_prompt
473defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File2Compiled HTML Help Remote Payload0f8af516-9818-4172-922b-42986ef1e81dcommand_prompt
474defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File3Invoke CHM with default Shortcut Command Execution29d6f0d7-be63-4482-8827-ea77126c1ef7powershell
475defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File4Invoke CHM with InfoTech Storage Protocol Handlerb4094750-5fc7-4e8e-af12-b4e36bf5e7f6powershell
476defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File5Invoke CHM Simulate Double click5decef42-92b8-4a93-9eb2-877ddcb9401apowershell
477defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File6Invoke CHM with Script Engine and Help Topic4f83adda-f5ec-406d-b318-9773c9ca92e5powershell
478defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File7Invoke CHM Shortcut Command with ITS and Help Topic15756147-7470-4a83-87fb-bb5662526247powershell
479defense-evasionT1218.001Signed Binary Proxy Execution: Compiled HTML File8Decompile Local CHM File20cb05e0-1fa5-406d-92c1-84da4ba01813command_prompt
480defense-evasionT1070.005Indicator Removal on Host: Network Share Connection Removal1Add Network Share14c38f32-6509-46d8-ab43-d53e32d2b131command_prompt
481defense-evasionT1070.005Indicator Removal on Host: Network Share Connection Removal2Remove Network Share09210ad5-1ef2-4077-9ad3-7351e13e9222command_prompt
482defense-evasionT1070.005Indicator Removal on Host: Network Share Connection Removal3Remove Network Share PowerShell0512d214-9512-4d22-bde7-f37e058259b3powershell
483defense-evasionT1070.005Indicator Removal on Host: Network Share Connection Removal4Disable Administrative Share Creation at Startup99c657aa-ebeb-4179-a665-69288fdd12b8command_prompt
484defense-evasionT1070.005Indicator Removal on Host: Network Share Connection Removal5Remove Administrative Shares4299eff5-90f1-4446-b2f3-7f4f5cfd5d62command_prompt
485defense-evasionT1562.001Impair Defenses: Disable or Modify Tools1Disable syslog4ce786f8-e601-44b5-bfae-9ebb15a7d1c8sh
486defense-evasionT1562.001Impair Defenses: Disable or Modify Tools2Disable syslog (freebsd)db9de996-441e-4ae0-947b-61b6871e2fdfsh
487defense-evasionT1562.001Impair Defenses: Disable or Modify Tools3Disable Cb Responseae8943f7-0f8d-44de-962d-fbc2e2f03eb8sh
488defense-evasionT1562.001Impair Defenses: Disable or Modify Tools4Disable SELinuxfc225f36-9279-4c39-b3f9-5141ab74f8d8sh
489defense-evasionT1562.001Impair Defenses: Disable or Modify Tools5Stop Crowdstrike Falcon on Linux828a1278-81cc-4802-96ab-188bf29ca77dsh
490defense-evasionT1562.001Impair Defenses: Disable or Modify Tools6Disable Carbon Black Response8fba7766-2d11-4b4a-979a-1e3d9cc9a88csh
491defense-evasionT1562.001Impair Defenses: Disable or Modify Tools7Disable LittleSnitch62155dd8-bb3d-4f32-b31c-6532ff3ac6a3sh
492defense-evasionT1562.001Impair Defenses: Disable or Modify Tools8Disable OpenDNS Umbrella07f43b33-1e15-4e99-be70-bc094157c849sh
493defense-evasionT1562.001Impair Defenses: Disable or Modify Tools9Disable macOS Gatekeeper2a821573-fb3f-4e71-92c3-daac7432f053sh
494defense-evasionT1562.001Impair Defenses: Disable or Modify Tools10Stop and unload Crowdstrike Falcon on macOSb3e7510c-2d4c-4249-a33f-591a2bc83eefsh
495defense-evasionT1562.001Impair Defenses: Disable or Modify Tools11Unload Sysmon Filter Driver811b3e76-c41b-430c-ac0d-e2380bfaa164command_prompt
496defense-evasionT1562.001Impair Defenses: Disable or Modify Tools12Uninstall Sysmona316fb2e-5344-470d-91c1-23e15c374edccommand_prompt
497defense-evasionT1562.001Impair Defenses: Disable or Modify Tools13AMSI Bypass - AMSI InitFailed695eed40-e949-40e5-b306-b4031e4154bdpowershell
498defense-evasionT1562.001Impair Defenses: Disable or Modify Tools14AMSI Bypass - Remove AMSI Provider Reg Key13f09b91-c953-438e-845b-b585e51cac9bpowershell
499defense-evasionT1562.001Impair Defenses: Disable or Modify Tools15Disable Arbitrary Security Windows Servicea1230893-56ac-4c81-b644-2108e982f8f5command_prompt
500defense-evasionT1562.001Impair Defenses: Disable or Modify Tools16Tamper with Windows Defender ATP PowerShell6b8df440-51ec-4d53-bf83-899591c9b5d7powershell
501defense-evasionT1562.001Impair Defenses: Disable or Modify Tools17Tamper with Windows Defender Command Promptaa875ed4-8935-47e2-b2c5-6ec00ab220d2command_prompt
502defense-evasionT1562.001Impair Defenses: Disable or Modify Tools18Tamper with Windows Defender Registry1b3e0146-a1e5-4c5c-89fb-1bb2ffe8fc45powershell
503defense-evasionT1562.001Impair Defenses: Disable or Modify Tools19Disable Microsoft Office Security Features6f5fb61b-4e56-4a3d-a8c3-82e13686c6d7powershell
504defense-evasionT1562.001Impair Defenses: Disable or Modify Tools20Remove Windows Defender Definition Files3d47daaa-2f56-43e0-94cc-caf5d8d52a68command_prompt
505defense-evasionT1562.001Impair Defenses: Disable or Modify Tools21Stop and Remove Arbitrary Security Windows Serviceae753dda-0f15-4af6-a168-b9ba16143143powershell
506defense-evasionT1562.001Impair Defenses: Disable or Modify Tools22Uninstall Crowdstrike Falcon on Windowsb32b1ccf-f7c1-49bc-9ddd-7d7466a7b297powershell
507defense-evasionT1562.001Impair Defenses: Disable or Modify Tools23Tamper with Windows Defender Evade Scanning -Folder0b19f4ee-de90-4059-88cb-63c800c683edpowershell
508defense-evasionT1562.001Impair Defenses: Disable or Modify Tools24Tamper with Windows Defender Evade Scanning -Extension315f4be6-2240-4552-b3e1-d1047f5eeceapowershell
509defense-evasionT1562.001Impair Defenses: Disable or Modify Tools25Tamper with Windows Defender Evade Scanning -Processa123ce6a-3916-45d6-ba9c-7d4081315c27powershell
510defense-evasionT1562.001Impair Defenses: Disable or Modify Tools26office-365-Disable-AntiPhishRuleb9bbae2c-2ba6-4cf3-b452-8e8f908696f3powershell
511defense-evasionT1562.001Impair Defenses: Disable or Modify Tools27Disable Windows Defender with DISM871438ac-7d6e-432a-b27d-3e7db69faf58command_prompt
512defense-evasionT1562.001Impair Defenses: Disable or Modify Tools28Disable Defender Using NirSoft AdvancedRun81ce22fd-9612-4154-918e-8a1f285d214dpowershell
513defense-evasionT1562.001Impair Defenses: Disable or Modify Tools29Kill antimalware protected processes using Backstab24a12b91-05a7-4deb-8d7f-035fa98591bcpowershell
514defense-evasionT1562.001Impair Defenses: Disable or Modify Tools30WinPwn - Kill the event log services for stealth7869d7a3-3a30-4d2c-a5d2-f1cd9c34ce66powershell
515defense-evasionT1562.001Impair Defenses: Disable or Modify Tools31Tamper with Windows Defender ATP using Aliases - PowerShellc531aa6e-9c97-4b29-afee-9b7be6fc8a64powershell
516defense-evasionT1562.001Impair Defenses: Disable or Modify Tools32LockBit Black - Disable Privacy Settings Experience Using Registry -cmdd6d22332-d07d-498f-aea0-6139ecb7850ecommand_prompt
517defense-evasionT1562.001Impair Defenses: Disable or Modify Tools33LockBit Black - Use Registry Editor to turn on automatic logon -cmd9719d0e1-4fe0-4b2e-9a72-7ad3ee8ddc70command_prompt
518defense-evasionT1562.001Impair Defenses: Disable or Modify Tools34LockBit Black - Disable Privacy Settings Experience Using Registry -Powershelld8c57eaa-497a-4a08-961e-bd5efd7c9374powershell
519defense-evasionT1562.001Impair Defenses: Disable or Modify Tools35Lockbit Black - Use Registry Editor to turn on automatic logon -Powershell5e27f36d-5132-4537-b43b-413b0d5eec9apowershell
520defense-evasionT1562.001Impair Defenses: Disable or Modify Tools36Disable Windows Defender with PwSh Disable-WindowsOptionalFeaturef542ffd3-37b4-4528-837f-682874faa012powershell
521defense-evasionT1562.001Impair Defenses: Disable or Modify Tools37WMIC Tamper with Windows Defender Evade Scanning Folder59d386fc-3a4b-41b8-850d-9e3eee24dfe4command_prompt
522defense-evasionT1562.001Impair Defenses: Disable or Modify Tools38Delete Windows Defender Scheduled Tasks4b841aa1-0d05-4b32-bbe7-7564346e7c76command_prompt
523defense-evasionT1562.001Impair Defenses: Disable or Modify Tools39Clear History23b88394-091b-4968-a42d-fb8076992443sh
524defense-evasionT1562.001Impair Defenses: Disable or Modify Tools40Suspend History94f6a1c9-aae7-46a4-9083-2bb1f5768ec4sh
525defense-evasionT1562.001Impair Defenses: Disable or Modify Tools41Reboot Linux Host via Kernel System Request6d6d3154-1a52-4d1a-9d51-92ab8148b32esh
526defense-evasionT1562.001Impair Defenses: Disable or Modify Tools42Clear Pagging Cachef790927b-ea85-4a16-b7b2-7eb44176a510sh
527defense-evasionT1562.001Impair Defenses: Disable or Modify Tools43Disable Memory Swape74e4c63-6fde-4ad2-9ee8-21c3a1733114sh
528defense-evasionT1562.001Impair Defenses: Disable or Modify Tools44Disable Hypervisor-Enforced Code Integrity (HVCI)70bd71e6-eba4-4e00-92f7-617911dbe020powershell
529defense-evasionT1562.001Impair Defenses: Disable or Modify Tools45AMSI Bypass - Override AMSI via COM17538258-5699-4ff1-92d1-5ac9b0dc21f5command_prompt
530defense-evasionT1562.001Impair Defenses: Disable or Modify Tools46AWS - GuardDuty Suspension or Deletion11e65d8d-e7e4-470e-a3ff-82bc56ad938ebash
531defense-evasionT1562.001Impair Defenses: Disable or Modify Tools47Tamper with Defender ATP on Linux/MacOS40074085-dbc8-492b-90a3-11bcfc52fda8sh
532defense-evasionT1562.001Impair Defenses: Disable or Modify Tools48Tamper with Windows Defender Registry - Reg.exe1f6743da-6ecc-4a93-b03f-dc357e4b313fcommand_prompt
533defense-evasionT1562.001Impair Defenses: Disable or Modify Tools49Tamper with Windows Defender Registry - Powershella72cfef8-d252-48b3-b292-635d332625c3powershell
534defense-evasionT1562.001Impair Defenses: Disable or Modify Tools50ESXi - Disable Account Lockout Policy via PowerCLI091a6290-cd29-41cb-81ea-b12f133c66cbpowershell
535defense-evasionT1562.001Impair Defenses: Disable or Modify Tools51Delete Microsoft Defender ASR Rules - InTuneeea0a6c2-84e9-4e8c-a242-ac585d28d0d1powershell
536defense-evasionT1562.001Impair Defenses: Disable or Modify Tools52Delete Microsoft Defender ASR Rules - GPO0e7b8a4b-2ca5-4743-a9f9-96051abb6e50powershell
537defense-evasionT1562.001Impair Defenses: Disable or Modify Tools53AMSI Bypass - Create AMSIEnable Reg Key728eca7b-0444-4f6f-ac36-437e3d751dc0powershell
538defense-evasionT1562.001Impair Defenses: Disable or Modify Tools54Disable EventLog-Application Auto Logger Session Via Registry - Cmd653c6e17-14a2-4849-851d-f1c0cc8ea9abcommand_prompt
539defense-evasionT1562.001Impair Defenses: Disable or Modify Tools55Disable EventLog-Application Auto Logger Session Via Registry - PowerShellda86f239-9bd3-4e85-92ed-4a94ef111a1cpowershell
540defense-evasionT1562.001Impair Defenses: Disable or Modify Tools56Disable EventLog-Application ETW Provider Via Registry - Cmd1cac9b54-810e-495c-8aac-989e0076583bcommand_prompt
541defense-evasionT1562.001Impair Defenses: Disable or Modify Tools57Disable EventLog-Application ETW Provider Via Registry - PowerShell8f907648-1ebf-4276-b0f0-e2678ca474f0powershell
542defense-evasionT1562.001Impair Defenses: Disable or Modify Tools58Freeze PPL-protected process with EDR-Freezecbb2573a-a6ad-4c87-aef8-6e175598559bpowershell
543defense-evasionT1562.001Impair Defenses: Disable or Modify Tools59Disable ASLR Via sysctl parameters - Linuxac333fe1-ce2b-400b-a117-538634427439bash
544defense-evasionT1055.012Process Injection: Process Hollowing1Process Hollowing using PowerShell562427b4-39ef-4e8c-af88-463a78e70b9cpowershell
545defense-evasionT1055.012Process Injection: Process Hollowing2RunPE via VBA3ad4a037-1598-4136-837c-4027e4fa319bpowershell
546defense-evasionT1055.012Process Injection: Process Hollowing3Process Hollowing in Go using CreateProcessW WinAPIc8f98fe1-c89b-4c49-a7e3-d60ee4bc2f5apowershell
547defense-evasionT1055.012Process Injection: Process Hollowing4Process Hollowing in Go using CreateProcessW and CreatePipe WinAPIs (T1055.012)94903cc5-d462-498a-b919-b1e5ab155feepowershell
548defense-evasionT1027Obfuscated Files or Information1Decode base64 Data into Scriptf45df6be-2e1e-4136-a384-8f18ab3826fbsh
549defense-evasionT1027Obfuscated Files or Information2Execute base64-encoded PowerShella50d5a97-2531-499e-a1de-5544c74432c6powershell
550defense-evasionT1027Obfuscated Files or Information3Execute base64-encoded PowerShell from Windows Registry450e7218-7915-4be4-8b9b-464a49eafcecpowershell
551defense-evasionT1027Obfuscated Files or Information4Execution from Compressed Filef8c8a909-5f29-49ac-9244-413936ce6d1fcommand_prompt
552defense-evasionT1027Obfuscated Files or Information5DLP Evasion via Sensitive Data in VBA Macro over email129edb75-d7b8-42cd-a8ba-1f3db64ec4adpowershell
553defense-evasionT1027Obfuscated Files or Information6DLP Evasion via Sensitive Data in VBA Macro over HTTPe2d85e66-cb66-4ed7-93b1-833fc56c9319powershell
554defense-evasionT1027Obfuscated Files or Information7Obfuscated Command in PowerShell8b3f4ed6-077b-4bdd-891c-2d237f19410fpowershell
555defense-evasionT1027Obfuscated Files or Information8Obfuscated Command Line using special Unicode characterse68b945c-52d0-4dd9-a5e8-d173d70c448fmanual
556defense-evasionT1027Obfuscated Files or Information9Snake Malware Encrypted crmlog file7e47ee60-9dd1-4269-9c4f-97953b183268powershell
557defense-evasionT1027Obfuscated Files or Information10Execution from Compressed JScript Filefad04df1-5229-4185-b016-fb6010cd87accommand_prompt
558defense-evasionT1564.006Run Virtual Instance1Register Portable Virtualboxc59f246a-34f8-4e4d-9276-c295ef9ba0ddcommand_prompt
559defense-evasionT1564.006Run Virtual Instance2Create and start VirtualBox virtual machine88b81702-a1c0-49a9-95b2-2dd53d755767command_prompt
560defense-evasionT1564.006Run Virtual Instance3Create and start Hyper-V virtual machinefb8d4d7e-f5a4-481c-8867-febf13f8b6d3powershell
561defense-evasionT1134.005Access Token Manipulation: SID-History Injection1Injection SID-History with mimikatz6bef32e5-9456-4072-8f14-35566fb85401command_prompt
562defense-evasionT1218.010Signed Binary Proxy Execution: Regsvr321Regsvr32 local COM scriptlet execution449aa403-6aba-47ce-8a37-247d21ef0306command_prompt
563defense-evasionT1218.010Signed Binary Proxy Execution: Regsvr322Regsvr32 remote COM scriptlet executionc9d0c4ef-8a96-4794-a75b-3d3a5e6f2a36command_prompt
564defense-evasionT1218.010Signed Binary Proxy Execution: Regsvr323Regsvr32 local DLL execution08ffca73-9a3d-471a-aeb0-68b4aa3ab37bcommand_prompt
565defense-evasionT1218.010Signed Binary Proxy Execution: Regsvr324Regsvr32 Registering Non DLL1ae5ea1f-0a4e-4e54-b2f5-4ac328a7f421command_prompt
566defense-evasionT1218.010Signed Binary Proxy Execution: Regsvr325Regsvr32 Silent DLL Install Call DllRegisterServer9d71c492-ea2e-4c08-af16-c6994cdf029fcommand_prompt
567defense-evasionT1036.003Masquerading: Rename System Utilities1Masquerading as Windows LSASS process5ba5a3d1-cf3c-4499-968a-a93155d1f717command_prompt
568defense-evasionT1036.003Masquerading: Rename System Utilities2Masquerading as FreeBSD or Linux crond process.a315bfff-7a98-403b-b442-2ea1b255e556sh
569defense-evasionT1036.003Masquerading: Rename System Utilities3Masquerading - cscript.exe running as notepad.exe3a2a578b-0a01-46e4-92e3-62e2859b42f0command_prompt
570defense-evasionT1036.003Masquerading: Rename System Utilities4Masquerading - wscript.exe running as svchost.exe24136435-c91a-4ede-9da1-8b284a1c1a23command_prompt
571defense-evasionT1036.003Masquerading: Rename System Utilities5Masquerading - powershell.exe running as taskhostw.exeac9d0fc3-8aa8-4ab5-b11f-682cd63b40aacommand_prompt
572defense-evasionT1036.003Masquerading: Rename System Utilities6Masquerading - non-windows exe running as windows exebc15c13f-d121-4b1f-8c7d-28d95854d086powershell
573defense-evasionT1036.003Masquerading: Rename System Utilities7Masquerading - windows exe running as different windows exec3d24a39-2bfe-4c6a-b064-90cd73896cb0powershell
574defense-evasionT1036.003Masquerading: Rename System Utilities8Malicious process Masquerading as LSM.exe83810c46-f45e-4485-9ab6-8ed0e9e6ed7fcommand_prompt
575defense-evasionT1574.009Hijack Execution Flow: Path Interception by Unquoted Path1Execution of program.exe as service with unquoted service path2770dea7-c50f-457b-84c4-c40a47460d9fcommand_prompt
576defense-evasionT1218.009Signed Binary Proxy Execution: Regsvcs/Regasm1Regasm Uninstall Method Call Test71bfbfac-60b1-4fc0-ac8b-2cedbbdcb112command_prompt
577defense-evasionT1218.009Signed Binary Proxy Execution: Regsvcs/Regasm2Regsvcs Uninstall Method Call Testfd3c1c6a-02d2-4b72-82d9-71c527abb126powershell
578defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate1Install root CA on CentOS/RHEL9c096ec4-fd42-419d-a762-d64cc950627esh
579defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate2Install root CA on FreeBSDf4568003-1438-44ab-a234-b3252ea7e7a3sh
580defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate3Install root CA on Debian/Ubuntu53bcf8a0-1549-4b85-b919-010c56d724ffsh
581defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate4Install root CA on macOScc4a0b8c-426f-40ff-9426-4e10e5bf4c49sh
582defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate5Install root CA on Windows76f49d86-5eb1-461a-a032-a480f86652f1powershell
583defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate6Install root CA on Windows with certutil5fdb1a7a-a93c-4fbe-aa29-ddd9ef94ed1fpowershell
584defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate7Add Root Certificate to CurrentUser Certificate Storeca20a3f1-42b5-4e21-ad3f-1049199ec2e0powershell
585defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery1Compile After Delivery using csc.exeffcdbd6a-b0e8-487d-927a-09127fe9a206command_prompt
586defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery2Dynamic C# Compile453614d8-3ba6-4147-acc0-7ec4b3e1faefpowershell
587defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery3C compiled0377aa6-850a-42b2-95f0-de558d80be57sh
588defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery4CC compileda97bb11-d6d0-4fc1-b445-e443d1346efesh
589defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery5Go compile78bd3fa7-773c-449e-a978-dc1f1500bc52sh
590defense-evasionT1197BITS Jobs1Bitsadmin Download (cmd)3c73d728-75fb-4180-a12f-6712864d7421command_prompt
591defense-evasionT1197BITS Jobs2Bitsadmin Download (PowerShell)f63b8bc4-07e5-4112-acba-56f646f3f0bcpowershell
592defense-evasionT1197BITS Jobs3Persist, Download, & Execute62a06ec5-5754-47d2-bcfc-123d8314c6aecommand_prompt
593defense-evasionT1197BITS Jobs4Bits download using desktopimgdownldr.exe (cmd)afb5e09e-e385-4dee-9a94-6ee60979d114command_prompt
594defense-evasionT1127.001Trusted Developer Utilities Proxy Execution: MSBuild1MSBuild Bypass Using Inline Tasks (C#)58742c0f-cb01-44cd-a60b-fb26e8871c93command_prompt
595defense-evasionT1127.001Trusted Developer Utilities Proxy Execution: MSBuild2MSBuild Bypass Using Inline Tasks (VB)ab042179-c0c5-402f-9bc8-42741f5ce359command_prompt
596defense-evasionT1562.008Impair Defenses: Disable Cloud Logs1AWS - CloudTrail Changes9c10dc6b-20bd-403a-8e67-50ef7d07ed4esh
597defense-evasionT1562.008Impair Defenses: Disable Cloud Logs2Azure - Eventhub Deletion5e09bed0-7d33-453b-9bf3-caea32bff719powershell
598defense-evasionT1562.008Impair Defenses: Disable Cloud Logs3Office 365 - Exchange Audit Log Disabled1ee572f3-056c-4632-a7fc-7e7c42b1543cpowershell
599defense-evasionT1562.008Impair Defenses: Disable Cloud Logs4AWS - Disable CloudTrail Logging Through Event Selectors using Stratusa27418de-bdce-4ebd-b655-38f11142bf0csh
600defense-evasionT1562.008Impair Defenses: Disable Cloud Logs5AWS - CloudTrail Logs Impairment Through S3 Lifecycle Rule using Stratus22d89a2f-d475-4895-b2d4-68626d49c029sh
601defense-evasionT1562.008Impair Defenses: Disable Cloud Logs6AWS - Remove VPC Flow Logs using Stratus93c150f5-ad7b-4ee3-8992-df06dec2ac79sh
602defense-evasionT1562.008Impair Defenses: Disable Cloud Logs7AWS - CloudWatch Log Group Deletes89422c87-b57b-4a04-a8ca-802bb9d06121sh
603defense-evasionT1562.008Impair Defenses: Disable Cloud Logs8AWS CloudWatch Log Stream Deletes33ca84bc-4259-4943-bd36-4655dc420932sh
604defense-evasionT1562.008Impair Defenses: Disable Cloud Logs9Office 365 - Set Audit Bypass For a Mailboxc9a2f6fe-7197-488c-af6d-10c782121ca6powershell
605defense-evasionT1562.008Impair Defenses: Disable Cloud Logs10GCP - Delete Activity Event Logd56152ec-01d9-42a2-877c-aac1f6ebe8e6sh
606defense-evasionT1564.003Hide Artifacts: Hidden Window1Hidden Windowf151ee37-9e2b-47e6-80e4-550b9f999b7apowershell
607defense-evasionT1564.003Hide Artifacts: Hidden Window2Headless Browser Accessing Mockbin0ad9ab92-c48c-4f08-9b20-9633277c4646command_prompt
608defense-evasionT1564.003Hide Artifacts: Hidden Window3Hidden Window-Conhost Execution5510d22f-2595-4911-8456-4d630c978616powershell
609defense-evasionT1027.006HTML Smuggling1HTML Smuggling Remote Payload30cbeda4-08d9-42f1-8685-197fad677734powershell
610defense-evasionT1070.004Indicator Removal on Host: File Deletion1Delete a single file - FreeBSD/Linux/macOS562d737f-2fc6-4b09-8c2a-7f8ff0828480sh
611defense-evasionT1070.004Indicator Removal on Host: File Deletion2Delete an entire folder - FreeBSD/Linux/macOSa415f17e-ce8d-4ce2-a8b4-83b674e7017esh
612defense-evasionT1070.004Indicator Removal on Host: File Deletion3Overwrite and delete a file with shred039b4b10-2900-404b-b67f-4b6d49aa6499sh
613defense-evasionT1070.004Indicator Removal on Host: File Deletion4Delete a single file - Windows cmd861ea0b4-708a-4d17-848d-186c9c7f17e3command_prompt
614defense-evasionT1070.004Indicator Removal on Host: File Deletion5Delete an entire folder - Windows cmdded937c4-2add-42f7-9c2c-c742b7a98698command_prompt
615defense-evasionT1070.004Indicator Removal on Host: File Deletion6Delete a single file - Windows PowerShell9dee89bd-9a98-4c4f-9e2d-4256690b0e72powershell
616defense-evasionT1070.004Indicator Removal on Host: File Deletion7Delete an entire folder - Windows PowerShelledd779e4-a509-4cba-8dfa-a112543dbfb1powershell
617defense-evasionT1070.004Indicator Removal on Host: File Deletion8Delete Filesystem - Linuxf3aa95fe-4f10-4485-ad26-abf22a764c52sh
618defense-evasionT1070.004Indicator Removal on Host: File Deletion9Delete Prefetch File36f96049-0ad7-4a5f-8418-460acaeb92fbpowershell
619defense-evasionT1070.004Indicator Removal on Host: File Deletion10Delete TeamViewer Log Files69f50a5f-967c-4327-a5bb-e1a9a9983785powershell
620defense-evasionT1070.004Indicator Removal on Host: File Deletion11Clears Recycle bin via rdf723d13d-48dc-4317-9990-cf43a9ac0bf2command_prompt
621defense-evasionT1221Template Injection1WINWORD Remote Template Injection1489e08a-82c7-44ee-b769-51b72d03521dcommand_prompt
622defense-evasionT1027.002Obfuscated Files or Information: Software Packing1Binary simply packed by UPX (linux)11c46cd8-e471-450e-acb8-52a1216ae6a4sh
623defense-evasionT1027.002Obfuscated Files or Information: Software Packing2Binary packed by UPX, with modified headers (linux)f06197f8-ff46-48c2-a0c6-afc1b50665e1sh
624defense-evasionT1027.002Obfuscated Files or Information: Software Packing3Binary simply packed by UPXb16ef901-00bb-4dda-b4fc-a04db5067e20sh
625defense-evasionT1027.002Obfuscated Files or Information: Software Packing4Binary packed by UPX, with modified headers4d46e16b-5765-4046-9f25-a600d3e65e4dsh
626defense-evasionT1622Debugger Evasion1Detect a Debugger Presence in the Machine58bd8c8d-3a1a-4467-a69c-439c75469b07powershell
627defense-evasionT1036.006Masquerading: Space after Filename1Space After Filename (Manual)89a7dd26-e510-4c9f-9b15-f3bae333360fmanual
628defense-evasionT1036.006Masquerading: Space after Filename2Space After Filenameb95ce2eb-a093-4cd8-938d-5258cef656eash
629defense-evasionT1550.002Use Alternate Authentication Material: Pass the Hash1Mimikatz Pass the Hashec23cef9-27d9-46e4-a68d-6f75f7b86908command_prompt
630defense-evasionT1550.002Use Alternate Authentication Material: Pass the Hash2crackmapexec Pass the Hasheb05b028-16c8-4ad8-adea-6f5b219da9a9command_prompt
631defense-evasionT1550.002Use Alternate Authentication Material: Pass the Hash3Invoke-WMIExec Pass the Hashf8757545-b00a-4e4e-8cfb-8cfb961ee713powershell
632defense-evasionT1027.007Obfuscated Files or Information: Dynamic API Resolution1Dynamic API Resolution-Ninja-syscall578025d5-faa9-4f6d-8390-aae739d507e1powershell
633defense-evasionT1055.015Process Injection: ListPlanting1Process injection ListPlanting4f3c7502-b111-4dfe-8a6e-529307891a59powershell
634defense-evasionT1220XSL Script Processing1MSXSL Bypass using local filesca23bfb2-023f-49c5-8802-e66997de462dcommand_prompt
635defense-evasionT1220XSL Script Processing2MSXSL Bypass using remote filesa7c3ab07-52fb-49c8-ab6d-e9c6d4a0a985command_prompt
636defense-evasionT1220XSL Script Processing3WMIC bypass using local XSL file1b237334-3e21-4a0c-8178-b8c996124988command_prompt
637defense-evasionT1220XSL Script Processing4WMIC bypass using remote XSL file7f5be499-33be-4129-a560-66021f379b9bcommand_prompt
638defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories1Create a hidden file in a hidden directory61a782e5-9a19-40b5-8ba4-69a4b9f3d7besh
639defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories2Mac Hidden filecddb9098-3b47-4e01-9d3b-6f5f323288a9sh
640defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories3Create Windows System File with Attribf70974c8-c094-4574-b542-2c545af95a32command_prompt
641defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories4Create Windows Hidden File with Attribdadb792e-4358-4d8d-9207-b771faa0daa5command_prompt
642defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories5Hidden files3b7015f2-3144-4205-b799-b05580621379sh
643defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories6Hide a Directoryb115ecaf-3b24-4ed2-aefe-2fcb9db913d3sh
644defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories7Show all hidden files9a1ec7da-b892-449f-ad68-67066d04380csh
645defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories8Hide Files Through Registryf650456b-bd49-4bc1-ae9d-271b5b9581e7command_prompt
646defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories9Create Windows Hidden File with powershell7f66d539-4fbe-4cfa-9a56-4a2bf660c58apowershell
647defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories10Create Windows System File with powershelld380c318-0b34-45cb-9dad-828c11891e43powershell
648defense-evasionT1578.001Modify Cloud Compute Infrastructure: Create Snapshot1AWS - Create Snapshot from EBS Volumea3c09662-85bb-4ea8-b15b-6dc8a844e236sh
649defense-evasionT1578.001Modify Cloud Compute Infrastructure: Create Snapshot2Azure - Create Snapshot from Managed Disk89e69b4b-3458-4ec6-b819-b3008debc1bcsh
650defense-evasionT1578.001Modify Cloud Compute Infrastructure: Create Snapshot3GCP - Create Snapshot from Persistent Diske6fbc036-91e7-4ad3-b9cb-f7210f40dd5dsh
651defense-evasionT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
652defense-evasionT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
653defense-evasionT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
654defense-evasionT1564.004Hide Artifacts: NTFS File Attributes1Alternate Data Streams (ADS)8822c3b0-d9f9-4daf-a043-49f4602364f4command_prompt
655defense-evasionT1564.004Hide Artifacts: NTFS File Attributes2Store file in Alternate Data Stream (ADS)2ab75061-f5d5-4c1a-b666-ba2a50df5b02powershell
656defense-evasionT1564.004Hide Artifacts: NTFS File Attributes3Create ADS command prompt17e7637a-ddaf-4a82-8622-377e20de8fdbcommand_prompt
657defense-evasionT1564.004Hide Artifacts: NTFS File Attributes4Create ADS PowerShell0045ea16-ed3c-4d4c-a9ee-15e44d1560d1powershell
658defense-evasionT1564.004Hide Artifacts: NTFS File Attributes5Create Hidden Directory via $index_allocation3e6791e7-232c-481c-a680-a52f86b83fdfcommand_prompt
659defense-evasionT1055.001Process Injection: Dynamic-link Library Injection1Process Injection via mavinject.exe74496461-11a1-4982-b439-4d87a550d254powershell
660defense-evasionT1055.001Process Injection: Dynamic-link Library Injection2WinPwn - Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique8b56f787-73d9-4f1d-87e8-d07e89cbc7f5powershell
661defense-evasionT1216Signed Script Proxy Execution1SyncAppvPublishingServer Signed Script PowerShell Command Execution275d963d-3f36-476c-8bef-a2a3960ee6ebcommand_prompt
662defense-evasionT1216Signed Script Proxy Execution2manage-bde.wsf Signed Script Command Execution2a8f2d3c-3dec-4262-99dd-150cb2a4d63acommand_prompt
663defense-evasionT1078.003Valid Accounts: Local Accounts1Create local account with admin privilegesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
664defense-evasionT1078.003Valid Accounts: Local Accounts2Create local account with admin privileges - MacOSf1275566-1c26-4b66-83e3-7f9f7f964daabash
665defense-evasionT1078.003Valid Accounts: Local Accounts3Create local account with admin privileges using sysadminctl utility - MacOS191db57d-091a-47d5-99f3-97fde53de505bash
666defense-evasionT1078.003Valid Accounts: Local Accounts4Enable root account using dsenableroot utility - MacOS20b40ea9-0e17-4155-b8e6-244911a678acbash
667defense-evasionT1078.003Valid Accounts: Local Accounts5Add a new/existing user to the admin group using dseditgroup utility - macOS433842ba-e796-4fd5-a14f-95d3a1970875bash
668defense-evasionT1078.003Valid Accounts: Local Accounts6WinPwn - Loot local Credentials - powerhell kittie9e9fd066-453d-442f-88c1-ad7911d32912powershell
669defense-evasionT1078.003Valid Accounts: Local Accounts7WinPwn - Loot local Credentials - Safetykatze9fdb899-a980-4ba4-934b-486ad22e22f4powershell
670defense-evasionT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
671defense-evasionT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
672defense-evasionT1078.003Valid Accounts: Local Accounts10Reactivate a locked/expired account (FreeBSD)09e3380a-fae5-4255-8b19-9950be0252cfsh
673defense-evasionT1078.003Valid Accounts: Local Accounts11Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
674defense-evasionT1078.003Valid Accounts: Local Accounts12Login as nobody (freebsd)16f6374f-7600-459a-9b16-6a88fd96d310sh
675defense-evasionT1078.003Valid Accounts: Local Accounts13Use PsExec to elevate to NT Authority\SYSTEM account6904235f-0f55-4039-8aed-41c300ff7733command_prompt
676defense-evasionT1127Trusted Developer Utilities Proxy Execution1Lolbin Jsc.exe compile javascript to exe1ec1c269-d6bd-49e7-b71b-a461f7fa7bc8command_prompt
677defense-evasionT1127Trusted Developer Utilities Proxy Execution2Lolbin Jsc.exe compile javascript to dll3fc9fea2-871d-414d-8ef6-02e85e322b80command_prompt
678defense-evasionT1574.012Hijack Execution Flow: COR_PROFILER1User scope COR_PROFILER9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5apowershell
679defense-evasionT1574.012Hijack Execution Flow: COR_PROFILER2System Scope COR_PROFILERf373b482-48c8-4ce4-85ed-d40c8b3f7310powershell
680defense-evasionT1574.012Hijack Execution Flow: COR_PROFILER3Registry-free process scope COR_PROFILER79d57242-bbef-41db-b301-9d01d9f6e817powershell
681privilege-escalationT1055.011Process Injection: Extra Window Memory Injection1Process Injection via Extra Window Memory (EWM) x64 executable93ca40d2-336c-446d-bcef-87f14d438018powershell
682privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task1Scheduled Task Startup Scriptfec27f65-db86-4c2d-b66c-61945aee87c2command_prompt
683privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task2Scheduled task Local42f53695-ad4a-4546-abb6-7d837f644a71command_prompt
684privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task3Scheduled task Remote2e5eac3e-327b-4a88-a0c0-c4057039a8ddcommand_prompt
685privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task4Powershell Cmdlet Scheduled Taskaf9fd58f-c4ac-4bf2-a9ba-224b71ff25fdpowershell
686privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task5Task Scheduler via VBAecd3fa21-7792-41a2-8726-2c5c673414d3powershell
687privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task6WMI Invoke-CimMethod Scheduled Taske16b3b75-dc9e-4cde-a23d-dfa2d0507b3bpowershell
688privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task7Scheduled Task Executing Base64 Encoded Commands From Registrye895677d-4f06-49ab-91b6-ae3742d0a2bacommand_prompt
689privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task8Import XML Schedule Task with Hidden Attributecd925593-fbb4-486d-8def-16cbdf944bf4powershell
690privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task9PowerShell Modify A Scheduled Taskdda6fc7b-c9a6-4c18-b98d-95ec6542af6dpowershell
691privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task10Scheduled Task ("Ghost Task") via Registry Key Manipulation704333ca-cc12-4bcf-9916-101844881f54command_prompt
692privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task11Scheduled Task Persistence via CompMgmt.msc8fcfa3d5-ea7d-4e1c-bd3e-3c4ed315b7d2command_prompt
693privilege-escalationT1053.005Scheduled Task/Job: Scheduled Task12Scheduled Task Persistence via Eventviewer.msc02124c37-767e-4b76-9383-c9fc366d9d4ccommand_prompt
694privilege-escalationT1546.013Event Triggered Execution: PowerShell Profile1Append malicious start-process cmdlet090e5aa5-32b6-473b-a49b-21e843a56896powershell
695privilege-escalationT1053.007Kubernetes Cronjob1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
696privilege-escalationT1053.007Kubernetes Cronjob2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
697privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control1Bypass UAC using Event Viewer (cmd)5073adf8-9a50-4bd9-b298-a9bd2ead8af9command_prompt
698privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control2Bypass UAC using Event Viewer (PowerShell)a6ce9acf-842a-4af6-8f79-539be7608e2bpowershell
699privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control3Bypass UAC using Fodhelper58f641ea-12e3-499a-b684-44dee46bd182command_prompt
700privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control4Bypass UAC using Fodhelper - PowerShell3f627297-6c38-4e7d-a278-fc2563eaaeaapowershell
701privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control5Bypass UAC using ComputerDefaults (PowerShell)3c51abf2-44bf-42d8-9111-dc96ff66750fpowershell
702privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control6Bypass UAC by Mocking Trusted Directoriesf7a35090-6f7f-4f64-bb47-d657bf5b10c1command_prompt
703privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control7Bypass UAC using sdclt DelegateExecute3be891eb-4608-4173-87e8-78b494c029b7powershell
704privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control8Disable UAC using reg.exe9e8af564-53ec-407e-aaa8-3cb20c3af7f9command_prompt
705privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control9Bypass UAC using SilentCleanup task28104f8a-4ff1-4582-bcf6-699dce156608command_prompt
706privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control10UACME Bypass Method 238ceab7a2-563a-47d2-b5ba-0995211128d7command_prompt
707privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control11UACME Bypass Method 31b0f76240-9f33-4d34-90e8-3a7d501beb15command_prompt
708privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control12UACME Bypass Method 33e514bb03-f71c-4b22-9092-9f961ec6fb03command_prompt
709privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control13UACME Bypass Method 34695b2dac-423e-448e-b6ef-5b88e93011d6command_prompt
710privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control14UACME Bypass Method 3956163687-081f-47da-bb9c-7b231c5585cfcommand_prompt
711privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control15UACME Bypass Method 56235ec031-cd2d-465d-a7ae-68bab281e80ecommand_prompt
712privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control16UACME Bypass Method 59dfb1b667-4bb8-4a63-a85e-29936ea75f29command_prompt
713privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control17UACME Bypass Method 617825b576-744c-4555-856d-caf3460dc236command_prompt
714privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control18WinPwn - UAC Magic964d8bf8-37bc-4fd3-ba36-ad13761ebbccpowershell
715privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control19WinPwn - UAC Bypass ccmstp techniquef3c145f9-3c8d-422c-bd99-296a17a8f567powershell
716privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control20WinPwn - UAC Bypass DiskCleanup technique1ed67900-66cd-4b09-b546-2a0ef4431a0cpowershell
717privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control21WinPwn - UAC Bypass DccwBypassUAC technique2b61977b-ae2d-4ae4-89cb-5c36c89586bepowershell
718privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control22Disable UAC admin consent prompt via ConsentPromptBehaviorAdmin registry key251c5936-569f-42f4-9ac2-87a173b9e9b8powershell
719privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control23UAC Bypass with WSReset Registry Modification3b96673f-9c92-40f1-8a3e-ca060846f8d9powershell
720privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control24Disable UAC - Switch to the secure desktop when prompting for elevation via registry key85f3a526-4cfa-4fe7-98c1-dea99be025c7powershell
721privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control25Disable UAC notification via registry keys160a7c77-b00e-4111-9e45-7c2a44eda3fdcommand_prompt
722privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control26Disable ConsentPromptBehaviorAdmin via registry keysa768aaa2-2442-475c-8990-69cf33af0f4ecommand_prompt
723privilege-escalationT1548.002Abuse Elevation Control Mechanism: Bypass User Account Control27UAC bypassed by Utilizing ProgIDs registry.b6f4645c-34ea-4c7c-98f2-d5a2747efb08command_prompt
724privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
725privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching2Sudo usage (freebsd)2bf9a018-4664-438a-b435-cc6f8c6f71b1sh
726privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching3Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
727privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching4Unlimited sudo cache timeout (freebsd)a83ad6e8-6f24-4d7f-8f44-75f8ab742991sh
728privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching5Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
729privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching6Disable tty_tickets for sudo caching (freebsd)4df6a0fe-2bdd-4be8-8618-a6a19654a57ash
730privilege-escalationT1574.011Hijack Execution Flow: Services Registry Permissions Weakness1Service Registry Permissions Weaknessf7536d63-7fd4-466f-89da-7e48d550752apowershell
731privilege-escalationT1574.011Hijack Execution Flow: Services Registry Permissions Weakness2Service ImagePath Change with reg.exef38e9eea-e1d7-4ba6-b716-584791963827command_prompt
732privilege-escalationT1547Boot or Logon Autostart Execution1Add a drivercb01b3da-b0e7-4e24-bf6d-de5223526785command_prompt
733privilege-escalationT1547Boot or Logon Autostart Execution2Driver Installation Using pnputil.exe5cb0b071-8a5a-412f-839d-116beb2ed9f7powershell
734privilege-escalationT1547Boot or Logon Autostart Execution3Leverage Virtual Channels to execute custom DLL during successful RDP sessionfdd45306-74f6-4ade-9a97-0a4895961228command_prompt
735privilege-escalationT1547.014Active Setup1HKLM - Add atomic_test key to launch executable as part of user setupdeff4586-0517-49c2-981d-bbea24d48d71powershell
736privilege-escalationT1547.014Active Setup2HKLM - Add malicious StubPath value to existing Active Setup Entry39e417dd-4fed-4d9c-ae3a-ba433b4d0e9apowershell
737privilege-escalationT1547.014Active Setup3HKLM - re-execute 'Internet Explorer Core Fonts' StubPath payload by decreasing version number04d55cef-f283-40ba-ae2a-316bc3b5e78cpowershell
738privilege-escalationT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
739privilege-escalationT1543.003Create or Modify System Process: Windows Service1Modify Fax service to run PowerShelled366cde-7d12-49df-a833-671904770b9fcommand_prompt
740privilege-escalationT1543.003Create or Modify System Process: Windows Service2Service Installation CMD981e2942-e433-44e9-afc1-8c957a1496b6command_prompt
741privilege-escalationT1543.003Create or Modify System Process: Windows Service3Service Installation PowerShell491a4af6-a521-4b74-b23b-f7b3f1ee9e77powershell
742privilege-escalationT1543.003Create or Modify System Process: Windows Service4TinyTurla backdoor service w64timeef0581fd-528e-4662-87bc-4c2affb86940command_prompt
743privilege-escalationT1543.003Create or Modify System Process: Windows Service5Remote Service Installation CMDfb4151a2-db33-4f8c-b7f8-78ea8790f961command_prompt
744privilege-escalationT1543.003Create or Modify System Process: Windows Service6Modify Service to Run Arbitrary Binary (Powershell)1f896ce4-8070-4959-8a25-2658856a70c9powershell
745privilege-escalationT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75sh
746privilege-escalationT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
747privilege-escalationT1053.003Scheduled Task/Job: Cron3Cron - Add script to /etc/cron.d folder078e69eb-d9fb-450e-b9d0-2e118217c846sh
748privilege-escalationT1053.003Scheduled Task/Job: Cron4Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
749privilege-escalationT1098.003Account Manipulation: Additional Cloud Roles1Azure AD - Add Company Administrator Role to a user4d77f913-56f5-4a14-b4b1-bf7bb24298adpowershell
750privilege-escalationT1098.003Account Manipulation: Additional Cloud Roles2Simulate - Post BEC persistence via user password reset followed by user added to company administrator role14f3af20-61f1-45b8-ad31-4637815f3f44powershell
751privilege-escalationT1547.012Boot or Logon Autostart Execution: Print Processors1Print Processorsf7d38f47-c61b-47cc-a59d-fc0368f47ed0powershell
752privilege-escalationT1574.001Hijack Execution Flow: DLL1DLL Search Order Hijacking - amsi.dll8549ad4b-b5df-4a2d-a3d7-2aee9e7052a3command_prompt
753privilege-escalationT1574.001Hijack Execution Flow: DLL2Phantom Dll Hijacking - WinAppXRT.dll46ed938b-c617-429a-88dc-d49b5c9ffedbcommand_prompt
754privilege-escalationT1574.001Hijack Execution Flow: DLL3Phantom Dll Hijacking - ualapi.dll5898902d-c5ad-479a-8545-6f5ab3cfc87fcommand_prompt
755privilege-escalationT1574.001Hijack Execution Flow: DLL4DLL Side-Loading using the Notepad++ GUP.exe binary65526037-7079-44a9-bda1-2cb624838040command_prompt
756privilege-escalationT1574.001Hijack Execution Flow: DLL5DLL Side-Loading using the dotnet startup hook environment variabled322cdd7-7d60-46e3-9111-648848da7c02command_prompt
757privilege-escalationT1574.001Hijack Execution Flow: DLL6DLL Search Order Hijacking,DLL Sideloading Of KeyScramblerIE.DLL Via KeyScrambler.EXEc095ad8e-4469-4d33-be9d-6f6d1fb21585powershell
758privilege-escalationT1055.003Thread Execution Hijacking1Thread Execution Hijacking578025d5-faa9-4f6d-8390-aae527d503e1powershell
759privilege-escalationT1546.011Event Triggered Execution: Application Shimming1Application Shim Installation9ab27e22-ee62-4211-962b-d36d9a0e6a18command_prompt
760privilege-escalationT1546.011Event Triggered Execution: Application Shimming2New shim database files created in the default shim database directoryaefd6866-d753-431f-a7a4-215ca7e3f13dpowershell
761privilege-escalationT1546.011Event Triggered Execution: Application Shimming3Registry key creation and/or modification events for SDB9b6a06f9-ab5e-4e8d-8289-1df4289db02fpowershell
762privilege-escalationT1547.010Boot or Logon Autostart Execution: Port Monitors1Add Port Monitor persistence in Registryd34ef297-f178-4462-871e-9ce618d44e50command_prompt
763privilege-escalationT1037.002Boot or Logon Initialization Scripts: Logon Script (Mac)1Logon Scripts - Macf047c7de-a2d9-406e-a62b-12a09d9516f4manual
764privilege-escalationT1055Process Injection1Shellcode execution via VBA1c91e740-1729-4329-b779-feba6e71d048powershell
765privilege-escalationT1055Process Injection2Remote Process Injection in LSASS via mimikatz3203ad24-168e-4bec-be36-f79b13ef8a83command_prompt
766privilege-escalationT1055Process Injection3Section View Injectionc6952f41-6cf0-450a-b352-2ca8dae7c178powershell
767privilege-escalationT1055Process Injection4Dirty Vanity process Injection49543237-25db-497b-90df-d0a0a6e8fe2cpowershell
768privilege-escalationT1055Process Injection5Read-Write-Execute process Injection0128e48e-8c1a-433a-a11a-a5387384f1e1powershell
769privilege-escalationT1055Process Injection6Process Injection with Go using UuidFromStringA WinAPI2315ce15-38b6-46ac-a3eb-5e21abef2545powershell
770privilege-escalationT1055Process Injection7Process Injection with Go using EtwpCreateEtwThread WinAPI7362ecef-6461-402e-8716-7410e1566400powershell
771privilege-escalationT1055Process Injection8Remote Process Injection with Go using RtlCreateUserThread WinAPIa0c1725f-abcd-40d6-baac-020f3cf94ecdpowershell
772privilege-escalationT1055Process Injection9Remote Process Injection with Go using CreateRemoteThread WinAPI69534efc-d5f5-4550-89e6-12c6457b9eddpowershell
773privilege-escalationT1055Process Injection10Remote Process Injection with Go using CreateRemoteThread WinAPI (Natively)2a4ab5c1-97ad-4d6d-b5d3-13f3a6c94e39powershell
774privilege-escalationT1055Process Injection11Process Injection with Go using CreateThread WinAPI2871ed59-3837-4a52-9107-99500ebc87cbpowershell
775privilege-escalationT1055Process Injection12Process Injection with Go using CreateThread WinAPI (Natively)2a3c7035-d14f-467a-af94-933e49fe6786powershell
776privilege-escalationT1055Process Injection13UUID custom process Injection0128e48e-8c1a-433a-a11a-a5304734f1e1powershell
777privilege-escalationT1611Escape to Host1Deploy container using nsenter container escape0b2f9520-a17a-4671-9dba-3bd034099fffsh
778privilege-escalationT1611Escape to Host2Mount host filesystem to escape privileged Docker container6c499943-b098-4bc6-8d38-0956fc182984sh
779privilege-escalationT1611Escape to Host3Privilege Escalation via Docker Volume Mapping39fab1bc-fcb9-406f-bc2e-fe03e42ff0e4sh
780privilege-escalationT1547.009Boot or Logon Autostart Execution: Shortcut Modification1Shortcut Modificationce4fc678-364f-4282-af16-2fb4c78005cecommand_prompt
781privilege-escalationT1547.009Boot or Logon Autostart Execution: Shortcut Modification2Create shortcut to cmd in startup folderscfdc954d-4bb0-4027-875b-a1893ce406f2powershell
782privilege-escalationT1547.005Boot or Logon Autostart Execution: Security Support Provider1Modify HKLM:\System\CurrentControlSet\Control\Lsa Security Support Provider configuration in registryafdfd7e3-8a0b-409f-85f7-886fdf249c9epowershell
783privilege-escalationT1547.005Boot or Logon Autostart Execution: Security Support Provider2Modify HKLM:\System\CurrentControlSet\Control\Lsa\OSConfig Security Support Provider configuration in registryde3f8e74-3351-4fdb-a442-265dbf231738powershell
784privilege-escalationT1543.004Create or Modify System Process: Launch Daemon1Launch Daemon03ab8df5-3a6b-4417-b6bd-bb7a5cfd74cfbash
785privilege-escalationT1574.008Hijack Execution Flow: Path Interception by Search Order Hijacking1powerShell Persistence via hijacking default modules - Get-Variable.exe1561de08-0b4b-498e-8261-e922f3494aaepowershell
786privilege-escalationT1484.001Domain Policy Modification: Group Policy Modification1LockBit Black - Modify Group policy settings -cmd9ab80952-74ee-43da-a98c-1e740a985f28command_prompt
787privilege-escalationT1484.001Domain Policy Modification: Group Policy Modification2LockBit Black - Modify Group policy settings -Powershellb51eae65-5441-4789-b8e8-64783c26c1d1powershell
788privilege-escalationT1078.001Valid Accounts: Default Accounts1Enable Guest account with RDP capability and admin privileges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
789privilege-escalationT1078.001Valid Accounts: Default Accounts2Activate Guest Accountaa6cb8c4-b582-4f8e-b677-37733914abdacommand_prompt
790privilege-escalationT1078.001Valid Accounts: Default Accounts3Enable Guest Account on macOS0315bdff-4178-47e9-81e4-f31a6d23f7e4sh
791privilege-escalationT1547.003Time Providers1Create a new time providerdf1efab7-bc6d-4b88-8be9-91f55ae017aapowershell
792privilege-escalationT1547.003Time Providers2Edit an existing time provider29e0afca-8d1d-471a-8d34-25512fc48315powershell
793privilege-escalationT1546.005Event Triggered Execution: Trap1Trap EXITa74b2e07-5952-4c03-8b56-56274b076b61sh
794privilege-escalationT1546.005Event Triggered Execution: Trap2Trap EXIT (freebsd)be1a5d70-6865-44aa-ab50-42244c9fd16fsh
795privilege-escalationT1546.005Event Triggered Execution: Trap3Trap SIGINTa547d1ba-1d7a-4cc5-a9cb-8d65e8809636sh
796privilege-escalationT1546.005Event Triggered Execution: Trap4Trap SIGINT (freebsd)ade10242-1eac-43df-8412-be0d4c704adash
797privilege-escalationT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
798privilege-escalationT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
799privilege-escalationT1574.006Hijack Execution Flow: LD_PRELOAD3Dylib Injection via DYLD_INSERT_LIBRARIES4d66029d-7355-43fd-93a4-b63ba92ea1bebash
800privilege-escalationT1134.002Create Process with Token1Access Token Manipulationdbf4f5a9-b8e0-46a3-9841-9ad71247239epowershell
801privilege-escalationT1134.002Create Process with Token2WinPwn - Get SYSTEM shell - Pop System Shell using Token Manipulation techniqueccf4ac39-ec93-42be-9035-90e2f26bcd92powershell
802privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
803privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid2Make and modify binary from C source (freebsd)dd580455-d84b-481b-b8b0-ac96f3b1dc4csh
804privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid3Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
805privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid4Set a SetUID flag on file (freebsd)9be9b827-ff47-4e1b-bef8-217db6fb7283sh
806privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid5Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
807privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid6Set a SetGID flag on file (freebsd)1f73af33-62a8-4bf1-bd10-3bea931f2c0dsh
808privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid7Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
809privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid8Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
810privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid9Do reconnaissance for files that have the setuid bit set8e36da01-cd29-45fd-be72-8a0fcaad4481sh
811privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid10Do reconnaissance for files that have the setgid bit set3fb46e17-f337-4c14-9f9a-a471946533e2sh
812privilege-escalationT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL1Winlogon Shell Key Persistence - PowerShellbf9f9d65-ee4d-4c3e-a843-777d04f19c38powershell
813privilege-escalationT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL2Winlogon Userinit Key Persistence - PowerShellfb32c935-ee2e-454b-8fa3-1c46b42e8dfbpowershell
814privilege-escalationT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL3Winlogon Notify Key Logon Persistence - PowerShelld40da266-e073-4e5a-bb8b-2b385023e5f9powershell
815privilege-escalationT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL4Winlogon HKLM Shell Key Persistence - PowerShell95a3c42f-8c88-4952-ad60-13b81d929a9dpowershell
816privilege-escalationT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL5Winlogon HKLM Userinit Key Persistence - PowerShellf9b8daff-8fa7-4e6a-a1a7-7c14675a545bpowershell
817privilege-escalationT1098.004SSH Authorized Keys1Modify SSH Authorized Keys342cc723-127c-4d3a-8292-9c0c6b4ecadcsh
818privilege-escalationT1546.012Event Triggered Execution: Image File Execution Options Injection1IFEO Add Debuggerfdda2626-5234-4c90-b163-60849a24c0b8command_prompt
819privilege-escalationT1546.012Event Triggered Execution: Image File Execution Options Injection2IFEO Global Flags46b1f278-c8ee-4aa5-acce-65e77b11f3c1command_prompt
820privilege-escalationT1546.012Event Triggered Execution: Image File Execution Options Injection3GlobalFlags in Image File Execution Options13117939-c9b2-4a43-999e-0a543df92f0dpowershell
821privilege-escalationT1546.008Event Triggered Execution: Accessibility Features1Attaches Command Prompt as a Debugger to a List of Target Processes3309f53e-b22b-4eb6-8fd2-a6cf58b355a9powershell
822privilege-escalationT1546.008Event Triggered Execution: Accessibility Features2Replace binary of sticky keys934e90cf-29ca-48b3-863c-411737ad44e3command_prompt
823privilege-escalationT1546.008Event Triggered Execution: Accessibility Features3Create Symbolic Link From osk.exe to cmd.exe51ef369c-5e87-4f33-88cd-6d61be63edf2command_prompt
824privilege-escalationT1546.008Event Triggered Execution: Accessibility Features4Atbroker.exe (AT) Executes Arbitrary Command via Registry Key444ff124-4c83-4e28-8df6-6efd3ece6bd4command_prompt
825privilege-escalationT1546.008Event Triggered Execution: Accessibility Features5Auto-start application on user logon7125eba8-7b30-426b-9147-781d152be6fbcommand_prompt
826privilege-escalationT1546.008Event Triggered Execution: Accessibility Features6Replace utilman.exe (Ease of Access Binary) with cmd.exe1db380da-3422-481d-a3c8-6d5770dba580command_prompt
827privilege-escalationT1546.008Event Triggered Execution: Accessibility Features7Replace Magnify.exe (Magnifier binary) with cmd.exe5e4fa70d-c789-470e-85e1-6992b92bb321command_prompt
828privilege-escalationT1546.008Event Triggered Execution: Accessibility Features8Replace Narrator.exe (Narrator binary) with cmd.exe2002f5ea-cd13-4c82-bf73-e46722e5dc5ecommand_prompt
829privilege-escalationT1546.008Event Triggered Execution: Accessibility Features9Replace DisplaySwitch.exe (Display Switcher binary) with cmd.exe825ba8ca-71cc-436b-b1dd-ea0d5e109086command_prompt
830privilege-escalationT1546.008Event Triggered Execution: Accessibility Features10Replace AtBroker.exe (App Switcher binary) with cmd.exe210be7ea-d841-40ec-b3e1-ff610bb62744command_prompt
831privilege-escalationT1055.004Process Injection: Asynchronous Procedure Call1Process Injection via C#611b39b7-e243-4c81-87a4-7145a90358b1command_prompt
832privilege-escalationT1055.004Process Injection: Asynchronous Procedure Call2EarlyBird APC Queue Injection in Go73785dd2-323b-4205-ab16-bb6f06677e14powershell
833privilege-escalationT1055.004Process Injection: Asynchronous Procedure Call3Remote Process Injection with Go using NtQueueApcThreadEx WinAPI4cc571b1-f450-414a-850f-879baf36aa06powershell
834privilege-escalationT1546.009Event Triggered Execution: AppCert DLLs1Create registry persistence via AppCert DLLa5ad6104-5bab-4c43-b295-b4c44c7c6b05powershell
835privilege-escalationT1055.002Process Injection: Portable Executable Injection1Portable Executable Injection578025d5-faa9-4f6d-8390-aae739d503e1powershell
836privilege-escalationT1547.015Boot or Logon Autostart Execution: Login Items1Persistence by modifying Windows Terminal profileec5d76ef-82fe-48da-b931-bdb25a62bc65powershell
837privilege-escalationT1547.015Boot or Logon Autostart Execution: Login Items2Add macOS LoginItem using Applescript716e756a-607b-41f3-8204-b214baf37c1dbash
838privilege-escalationT1134.001Access Token Manipulation: Token Impersonation/Theft1Named pipe client impersonation90db9e27-8e7c-4c04-b602-a45927884966powershell
839privilege-escalationT1134.001Access Token Manipulation: Token Impersonation/Theft2`SeDebugPrivilege` token duplication34f0a430-9d04-4d98-bcb5-1989f14719f0powershell
840privilege-escalationT1134.001Access Token Manipulation: Token Impersonation/Theft3Launch NSudo Executable7be1bc0f-d8e5-4345-9333-f5f67d742cb9powershell
841privilege-escalationT1134.001Access Token Manipulation: Token Impersonation/Theft4Bad Potato9c6d799b-c111-4749-a42f-ec2f8cb51448powershell
842privilege-escalationT1134.001Access Token Manipulation: Token Impersonation/Theft5Juicy Potatof095e373-b936-4eb4-8d22-f47ccbfbe64apowershell
843privilege-escalationT1098.001Account Manipulation: Additional Cloud Credentials1Azure AD Application Hijacking - Service Principalb8e747c3-bdf7-4d71-bce2-f1df2a057406powershell
844privilege-escalationT1098.001Account Manipulation: Additional Cloud Credentials2Azure AD Application Hijacking - App Registrationa12b5531-acab-4618-a470-0dafb294a87apowershell
845privilege-escalationT1098.001Account Manipulation: Additional Cloud Credentials3AWS - Create Access Key and Secret Key8822c3b0-d9f9-4daf-a043-491160a31122sh
846privilege-escalationT1546.003Event Triggered Execution: Windows Management Instrumentation Event Subscription1Persistence via WMI Event Subscription - CommandLineEventConsumer3c64f177-28e2-49eb-a799-d767b24dd1e0powershell
847privilege-escalationT1546.003Event Triggered Execution: Windows Management Instrumentation Event Subscription2Persistence via WMI Event Subscription - ActiveScriptEventConsumerfecd0dfd-fb55-45fa-a10b-6250272d0832powershell
848privilege-escalationT1546.003Event Triggered Execution: Windows Management Instrumentation Event Subscription3Windows MOFComp.exe Load MOF File29786d7e-8916-4de6-9c55-be7b093b2706powershell
849privilege-escalationT1134.004Access Token Manipulation: Parent PID Spoofing1Parent PID Spoofing using PowerShell069258f4-2162-46e9-9a25-c9c6c56150d2powershell
850privilege-escalationT1134.004Access Token Manipulation: Parent PID Spoofing2Parent PID Spoofing - Spawn from Current Process14920ebd-1d61-491a-85e0-fe98efe37f25powershell
851privilege-escalationT1134.004Access Token Manipulation: Parent PID Spoofing3Parent PID Spoofing - Spawn from Specified Processcbbff285-9051-444a-9d17-c07cd2d230ebpowershell
852privilege-escalationT1134.004Access Token Manipulation: Parent PID Spoofing4Parent PID Spoofing - Spawn from svchost.exee9f2b777-3123-430b-805d-5cedc66ab591powershell
853privilege-escalationT1134.004Access Token Manipulation: Parent PID Spoofing5Parent PID Spoofing - Spawn from New Process2988133e-561c-4e42-a15f-6281e6a9b2dbpowershell
854privilege-escalationT1546.001Event Triggered Execution: Change Default File Association1Change Default File Association10a08978-2045-4d62-8c42-1957bbbea102command_prompt
855privilege-escalationT1546.014Event Triggered Execution: Emond1Persistance with Event Monitor - emond23c9c127-322b-4c75-95ca-eff464906114sh
856privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder1Reg Key Rune55be3fd-3521-4610-9d1a-e210e42dcf05command_prompt
857privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder2Reg Key RunOnce554cbd88-cde1-4b56-8168-0be552eed9ebcommand_prompt
858privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder3PowerShell Registry RunOnceeb44f842-0457-4ddc-9b92-c4caa144ac42powershell
859privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder4Suspicious vbs file run from startup Folder2cb98256-625e-4da9-9d44-f2e5f90b8bd5powershell
860privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder5Suspicious jse file run from startup Folderdade9447-791e-4c8f-b04b-3a35855dfa06powershell
861privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder6Suspicious bat file run from startup Folder5b6768e4-44d2-44f0-89da-a01d1430fd5epowershell
862privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder7Add Executable Shortcut Link to User Startup Folder24e55612-85f6-4bd6-ae74-a73d02e3441dpowershell
863privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder8Add persistance via Recycle binbda6a3d6-7aa7-4e89-908b-306772e9662fcommand_prompt
864privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder9SystemBC Malware-as-a-Service Registry9dc7767b-30c1-4cc4-b999-50cab5e27891powershell
865privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder10Change Startup Folder - HKLM Modify User Shell Folders Common Startup Valueacfef903-7662-447e-a391-9c91c2f00f7bpowershell
866privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder11Change Startup Folder - HKCU Modify User Shell Folders Startup Value8834b65a-f808-4ece-ad7e-2acdf647aafapowershell
867privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder12HKCU - Policy Settings Explorer Run Keya70faea1-e206-4f6f-8d9a-67379be8f6f1powershell
868privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder13HKLM - Policy Settings Explorer Run Keyb5c9a9bc-dda3-4ea0-b16a-add8e81ab75fpowershell
869privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder14HKLM - Append Command to Winlogon Userinit KEY Valuef7fab6cc-8ece-4ca7-a0f1-30a22fccd374powershell
870privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder15HKLM - Modify default System Shell - Winlogon Shell KEY Value 1d958c61-09c6-4d9e-b26b-4130314e520epowershell
871privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder16secedit used to create a Run key in the HKLM Hive14fdc3f1-6fc3-4556-8d36-aa89d9d42d02command_prompt
872privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder17Modify BootExecute Valuebefc2b40-d487-4a5a-8813-c11085fb5672powershell
873privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder18Allowing custom application to execute during new RDP logon sessionb051b3c0-66e7-4a81-916d-e6383bd3a669command_prompt
874privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder19Creating Boot Verification Program Key for application execution during successful boot6e1666d5-3f2b-4b9a-80aa-f011322380d4command_prompt
875privilege-escalationT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder20Add persistence via Windows Context Menude47f4a0-2acb-416d-9a6b-cee584a4c4d1command_prompt
876privilege-escalationT1098Account Manipulation1Admin Account Manipulate5598f7cb-cf43-455e-883a-f6008c5d46afpowershell
877privilege-escalationT1098Account Manipulation2Domain Account and Group Manipulatea55a22e9-a3d3-42ce-bd48-2653adb8f7a9powershell
878privilege-escalationT1098Account Manipulation3AWS - Create a group and add a user to that group8822c3b0-d9f9-4daf-a043-49f110a31122sh
879privilege-escalationT1098Account Manipulation4Azure AD - adding user to Azure AD role0e65ae27-5385-46b4-98ac-607a8ee82261powershell
880privilege-escalationT1098Account Manipulation5Azure AD - adding service principal to Azure AD role92c40b3f-c406-4d1f-8d2b-c039bf5009e4powershell
881privilege-escalationT1098Account Manipulation6Azure - adding user to Azure role in subscription1a94b3fc-b080-450a-b3d8-6d9b57b472eapowershell
882privilege-escalationT1098Account Manipulation7Azure - adding service principal to Azure role in subscriptionc8f4bc29-a151-48da-b3be-4680af56f404powershell
883privilege-escalationT1098Account Manipulation8Azure AD - adding permission to application94ea9cc3-81f9-4111-8dde-3fb54f36af4bpowershell
884privilege-escalationT1098Account Manipulation9Password Change on Directory Service Restore Mode (DSRM) Accountd5b886d9-d1c7-4b6e-a7b0-460041bf2823command_prompt
885privilege-escalationT1098Account Manipulation10Domain Password Policy Check: Short Passwordfc5f9414-bd67-4f5f-a08e-e5381e29cbd1powershell
886privilege-escalationT1098Account Manipulation11Domain Password Policy Check: No Number in Password68190529-069b-4ffc-a942-919704158065powershell
887privilege-escalationT1098Account Manipulation12Domain Password Policy Check: No Special Character in Password7d984ef2-2db2-4cec-b090-e637e1698f61powershell
888privilege-escalationT1098Account Manipulation13Domain Password Policy Check: No Uppercase Character in Passwordb299c120-44a7-4d68-b8e2-8ba5a28511ecpowershell
889privilege-escalationT1098Account Manipulation14Domain Password Policy Check: No Lowercase Character in Password945da11e-977e-4dab-85d2-f394d03c5887powershell
890privilege-escalationT1098Account Manipulation15Domain Password Policy Check: Only Two Character Classes784d1349-5a26-4d20-af5e-d6af53bae460powershell
891privilege-escalationT1098Account Manipulation16Domain Password Policy Check: Common Password Use81959d03-c51f-49a1-bb24-23f1ec885578powershell
892privilege-escalationT1098Account Manipulation17GCP - Delete Service Account Key7ece1dea-49f1-4d62-bdcc-5801e3292510sh
893privilege-escalationT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
894privilege-escalationT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions2MacOS - Load Kernel Module via kextload and kmutilf4391089-d3a5-4dd1-ab22-0419527f2672bash
895privilege-escalationT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions3MacOS - Load Kernel Module via KextManagerLoadKextWithURL()f0007753-beb3-41ea-9948-760785e4c1e5bash
896privilege-escalationT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions4Snake Malware Kernel Driver Comadmine5cb5564-cc7b-4050-86e8-f2d9eec1941fpowershell
897privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
898privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
899privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
900privilege-escalationT1055.012Process Injection: Process Hollowing1Process Hollowing using PowerShell562427b4-39ef-4e8c-af88-463a78e70b9cpowershell
901privilege-escalationT1055.012Process Injection: Process Hollowing2RunPE via VBA3ad4a037-1598-4136-837c-4027e4fa319bpowershell
902privilege-escalationT1055.012Process Injection: Process Hollowing3Process Hollowing in Go using CreateProcessW WinAPIc8f98fe1-c89b-4c49-a7e3-d60ee4bc2f5apowershell
903privilege-escalationT1055.012Process Injection: Process Hollowing4Process Hollowing in Go using CreateProcessW and CreatePipe WinAPIs (T1055.012)94903cc5-d462-498a-b919-b1e5ab155feepowershell
904privilege-escalationT1546Event Triggered Execution1Persistence with Custom AutodialDLLaca9ae16-7425-4b6d-8c30-cad306fdbd5bpowershell
905privilege-escalationT1546Event Triggered Execution2HKLM - Persistence using CommandProcessor AutoRun key (With Elevation)a574dafe-a903-4cce-9701-14040f4f3532powershell
906privilege-escalationT1546Event Triggered Execution3HKCU - Persistence using CommandProcessor AutoRun key (Without Elevation)36b8dbf9-59b1-4e9b-a3bb-36e80563ef01powershell
907privilege-escalationT1546Event Triggered Execution4WMI Invoke-CimMethod Start Processadae83d3-0df6-45e7-b2c3-575f91584577powershell
908privilege-escalationT1546Event Triggered Execution5Adding custom debugger for Windows Error Reporting17d1a3cc-3373-495a-857a-e5dd005fb302command_prompt
909privilege-escalationT1546Event Triggered Execution6Load custom DLL on mstsc execution2db7852e-5a32-4ec7-937f-f4e027881700command_prompt
910privilege-escalationT1546Event Triggered Execution7Persistence using automatic execution of custom DLL during RDP sessionb7fc4c3f-fe6e-479a-ba27-ef91b88536e3command_prompt
911privilege-escalationT1546Event Triggered Execution8Persistence via ErrorHandler.cmd script execution547a4736-dd1c-4b48-b4fe-e916190bb2e7powershell
912privilege-escalationT1546Event Triggered Execution9Persistence using STARTUP-PATH in MS-WORDf0027655-25ef-47b0-acaf-3d83d106156ccommand_prompt
913privilege-escalationT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
914privilege-escalationT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
915privilege-escalationT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc3Add command to .shrc41502021-591a-4649-8b6e-83c9192aff53sh
916privilege-escalationT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc4Append to the system shell profile694b3cc8-6a78-4d35-9e74-0123d009e94bsh
917privilege-escalationT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc5Append commands user shell profilebbdb06bc-bab6-4f5b-8232-ba3fbed51d77sh
918privilege-escalationT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc6System shell profile scripts8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4sh
919privilege-escalationT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc7Create/Append to .bash_logout37ad2f24-7c53-4a50-92da-427a4ad13f58bash
920privilege-escalationT1134.005Access Token Manipulation: SID-History Injection1Injection SID-History with mimikatz6bef32e5-9456-4072-8f14-35566fb85401command_prompt
921privilege-escalationT1547.002Authentication Package1Authentication Packagebe2590e8-4ac3-47ac-b4b5-945820f2fbe9powershell
922privilege-escalationT1546.015Event Triggered Execution: Component Object Model Hijacking1COM Hijacking - InprocServer3248117158-d7be-441b-bc6a-d9e36e47b52bpowershell
923privilege-escalationT1546.015Event Triggered Execution: Component Object Model Hijacking2Powershell Execute COM Object752191b1-7c71-445c-9dbe-21bb031b18ebpowershell
924privilege-escalationT1546.015Event Triggered Execution: Component Object Model Hijacking3COM Hijacking with RunDLL32 (Local Server Switch)123520cc-e998-471b-a920-bd28e3feafa0powershell
925privilege-escalationT1546.015Event Triggered Execution: Component Object Model Hijacking4COM hijacking via TreatAs33eacead-f117-4863-8eb0-5c6304fbfaa9powershell
926privilege-escalationT1574.009Hijack Execution Flow: Path Interception by Unquoted Path1Execution of program.exe as service with unquoted service path2770dea7-c50f-457b-84c4-c40a47460d9fcommand_prompt
927privilege-escalationT1037.005Boot or Logon Initialization Scripts: Startup Items1Add file to Local Library StartupItems134627c3-75db-410e-bff8-7a920075f198sh
928privilege-escalationT1037.005Boot or Logon Initialization Scripts: Startup Items2Add launch script to launch daemonfc369906-90c7-4a15-86fd-d37da624dde6bash
929privilege-escalationT1037.005Boot or Logon Initialization Scripts: Startup Items3Add launch script to launch agent10cf5bec-49dd-4ebf-8077-8f47e420096fbash
930privilege-escalationT1546.010Event Triggered Execution: AppInit DLLs1Install AppInit Shima58d9386-3080-4242-ab5f-454c16503d18command_prompt
931privilege-escalationT1546.002Event Triggered Execution: Screensaver1Set Arbitrary Binary as Screensaver281201e7-de41-4dc9-b73d-f288938cbb64command_prompt
932privilege-escalationT1543.001Create or Modify System Process: Launch Agent1Launch Agenta5983dee-bf6c-4eaf-951c-dbc1a7b90900bash
933privilege-escalationT1543.001Create or Modify System Process: Launch Agent2Event Monitor Daemon Persistence11979f23-9b9d-482a-9935-6fc9cd022c3ebash
934privilege-escalationT1543.001Create or Modify System Process: Launch Agent3Launch Agent - Root Directory66774fa8-c562-4bae-a58d-5264a0dd9dd7bash
935privilege-escalationT1037.004Boot or Logon Initialization Scripts: Rc.common1rc.common97a48daa-8bca-4bc0-b1a9-c1d163e762debash
936privilege-escalationT1037.004Boot or Logon Initialization Scripts: Rc.common2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
937privilege-escalationT1037.004Boot or Logon Initialization Scripts: Rc.common3rc.local126f71af-e1c9-405c-94ef-26a47b16c102sh
938privilege-escalationT1543.002Create or Modify System Process: SysV/Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
939privilege-escalationT1543.002Create or Modify System Process: SysV/Systemd Service2Create SysV Service760fe8d2-79d9-494f-905e-a239a3df86f6sh
940privilege-escalationT1543.002Create or Modify System Process: SysV/Systemd Service3Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
941privilege-escalationT1547.007Boot or Logon Autostart Execution: Re-opened Applications1Copy in loginwindow.plist for Re-Opened Applications5fefd767-ef54-4ac6-84d3-751ab85e8abash
942privilege-escalationT1547.007Boot or Logon Autostart Execution: Re-opened Applications2Re-Opened Applications using LoginHook5f5b71da-e03f-42e7-ac98-d63f9e0465cbsh
943privilege-escalationT1547.007Boot or Logon Autostart Execution: Re-opened Applications3Append to existing loginwindow for Re-Opened Applications766b6c3c-9353-4033-8b7e-38b309fa3a93sh
944privilege-escalationT1098.002Account Manipulation: Additional Email Delegate Permissions1EXO - Full access mailbox permission granted to a user17d046be-fdd0-4cbb-b5c7-55c85d9d0714powershell
945privilege-escalationT1037.001Boot or Logon Initialization Scripts: Logon Script (Windows)1Logon Scriptsd6042746-07d4-4c92-9ad8-e644c114a231command_prompt
946privilege-escalationT1055.015Process Injection: ListPlanting1Process injection ListPlanting4f3c7502-b111-4dfe-8a6e-529307891a59powershell
947privilege-escalationT1547.008Boot or Logon Autostart Execution: LSASS Driver1Modify Registry to load Arbitrary DLL into LSASS - LsaDbExtPt8ecef16d-d289-46b4-917b-0dba6dc81cf1powershell
948privilege-escalationT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
949privilege-escalationT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
950privilege-escalationT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
951privilege-escalationT1053.002Scheduled Task/Job: At1At.exe Scheduled task4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8command_prompt
952privilege-escalationT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
953privilege-escalationT1053.002Scheduled Task/Job: At3At - Schedule a job via kubectl in a Pod9ddf2e5e-7e2c-46c2-9940-3c2ff29c7213bash
954privilege-escalationT1055.001Process Injection: Dynamic-link Library Injection1Process Injection via mavinject.exe74496461-11a1-4982-b439-4d87a550d254powershell
955privilege-escalationT1055.001Process Injection: Dynamic-link Library Injection2WinPwn - Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique8b56f787-73d9-4f1d-87e8-d07e89cbc7f5powershell
956privilege-escalationT1546.007Event Triggered Execution: Netsh Helper DLL1Netsh Helper DLL Registration3244697d-5a3a-4dfc-941c-550f69f91a4dcommand_prompt
957privilege-escalationT1078.003Valid Accounts: Local Accounts1Create local account with admin privilegesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
958privilege-escalationT1078.003Valid Accounts: Local Accounts2Create local account with admin privileges - MacOSf1275566-1c26-4b66-83e3-7f9f7f964daabash
959privilege-escalationT1078.003Valid Accounts: Local Accounts3Create local account with admin privileges using sysadminctl utility - MacOS191db57d-091a-47d5-99f3-97fde53de505bash
960privilege-escalationT1078.003Valid Accounts: Local Accounts4Enable root account using dsenableroot utility - MacOS20b40ea9-0e17-4155-b8e6-244911a678acbash
961privilege-escalationT1078.003Valid Accounts: Local Accounts5Add a new/existing user to the admin group using dseditgroup utility - macOS433842ba-e796-4fd5-a14f-95d3a1970875bash
962privilege-escalationT1078.003Valid Accounts: Local Accounts6WinPwn - Loot local Credentials - powerhell kittie9e9fd066-453d-442f-88c1-ad7911d32912powershell
963privilege-escalationT1078.003Valid Accounts: Local Accounts7WinPwn - Loot local Credentials - Safetykatze9fdb899-a980-4ba4-934b-486ad22e22f4powershell
964privilege-escalationT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
965privilege-escalationT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
966privilege-escalationT1078.003Valid Accounts: Local Accounts10Reactivate a locked/expired account (FreeBSD)09e3380a-fae5-4255-8b19-9950be0252cfsh
967privilege-escalationT1078.003Valid Accounts: Local Accounts11Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
968privilege-escalationT1078.003Valid Accounts: Local Accounts12Login as nobody (freebsd)16f6374f-7600-459a-9b16-6a88fd96d310sh
969privilege-escalationT1078.003Valid Accounts: Local Accounts13Use PsExec to elevate to NT Authority\SYSTEM account6904235f-0f55-4039-8aed-41c300ff7733command_prompt
970privilege-escalationT1574.012Hijack Execution Flow: COR_PROFILER1User scope COR_PROFILER9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5apowershell
971privilege-escalationT1574.012Hijack Execution Flow: COR_PROFILER2System Scope COR_PROFILERf373b482-48c8-4ce4-85ed-d40c8b3f7310powershell
972privilege-escalationT1574.012Hijack Execution Flow: COR_PROFILER3Registry-free process scope COR_PROFILER79d57242-bbef-41db-b301-9d01d9f6e817powershell
973executionT1053.005Scheduled Task/Job: Scheduled Task1Scheduled Task Startup Scriptfec27f65-db86-4c2d-b66c-61945aee87c2command_prompt
974executionT1053.005Scheduled Task/Job: Scheduled Task2Scheduled task Local42f53695-ad4a-4546-abb6-7d837f644a71command_prompt
975executionT1053.005Scheduled Task/Job: Scheduled Task3Scheduled task Remote2e5eac3e-327b-4a88-a0c0-c4057039a8ddcommand_prompt
976executionT1053.005Scheduled Task/Job: Scheduled Task4Powershell Cmdlet Scheduled Taskaf9fd58f-c4ac-4bf2-a9ba-224b71ff25fdpowershell
977executionT1053.005Scheduled Task/Job: Scheduled Task5Task Scheduler via VBAecd3fa21-7792-41a2-8726-2c5c673414d3powershell
978executionT1053.005Scheduled Task/Job: Scheduled Task6WMI Invoke-CimMethod Scheduled Taske16b3b75-dc9e-4cde-a23d-dfa2d0507b3bpowershell
979executionT1053.005Scheduled Task/Job: Scheduled Task7Scheduled Task Executing Base64 Encoded Commands From Registrye895677d-4f06-49ab-91b6-ae3742d0a2bacommand_prompt
980executionT1053.005Scheduled Task/Job: Scheduled Task8Import XML Schedule Task with Hidden Attributecd925593-fbb4-486d-8def-16cbdf944bf4powershell
981executionT1053.005Scheduled Task/Job: Scheduled Task9PowerShell Modify A Scheduled Taskdda6fc7b-c9a6-4c18-b98d-95ec6542af6dpowershell
982executionT1053.005Scheduled Task/Job: Scheduled Task10Scheduled Task ("Ghost Task") via Registry Key Manipulation704333ca-cc12-4bcf-9916-101844881f54command_prompt
983executionT1053.005Scheduled Task/Job: Scheduled Task11Scheduled Task Persistence via CompMgmt.msc8fcfa3d5-ea7d-4e1c-bd3e-3c4ed315b7d2command_prompt
984executionT1053.005Scheduled Task/Job: Scheduled Task12Scheduled Task Persistence via Eventviewer.msc02124c37-767e-4b76-9383-c9fc366d9d4ccommand_prompt
985executionT1047Windows Management Instrumentation1WMI Reconnaissance Usersc107778c-dcf5-47c5-af2e-1d058a3df3eacommand_prompt
986executionT1047Windows Management Instrumentation2WMI Reconnaissance Processes5750aa16-0e59-4410-8b9a-8a47ca2788e2command_prompt
987executionT1047Windows Management Instrumentation3WMI Reconnaissance Software718aebaa-d0e0-471a-8241-c5afa69c7414command_prompt
988executionT1047Windows Management Instrumentation4WMI Reconnaissance List Remote Services0fd48ef7-d890-4e93-a533-f7dedd5191d3command_prompt
989executionT1047Windows Management Instrumentation5WMI Execute Local Processb3bdfc91-b33e-4c6d-a5c8-d64bee0276b3command_prompt
990executionT1047Windows Management Instrumentation6WMI Execute Remote Process9c8ef159-c666-472f-9874-90c8d60d136bcommand_prompt
991executionT1047Windows Management Instrumentation7Create a Process using WMI Query and an Encoded Command7db7a7f9-9531-4840-9b30-46220135441ccommand_prompt
992executionT1047Windows Management Instrumentation8Create a Process using obfuscated Win32_Process10447c83-fc38-462a-a936-5102363b1c43powershell
993executionT1047Windows Management Instrumentation9WMI Execute rundll3200738d2a-4651-4d76-adf2-c43a41dfb243command_prompt
994executionT1047Windows Management Instrumentation10Application uninstall using WMICc510d25b-1667-467d-8331-a56d3e9bc4ffcommand_prompt
995executionT1129Server Software Component1ESXi - Install a custom VIB on an ESXi host7f843046-abf2-443f-b880-07a83cf968eccommand_prompt
996executionT1059.007Command and Scripting Interpreter: JavaScript1JScript execution to gather local computer information via cscript01d75adf-ca1b-4dd1-ac96-7c9550ad1035command_prompt
997executionT1059.007Command and Scripting Interpreter: JavaScript2JScript execution to gather local computer information via wscript0709945e-4fec-4c49-9faf-c3c292a74484command_prompt
998executionT1053.007Kubernetes Cronjob1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
999executionT1053.007Kubernetes Cronjob2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
1000executionT1559.002Inter-Process Communication: Dynamic Data Exchange1Execute Commandsf592ba2a-e9e8-4d62-a459-ef63abd819fdmanual
1001executionT1559.002Inter-Process Communication: Dynamic Data Exchange2Execute PowerShell script via Word DDE47c21fb6-085e-4b0d-b4d2-26d72c3830b3command_prompt
1002executionT1559.002Inter-Process Communication: Dynamic Data Exchange3DDEAUTOcf91174c-4e74-414e-bec0-8d60a104d181manual
1003executionT1204.002User Execution: Malicious File1OSTap Style Macro Execution8bebc690-18c7-4549-bc98-210f7019efffpowershell
1004executionT1204.002User Execution: Malicious File2OSTap Payload Download3f3af983-118a-4fa1-85d3-ba4daa739d80command_prompt
1005executionT1204.002User Execution: Malicious File3Maldoc choice flags command execution0330a5d2-a45a-4272-a9ee-e364411c4b18powershell
1006executionT1204.002User Execution: Malicious File4OSTAP JS versionadd560ef-20d6-4011-a937-2c340f930911powershell
1007executionT1204.002User Execution: Malicious File5Office launching .bat file from AppData9215ea92-1ded-41b7-9cd6-79f9a78397aapowershell
1008executionT1204.002User Execution: Malicious File6Excel 4 Macro4ea1fc97-8a46-4b4e-ba48-af43d2a98052powershell
1009executionT1204.002User Execution: Malicious File7Headless Chrome code execution via VBAa19ee671-ed98-4e9d-b19c-d1954a51585apowershell
1010executionT1204.002User Execution: Malicious File8Potentially Unwanted Applications (PUA)02f35d62-9fdc-4a97-b899-a5d9a876d295powershell
1011executionT1204.002User Execution: Malicious File9Office Generic Payload Download5202ee05-c420-4148-bf5e-fd7f7d24850cpowershell
1012executionT1204.002User Execution: Malicious File10LNK Payload Download581d7521-9c4b-420e-9695-2aec5241167fpowershell
1013executionT1204.002User Execution: Malicious File11Mirror Blast Emulation24fd9719-7419-42dd-bce6-ab3463110b3cpowershell
1014executionT1204.002User Execution: Malicious File12ClickFix Campaign - Abuse RunMRU to Launch mshta via PowerShell3f3120f0-7e50-4be2-88ae-54c61230cb9fpowershell
1015executionT1204.002User Execution: Malicious File13Simulate Click-Fix via Downloaded BAT File22386853-f68d-4b50-a362-de235127c443powershell
1016executionT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75sh
1017executionT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
1018executionT1053.003Scheduled Task/Job: Cron3Cron - Add script to /etc/cron.d folder078e69eb-d9fb-450e-b9d0-2e118217c846sh
1019executionT1053.003Scheduled Task/Job: Cron4Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
1020executionT1059.002Command and Scripting Interpreter: AppleScript1AppleScript3600d97d-81b9-4171-ab96-e4386506e2c2sh
1021executionT1106Native API1Execution through API - CreateProcess99be2089-c52d-4a4a-b5c3-261ee42c8b62command_prompt
1022executionT1106Native API2WinPwn - Get SYSTEM shell - Pop System Shell using CreateProcess techniquece4e76e6-de70-4392-9efe-b281fc2b4087powershell
1023executionT1106Native API3WinPwn - Get SYSTEM shell - Bind System Shell using CreateProcess technique7ec5b74e-8289-4ff2-a162-b6f286a33abdpowershell
1024executionT1106Native API4WinPwn - Get SYSTEM shell - Pop System Shell using NamedPipe Impersonation techniquee1f93a06-1649-4f07-89a8-f57279a7d60epowershell
1025executionT1106Native API5Run Shellcode via Syscall in Goae56083f-28d0-417d-84da-df4242da1f7cpowershell
1026executionT1059.010Command and Scripting Interpreter: AutoHotKey & AutoIT1AutoHotKey script execution7b5d350e-f758-43cc-a761-8e3f6b052a03powershell
1027executionT1610Deploy a container1Deploy Docker container59aa6f26-7620-417e-9318-589e0fb7a372bash
1028executionT1059Command and Scripting Interpreter1AutoIt Script Executiona9b93f17-31cb-435d-a462-5e838a2a6026powershell
1029executionT1609Kubernetes Exec Into Container1ExecIntoContainerd03bfcd3-ed87-49c8-8880-44bb772dea4bbash
1030executionT1609Kubernetes Exec Into Container2Docker Exec Into Container900e2c49-221b-42ec-ae3c-4717e41e6219bash
1031executionT1569.001System Services: Launchctl1Launchctl6fb61988-724e-4755-a595-07743749d4e2bash
1032executionT1072Software Deployment Tools1Radmin Viewer Utilityb4988cad-6ed2-434d-ace5-ea2670782129command_prompt
1033executionT1072Software Deployment Tools2PDQ Deploy RATe447b83b-a698-4feb-bed1-a7aaf45c3443command_prompt
1034executionT1072Software Deployment Tools3Deploy 7-Zip Using Chocolatey2169e8b0-2ee7-44cb-8a6e-d816a5db7d8apowershell
1035executionT1059.001Command and Scripting Interpreter: PowerShell1Mimikatzf3132740-55bc-48c4-bcc0-758a459cd027command_prompt
1036executionT1059.001Command and Scripting Interpreter: PowerShell2Run BloodHound from local diska21bb23e-e677-4ee7-af90-6931b57b6350powershell
1037executionT1059.001Command and Scripting Interpreter: PowerShell3Run Bloodhound from Memory using Download Cradlebf8c1441-4674-4dab-8e4e-39d93d08f9b7powershell
1038executionT1059.001Command and Scripting Interpreter: PowerShell4Mimikatz - Cradlecraft PsSendKeysaf1800cf-9f9d-4fd1-a709-14b1e6de020dpowershell
1039executionT1059.001Command and Scripting Interpreter: PowerShell5Invoke-AppPathBypass06a220b6-7e29-4bd8-9d07-5b4d86742372command_prompt
1040executionT1059.001Command and Scripting Interpreter: PowerShell6Powershell MsXml COM object - with prompt388a7340-dbc1-4c9d-8e59-b75ad8c6d5dacommand_prompt
1041executionT1059.001Command and Scripting Interpreter: PowerShell7Powershell XML requests4396927f-e503-427b-b023-31049b9b09a6command_prompt
1042executionT1059.001Command and Scripting Interpreter: PowerShell8Powershell invoke mshta.exe download8a2ad40b-12c7-4b25-8521-2737b0a415afcommand_prompt
1043executionT1059.001Command and Scripting Interpreter: PowerShell9Powershell Invoke-DownloadCradlecc50fa2a-a4be-42af-a88f-e347ba0bf4d7manual
1044executionT1059.001Command and Scripting Interpreter: PowerShell10PowerShell Fileless Script Executionfa050f5e-bc75-4230-af73-b6fd7852cd73powershell
1045executionT1059.001Command and Scripting Interpreter: PowerShell11NTFS Alternate Data Stream Access8e5c5532-1181-4c1d-bb79-b3a9f5dbd680powershell
1046executionT1059.001Command and Scripting Interpreter: PowerShell12PowerShell Session Creation and Use7c1acec2-78fa-4305-a3e0-db2a54cddecdpowershell
1047executionT1059.001Command and Scripting Interpreter: PowerShell13ATHPowerShellCommandLineParameter -Command parameter variations686a9785-f99b-41d4-90df-66ed515f81d7powershell
1048executionT1059.001Command and Scripting Interpreter: PowerShell14ATHPowerShellCommandLineParameter -Command parameter variations with encoded arguments1c0a870f-dc74-49cf-9afc-eccc45e58790powershell
1049executionT1059.001Command and Scripting Interpreter: PowerShell15ATHPowerShellCommandLineParameter -EncodedCommand parameter variations86a43bad-12e3-4e85-b97c-4d5cf25b95c3powershell
1050executionT1059.001Command and Scripting Interpreter: PowerShell16ATHPowerShellCommandLineParameter -EncodedCommand parameter variations with encoded arguments0d181431-ddf3-4826-8055-2dbf63ae848bpowershell
1051executionT1059.001Command and Scripting Interpreter: PowerShell17PowerShell Command Executiona538de64-1c74-46ed-aa60-b995ed302598command_prompt
1052executionT1059.001Command and Scripting Interpreter: PowerShell18PowerShell Invoke Known Malicious Cmdlets49eb9404-5e0f-4031-a179-b40f7be385e3powershell
1053executionT1059.001Command and Scripting Interpreter: PowerShell19PowerUp Invoke-AllChecks1289f78d-22d2-4590-ac76-166737e1811bpowershell
1054executionT1059.001Command and Scripting Interpreter: PowerShell20Abuse Nslookup with DNS Records999bff6d-dc15-44c9-9f5c-e1051bfc86e1powershell
1055executionT1059.001Command and Scripting Interpreter: PowerShell21SOAPHound - Dump BloodHound Data6a5b2a50-d037-4879-bf01-43d4d6cbf73fpowershell
1056executionT1059.001Command and Scripting Interpreter: PowerShell22SOAPHound - Build Cache4099086c-1470-4223-8085-8186e1ed5948powershell
1057executionT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
1058executionT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
1059executionT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
1060executionT1059.004Command and Scripting Interpreter: Bash1Create and Execute Bash Shell Script7e7ac3ed-f795-4fa5-b711-09d6fbe9b873sh
1061executionT1059.004Command and Scripting Interpreter: Bash2Command-Line Interfaced0c88567-803d-4dca-99b4-7ce65e7b257csh
1062executionT1059.004Command and Scripting Interpreter: Bash3Harvest SUID executable files46274fc6-08a7-4956-861b-24cbbaa0503csh
1063executionT1059.004Command and Scripting Interpreter: Bash4LinEnum tool executiona2b35a63-9df1-4806-9a4d-5fe0500845f2sh
1064executionT1059.004Command and Scripting Interpreter: Bash5New script file in the tmp directory8cd1947b-4a54-41fb-b5ea-07d0ace04f81sh
1065executionT1059.004Command and Scripting Interpreter: Bash6What shell is running7b38e5cc-47be-44f0-a425-390305c76c17sh
1066executionT1059.004Command and Scripting Interpreter: Bash7What shells are availablebf23c7dc-1004-4949-8262-4c1d1ef87702sh
1067executionT1059.004Command and Scripting Interpreter: Bash8Command line scriptsb04ed73c-7d43-4dc8-b563-a2fc595cba1ash
1068executionT1059.004Command and Scripting Interpreter: Bash9Obfuscated command line scripts5bec4cc8-f41e-437b-b417-33ff60acf9afsh
1069executionT1059.004Command and Scripting Interpreter: Bash10Change login shellc7ac59cb-13cc-4622-81dc-6d2fee9bfac7bash
1070executionT1059.004Command and Scripting Interpreter: Bash11Environment variable scriptsbdaebd56-368b-4970-a523-f905ff4a8a51sh
1071executionT1059.004Command and Scripting Interpreter: Bash12Detecting pipe-to-shellfca246a8-a585-4f28-a2df-6495973976a1sh
1072executionT1059.004Command and Scripting Interpreter: Bash13Current kernel information enumeration3a53734a-9e26-4f4b-ad15-059e767f5f14sh
1073executionT1059.004Command and Scripting Interpreter: Bash14Shell Creation using awk commandee72b37d-b8f5-46a5-a9e7-0ff50035ffd5sh
1074executionT1059.004Command and Scripting Interpreter: Bash15Creating shell using cpan commandbcd4c2bc-490b-4f91-bd31-3709fe75bbdfsh
1075executionT1059.004Command and Scripting Interpreter: Bash16Shell Creation using busybox commandab4d04af-68dc-4fee-9c16-6545265b3276sh
1076executionT1059.004Command and Scripting Interpreter: Bash17emacs spawning an interactive system shelle0742e38-6efe-4dd4-ba5c-2078095b6156sh
1077executionT1559Inter-Process Communication1Cobalt Strike Artifact Kit pipebd13b9fc-b758-496a-b81a-397462f82c72command_prompt
1078executionT1559Inter-Process Communication2Cobalt Strike Lateral Movement (psexec_psh) pipe830c8b6c-7a70-4f40-b975-8bbe74558acdcommand_prompt
1079executionT1559Inter-Process Communication3Cobalt Strike SSH (postex_ssh) piped1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6command_prompt
1080executionT1559Inter-Process Communication4Cobalt Strike post-exploitation pipe (4.2 and later)7a48f482-246f-4aeb-9837-21c271ebf244command_prompt
1081executionT1559Inter-Process Communication5Cobalt Strike post-exploitation pipe (before 4.2)8dbfc15c-527b-4ab0-a272-019f469d367fcommand_prompt
1082executionT1204.003User Execution: Malicious Image1Malicious Execution from Mounted ISO Imagee9795c8d-42aa-4ed4-ad80-551ed793d006powershell
1083executionT1059.006Command and Scripting Interpreter: Python1Execute shell script via python's command mode arguement3a95cdb2-c6ea-4761-b24e-02b71889b8bbsh
1084executionT1059.006Command and Scripting Interpreter: Python2Execute Python via scripts6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8sh
1085executionT1059.006Command and Scripting Interpreter: Python3Execute Python via Python executables0b44d79b-570a-4b27-a31f-3bf2156e5eaash
1086executionT1059.006Command and Scripting Interpreter: Python4Python pty module and spawn function used to spawn sh or bash161d694c-b543-4434-85c3-c3a433e33792sh
1087executionT1059.003Command and Scripting Interpreter: Windows Command Shell1Create and Execute Batch Script9e8894c0-50bd-4525-a96c-d4ac78ece388powershell
1088executionT1059.003Command and Scripting Interpreter: Windows Command Shell2Writes text to a file and displays it.127b4afe-2346-4192-815c-69042bec570ecommand_prompt
1089executionT1059.003Command and Scripting Interpreter: Windows Command Shell3Suspicious Execution via Windows Command Shelld0eb3597-a1b3-4d65-b33b-2cda8d397f20command_prompt
1090executionT1059.003Command and Scripting Interpreter: Windows Command Shell4Simulate BlackByte Ransomware Print Bombing6b2903ac-8f36-450d-9ad5-b220e8a2dcb9powershell
1091executionT1059.003Command and Scripting Interpreter: Windows Command Shell5Command Prompt read contents from CMD file and executedf81db1b-066c-4802-9bc8-b6d030c3ba8ecommand_prompt
1092executionT1059.003Command and Scripting Interpreter: Windows Command Shell6Command prompt writing script to file then executes it00682c9f-7df4-4df8-950b-6dcaaa3ad9afcommand_prompt
1093executionT1651Cloud Administration Command1AWS Run Command (and Control)a3cc9c95-c160-4b86-af6f-84fba87bfd30powershell
1094executionT1059.005Command and Scripting Interpreter: Visual Basic1Visual Basic script execution to gather local computer information1620de42-160a-4fe5-bbaf-d3fef0181ce9powershell
1095executionT1059.005Command and Scripting Interpreter: Visual Basic2Encoded VBS code executione8209d5f-e42d-45e6-9c2f-633ac4f1eefapowershell
1096executionT1059.005Command and Scripting Interpreter: Visual Basic3Extract Memory via VBA8faff437-a114-4547-9a60-749652a03df6powershell
1097executionT1648Serverless Execution1Lambda Function Hijack87a4a141-c2bb-49d1-a604-8679082d8b91powershell
1098executionT1569.002System Services: Service Execution1Execute a Command as a Service2382dee2-a75f-49aa-9378-f52df6ed3fb1command_prompt
1099executionT1569.002System Services: Service Execution2Use PsExec to execute a command on a remote host873106b7-cfed-454b-8680-fa9f6400431ccommand_prompt
1100executionT1569.002System Services: Service Execution3psexec.py (Impacket)edbcd8c9-3639-4844-afad-455c91e95a35bash
1101executionT1569.002System Services: Service Execution4BlackCat pre-encryption cmds with Lateral Movement31eb7828-97d7-4067-9c1e-c6feb85edc4bpowershell
1102executionT1569.002System Services: Service Execution5Use RemCom to execute a command on a remote hosta5d8cdeb-be90-43a9-8b26-cc618deac1e0command_prompt
1103executionT1569.002System Services: Service Execution6Snake Malware Service Createb8db787e-dbea-493c-96cb-9272296ddc49command_prompt
1104executionT1569.002System Services: Service Execution7Modifying ACL of Service Control Manager via SDETbf07f520-3909-4ef5-aa22-877a50f2f77bcommand_prompt
1105executionT1569.002System Services: Service Execution8Pipe Creation - PsExec Tool Execution From Suspicious Locations004a5d68-627b-452d-af3d-43bd1fc75a3bpowershell
1106executionT1053.002Scheduled Task/Job: At1At.exe Scheduled task4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8command_prompt
1107executionT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
1108executionT1053.002Scheduled Task/Job: At3At - Schedule a job via kubectl in a Pod9ddf2e5e-7e2c-46c2-9940-3c2ff29c7213bash
1109persistenceT1053.005Scheduled Task/Job: Scheduled Task1Scheduled Task Startup Scriptfec27f65-db86-4c2d-b66c-61945aee87c2command_prompt
1110persistenceT1053.005Scheduled Task/Job: Scheduled Task2Scheduled task Local42f53695-ad4a-4546-abb6-7d837f644a71command_prompt
1111persistenceT1053.005Scheduled Task/Job: Scheduled Task3Scheduled task Remote2e5eac3e-327b-4a88-a0c0-c4057039a8ddcommand_prompt
1112persistenceT1053.005Scheduled Task/Job: Scheduled Task4Powershell Cmdlet Scheduled Taskaf9fd58f-c4ac-4bf2-a9ba-224b71ff25fdpowershell
1113persistenceT1053.005Scheduled Task/Job: Scheduled Task5Task Scheduler via VBAecd3fa21-7792-41a2-8726-2c5c673414d3powershell
1114persistenceT1053.005Scheduled Task/Job: Scheduled Task6WMI Invoke-CimMethod Scheduled Taske16b3b75-dc9e-4cde-a23d-dfa2d0507b3bpowershell
1115persistenceT1053.005Scheduled Task/Job: Scheduled Task7Scheduled Task Executing Base64 Encoded Commands From Registrye895677d-4f06-49ab-91b6-ae3742d0a2bacommand_prompt
1116persistenceT1053.005Scheduled Task/Job: Scheduled Task8Import XML Schedule Task with Hidden Attributecd925593-fbb4-486d-8def-16cbdf944bf4powershell
1117persistenceT1053.005Scheduled Task/Job: Scheduled Task9PowerShell Modify A Scheduled Taskdda6fc7b-c9a6-4c18-b98d-95ec6542af6dpowershell
1118persistenceT1053.005Scheduled Task/Job: Scheduled Task10Scheduled Task ("Ghost Task") via Registry Key Manipulation704333ca-cc12-4bcf-9916-101844881f54command_prompt
1119persistenceT1053.005Scheduled Task/Job: Scheduled Task11Scheduled Task Persistence via CompMgmt.msc8fcfa3d5-ea7d-4e1c-bd3e-3c4ed315b7d2command_prompt
1120persistenceT1053.005Scheduled Task/Job: Scheduled Task12Scheduled Task Persistence via Eventviewer.msc02124c37-767e-4b76-9383-c9fc366d9d4ccommand_prompt
1121persistenceT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
1122persistenceT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM rule (freebsd)b17eacac-282d-4ca8-a240-46602cf863e3sh
1123persistenceT1556.003Modify Authentication Process: Pluggable Authentication Modules3Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
1124persistenceT1546.013Event Triggered Execution: PowerShell Profile1Append malicious start-process cmdlet090e5aa5-32b6-473b-a49b-21e843a56896powershell
1125persistenceT1133External Remote Services1Running Chrome VPN Extensions via the Registry 2 vpn extension4c8db261-a58b-42a6-a866-0a294deedde4powershell
1126persistenceT1053.007Kubernetes Cronjob1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
1127persistenceT1053.007Kubernetes Cronjob2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
1128persistenceT1542.001Pre-OS Boot: System Firmware1UEFI Persistence via Wpbbin.exe File Creationb8a49f03-e3c4-40f2-b7bb-9e8f8fdddbf1powershell
1129persistenceT1574.011Hijack Execution Flow: Services Registry Permissions Weakness1Service Registry Permissions Weaknessf7536d63-7fd4-466f-89da-7e48d550752apowershell
1130persistenceT1574.011Hijack Execution Flow: Services Registry Permissions Weakness2Service ImagePath Change with reg.exef38e9eea-e1d7-4ba6-b716-584791963827command_prompt
1131persistenceT1547Boot or Logon Autostart Execution1Add a drivercb01b3da-b0e7-4e24-bf6d-de5223526785command_prompt
1132persistenceT1547Boot or Logon Autostart Execution2Driver Installation Using pnputil.exe5cb0b071-8a5a-412f-839d-116beb2ed9f7powershell
1133persistenceT1547Boot or Logon Autostart Execution3Leverage Virtual Channels to execute custom DLL during successful RDP sessionfdd45306-74f6-4ade-9a97-0a4895961228command_prompt
1134persistenceT1547.014Active Setup1HKLM - Add atomic_test key to launch executable as part of user setupdeff4586-0517-49c2-981d-bbea24d48d71powershell
1135persistenceT1547.014Active Setup2HKLM - Add malicious StubPath value to existing Active Setup Entry39e417dd-4fed-4d9c-ae3a-ba433b4d0e9apowershell
1136persistenceT1547.014Active Setup3HKLM - re-execute 'Internet Explorer Core Fonts' StubPath payload by decreasing version number04d55cef-f283-40ba-ae2a-316bc3b5e78cpowershell
1137persistenceT1543.003Create or Modify System Process: Windows Service1Modify Fax service to run PowerShelled366cde-7d12-49df-a833-671904770b9fcommand_prompt
1138persistenceT1543.003Create or Modify System Process: Windows Service2Service Installation CMD981e2942-e433-44e9-afc1-8c957a1496b6command_prompt
1139persistenceT1543.003Create or Modify System Process: Windows Service3Service Installation PowerShell491a4af6-a521-4b74-b23b-f7b3f1ee9e77powershell
1140persistenceT1543.003Create or Modify System Process: Windows Service4TinyTurla backdoor service w64timeef0581fd-528e-4662-87bc-4c2affb86940command_prompt
1141persistenceT1543.003Create or Modify System Process: Windows Service5Remote Service Installation CMDfb4151a2-db33-4f8c-b7f8-78ea8790f961command_prompt
1142persistenceT1543.003Create or Modify System Process: Windows Service6Modify Service to Run Arbitrary Binary (Powershell)1f896ce4-8070-4959-8a25-2658856a70c9powershell
1143persistenceT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75sh
1144persistenceT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
1145persistenceT1053.003Scheduled Task/Job: Cron3Cron - Add script to /etc/cron.d folder078e69eb-d9fb-450e-b9d0-2e118217c846sh
1146persistenceT1053.003Scheduled Task/Job: Cron4Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
1147persistenceT1137Office Application Startup1Office Application Startup - Outlook as a C2bfe6ac15-c50b-4c4f-a186-0fc6b8ba936ccommand_prompt
1148persistenceT1098.003Account Manipulation: Additional Cloud Roles1Azure AD - Add Company Administrator Role to a user4d77f913-56f5-4a14-b4b1-bf7bb24298adpowershell
1149persistenceT1098.003Account Manipulation: Additional Cloud Roles2Simulate - Post BEC persistence via user password reset followed by user added to company administrator role14f3af20-61f1-45b8-ad31-4637815f3f44powershell
1150persistenceT1547.012Boot or Logon Autostart Execution: Print Processors1Print Processorsf7d38f47-c61b-47cc-a59d-fc0368f47ed0powershell
1151persistenceT1574.001Hijack Execution Flow: DLL1DLL Search Order Hijacking - amsi.dll8549ad4b-b5df-4a2d-a3d7-2aee9e7052a3command_prompt
1152persistenceT1574.001Hijack Execution Flow: DLL2Phantom Dll Hijacking - WinAppXRT.dll46ed938b-c617-429a-88dc-d49b5c9ffedbcommand_prompt
1153persistenceT1574.001Hijack Execution Flow: DLL3Phantom Dll Hijacking - ualapi.dll5898902d-c5ad-479a-8545-6f5ab3cfc87fcommand_prompt
1154persistenceT1574.001Hijack Execution Flow: DLL4DLL Side-Loading using the Notepad++ GUP.exe binary65526037-7079-44a9-bda1-2cb624838040command_prompt
1155persistenceT1574.001Hijack Execution Flow: DLL5DLL Side-Loading using the dotnet startup hook environment variabled322cdd7-7d60-46e3-9111-648848da7c02command_prompt
1156persistenceT1574.001Hijack Execution Flow: DLL6DLL Search Order Hijacking,DLL Sideloading Of KeyScramblerIE.DLL Via KeyScrambler.EXEc095ad8e-4469-4d33-be9d-6f6d1fb21585powershell
1157persistenceT1137.006Office Application Startup: Add-ins1Code Executed Via Excel Add-in File (XLL)441b1a0f-a771-428a-8af0-e99e4698cda3powershell
1158persistenceT1137.006Office Application Startup: Add-ins2Persistent Code Execution Via Excel Add-in File (XLL)9c307886-9fef-41d5-b344-073a0f5b2f5fpowershell
1159persistenceT1137.006Office Application Startup: Add-ins3Persistent Code Execution Via Word Add-in File (WLL)95408a99-4fa7-4cd6-a7ef-cb65f86351cfpowershell
1160persistenceT1137.006Office Application Startup: Add-ins4Persistent Code Execution Via Excel VBA Add-in File (XLAM)082141ed-b048-4c86-99c7-2b8da5b5bf48powershell
1161persistenceT1137.006Office Application Startup: Add-ins5Persistent Code Execution Via PowerPoint VBA Add-in File (PPAM)f89e58f9-2b49-423b-ac95-1f3e7cfd8277powershell
1162persistenceT1505.002Server Software Component: Transport Agent1Install MS Exchange Transport Agent Persistence43e92449-ff60-46e9-83a3-1a38089df94dpowershell
1163persistenceT1556.002Modify Authentication Process: Password Filter DLL1Install and Register Password Filter DLLa7961770-beb5-4134-9674-83d7e1fa865cpowershell
1164persistenceT1556.002Modify Authentication Process: Password Filter DLL2Install Additional Authentication Packages91580da6-bc6e-431b-8b88-ac77180005f2powershell
1165persistenceT1505.005Server Software Component: Terminal Services DLL1Simulate Patching termsrv.dll0b2eadeb-4a64-4449-9d43-3d999f4a317bpowershell
1166persistenceT1505.005Server Software Component: Terminal Services DLL2Modify Terminal Services DLL Path18136e38-0530-49b2-b309-eed173787471powershell
1167persistenceT1176Browser Extensions1Chrome/Chromium (Developer Mode)3ecd790d-2617-4abf-9a8c-4e8d47da9ee1manual
1168persistenceT1176Browser Extensions2Chrome/Chromium (Chrome Web Store)4c83940d-8ca5-4bb2-8100-f46dc914bc3fmanual
1169persistenceT1176Browser Extensions3Firefoxcb790029-17e6-4c43-b96f-002ce5f10938manual
1170persistenceT1176Browser Extensions4Edge Chromium Addon - VPN3d456e2b-a7db-4af8-b5b3-720e7c4d9da5manual
1171persistenceT1176Browser Extensions5Google Chrome Load Unpacked Extension With Command Line7a714703-9f6b-461c-b06d-e6aeac650f27powershell
1172persistenceT1546.011Event Triggered Execution: Application Shimming1Application Shim Installation9ab27e22-ee62-4211-962b-d36d9a0e6a18command_prompt
1173persistenceT1546.011Event Triggered Execution: Application Shimming2New shim database files created in the default shim database directoryaefd6866-d753-431f-a7a4-215ca7e3f13dpowershell
1174persistenceT1546.011Event Triggered Execution: Application Shimming3Registry key creation and/or modification events for SDB9b6a06f9-ab5e-4e8d-8289-1df4289db02fpowershell
1175persistenceT1547.010Boot or Logon Autostart Execution: Port Monitors1Add Port Monitor persistence in Registryd34ef297-f178-4462-871e-9ce618d44e50command_prompt
1176persistenceT1037.002Boot or Logon Initialization Scripts: Logon Script (Mac)1Logon Scripts - Macf047c7de-a2d9-406e-a62b-12a09d9516f4manual
1177persistenceT1547.009Boot or Logon Autostart Execution: Shortcut Modification1Shortcut Modificationce4fc678-364f-4282-af16-2fb4c78005cecommand_prompt
1178persistenceT1547.009Boot or Logon Autostart Execution: Shortcut Modification2Create shortcut to cmd in startup folderscfdc954d-4bb0-4027-875b-a1893ce406f2powershell
1179persistenceT1547.005Boot or Logon Autostart Execution: Security Support Provider1Modify HKLM:\System\CurrentControlSet\Control\Lsa Security Support Provider configuration in registryafdfd7e3-8a0b-409f-85f7-886fdf249c9epowershell
1180persistenceT1547.005Boot or Logon Autostart Execution: Security Support Provider2Modify HKLM:\System\CurrentControlSet\Control\Lsa\OSConfig Security Support Provider configuration in registryde3f8e74-3351-4fdb-a442-265dbf231738powershell
1181persistenceT1112Modify Registry1Modify Registry of Current User Profile - cmd1324796b-d0f6-455a-b4ae-21ffee6aa6b9command_prompt
1182persistenceT1112Modify Registry2Modify Registry of Local Machine - cmd282f929a-6bc5-42b8-bd93-960c3ba35afecommand_prompt
1183persistenceT1112Modify Registry3Modify registry to store logon credentialsc0413fb5-33e2-40b7-9b6f-60b29f4a7a18command_prompt
1184persistenceT1112Modify Registry4Use Powershell to Modify registry to store logon credentials68254a85-aa42-4312-a695-38b7276307f8powershell
1185persistenceT1112Modify Registry5Add domain to Trusted sites Zonecf447677-5a4e-4937-a82c-e47d254afd57powershell
1186persistenceT1112Modify Registry6Javascript in registry15f44ea9-4571-4837-be9e-802431a7bfaepowershell
1187persistenceT1112Modify Registry7Change Powershell Execution Policy to Bypassf3a6cceb-06c9-48e5-8df8-8867a6814245powershell
1188persistenceT1112Modify Registry8BlackByte Ransomware Registry Changes - CMD4f4e2f9f-6209-4fcf-9b15-3b7455706f5bcommand_prompt
1189persistenceT1112Modify Registry9BlackByte Ransomware Registry Changes - Powershell0b79c06f-c788-44a2-8630-d69051f1123dpowershell
1190persistenceT1112Modify Registry10Disable Windows Registry Toolac34b0f7-0f85-4ac0-b93e-3ced2bc69bb8command_prompt
1191persistenceT1112Modify Registry11Disable Windows CMD applicationd2561a6d-72bd-408c-b150-13efe1801c2apowershell
1192persistenceT1112Modify Registry12Disable Windows Task Manager applicationaf254e70-dd0e-4de6-9afe-a994d9ea8b62command_prompt
1193persistenceT1112Modify Registry13Disable Windows Notification Centerc0d6d67f-1f63-42cc-95c0-5fd6b20082adcommand_prompt
1194persistenceT1112Modify Registry14Disable Windows Shutdown Button6e0d1131-2d7e-4905-8ca5-d6172f05d03dcommand_prompt
1195persistenceT1112Modify Registry15Disable Windows LogOff Buttone246578a-c24d-46a7-9237-0213ff86fb0ccommand_prompt
1196persistenceT1112Modify Registry16Disable Windows Change Password Featured4a6da40-618f-454d-9a9e-26af552aaeb0command_prompt
1197persistenceT1112Modify Registry17Disable Windows Lock Workstation Feature3dacb0d2-46ee-4c27-ac1b-f9886bf91a56command_prompt
1198persistenceT1112Modify Registry18Activate Windows NoDesktop Group Policy Feature93386d41-525c-4a1b-8235-134a628dee17command_prompt
1199persistenceT1112Modify Registry19Activate Windows NoRun Group Policy Featured49ff3cc-8168-4123-b5b3-f057d9abbd55command_prompt
1200persistenceT1112Modify Registry20Activate Windows NoFind Group Policy Featureffbb407e-7f1d-4c95-b22e-548169db1fbdcommand_prompt
1201persistenceT1112Modify Registry21Activate Windows NoControlPanel Group Policy Featurea450e469-ba54-4de1-9deb-9023a6111690command_prompt
1202persistenceT1112Modify Registry22Activate Windows NoFileMenu Group Policy Feature5e27bdb4-7fd9-455d-a2b5-4b4b22c9dea4command_prompt
1203persistenceT1112Modify Registry23Activate Windows NoClose Group Policy Feature12f50e15-dbc6-478b-a801-a746e8ba1723command_prompt
1204persistenceT1112Modify Registry24Activate Windows NoSetTaskbar Group Policy Featured29b7faf-7355-4036-9ed3-719bd17951edcommand_prompt
1205persistenceT1112Modify Registry25Activate Windows NoTrayContextMenu Group Policy Feature4d72d4b1-fa7b-4374-b423-0fe326da49d2command_prompt
1206persistenceT1112Modify Registry26Activate Windows NoPropertiesMyDocuments Group Policy Feature20fc9daa-bd48-4325-9aff-81b967a84b1dcommand_prompt
1207persistenceT1112Modify Registry27Hide Windows Clock Group Policy Feature8023db1e-ad06-4966-934b-b6a0ae52689ecommand_prompt
1208persistenceT1112Modify Registry28Windows HideSCAHealth Group Policy Featurea4637291-40b1-4a96-8c82-b28f1d73e54ecommand_prompt
1209persistenceT1112Modify Registry29Windows HideSCANetwork Group Policy Feature3e757ce7-eca0-411a-9583-1c33b8508d52command_prompt
1210persistenceT1112Modify Registry30Windows HideSCAPower Group Policy Feature8d85a5d8-702f-436f-bc78-fcd9119496fccommand_prompt
1211persistenceT1112Modify Registry31Windows HideSCAVolume Group Policy Feature7f037590-b4c6-4f13-b3cc-e424c5ab8adecommand_prompt
1212persistenceT1112Modify Registry32Windows Modify Show Compress Color And Info Tip Registry795d3248-0394-4d4d-8e86-4e8df2a2693fcommand_prompt
1213persistenceT1112Modify Registry33Windows Powershell Logging Disabled95b25212-91a7-42ff-9613-124aca6845a8command_prompt
1214persistenceT1112Modify Registry34Windows Add Registry Value to Load Service in Safe Mode without Network1dd59fb3-1cb3-4828-805d-cf80b4c3bbb5command_prompt
1215persistenceT1112Modify Registry35Windows Add Registry Value to Load Service in Safe Mode with Networkc173c948-65e5-499c-afbe-433722ed5bd4command_prompt
1216persistenceT1112Modify Registry36Disable Windows Toast Notifications003f466a-6010-4b15-803a-cbb478a314d7command_prompt
1217persistenceT1112Modify Registry37Disable Windows Security Center Notifications45914594-8df6-4ea9-b3cc-7eb9321a807ecommand_prompt
1218persistenceT1112Modify Registry38Suppress Win Defender Notificationsc30dada3-7777-4590-b970-dc890b8cf113command_prompt
1219persistenceT1112Modify Registry39Allow RDP Remote Assistance Feature86677d0e-0b5e-4a2b-b302-454175f9aa9ecommand_prompt
1220persistenceT1112Modify Registry40NetWire RAT Registry Key Creation65704cd4-6e36-4b90-b6c1-dc29a82c8e56command_prompt
1221persistenceT1112Modify Registry41Ursnif Malware Registry Key Creationc375558d-7c25-45e9-bd64-7b23a97c1db0command_prompt
1222persistenceT1112Modify Registry42Terminal Server Client Connection History Cleared3448824b-3c35-4a9e-a8f5-f887f68bea21command_prompt
1223persistenceT1112Modify Registry43Disable Windows Error Reporting Settingsd2c9e41e-cd86-473d-980d-b6403562e3e1command_prompt
1224persistenceT1112Modify Registry44DisallowRun Execution Of Certain Applications71db768a-5a9c-4047-b5e7-59e01f188e84command_prompt
1225persistenceT1112Modify Registry45Enabling Restricted Admin Mode via Command_Promptfe7974e5-5813-477b-a7bd-311d4f535e83command_prompt
1226persistenceT1112Modify Registry46Mimic Ransomware - Enable Multiple User Sessions39f1f378-ba8a-42b3-96dc-2a6540cfc1e3command_prompt
1227persistenceT1112Modify Registry47Mimic Ransomware - Allow Multiple RDP Sessions per User35727d9e-7a7f-4d0c-a259-dc3906d6e8b9command_prompt
1228persistenceT1112Modify Registry48Event Viewer Registry Modification - Redirection URL6174be7f-5153-4afd-92c5-e0c3b7cdb5aecommand_prompt
1229persistenceT1112Modify Registry49Event Viewer Registry Modification - Redirection Program81483501-b8a5-4225-8b32-52128e2f69dbcommand_prompt
1230persistenceT1112Modify Registry50Enabling Remote Desktop Protocol via Remote Registrye3ad8e83-3089-49ff-817f-e52f8c948090command_prompt
1231persistenceT1112Modify Registry51Disable Win Defender Notification12e03af7-79f9-4f95-af48-d3f12f28a260command_prompt
1232persistenceT1112Modify Registry52Disable Windows OS Auto Update01b20ca8-c7a3-4d86-af59-059f15ed5474command_prompt
1233persistenceT1112Modify Registry53Disable Windows Auto Reboot for current logon user396f997b-c5f8-4a96-bb2c-3c8795cf459dcommand_prompt
1234persistenceT1112Modify Registry54Windows Auto Update Option to Notify before download335a6b15-b8d2-4a3f-a973-ad69aa2620d7command_prompt
1235persistenceT1112Modify Registry55Do Not Connect To Win Updated1de3767-99c2-4c6c-8c5a-4ba4586474c8command_prompt
1236persistenceT1112Modify Registry56Tamper Win Defender Protection3b625eaa-c10d-4635-af96-3eae7d2a2f3ccommand_prompt
1237persistenceT1112Modify Registry57Snake Malware Registry Blob8318ad20-0488-4a64-98f4-72525a012f6bpowershell
1238persistenceT1112Modify Registry58Allow Simultaneous Download Registry37950714-e923-4f92-8c7c-51e4b6fffbf6command_prompt
1239persistenceT1112Modify Registry59Modify Internet Zone Protocol Defaults in Current User Registry - cmdc88ef166-50fa-40d5-a80c-e2b87d4180f7command_prompt
1240persistenceT1112Modify Registry60Modify Internet Zone Protocol Defaults in Current User Registry - PowerShellb1a4d687-ba52-4057-81ab-757c3dc0d3b5powershell
1241persistenceT1112Modify Registry61Activities To Disable Secondary Authentication Detected By Modified Registry Value.c26fb85a-fa50-4fab-a64a-c51f5dc538d5command_prompt
1242persistenceT1112Modify Registry62Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value.ffeddced-bb9f-49c6-97f0-3d07a509bf94command_prompt
1243persistenceT1112Modify Registry63Scarab Ransomware Defense Evasion Activitiesca8ba39c-3c5a-459f-8e15-280aec65a910command_prompt
1244persistenceT1112Modify Registry64Disable Remote Desktop Anti-Alias Setting Through Registry61d35188-f113-4334-8245-8c6556d43909command_prompt
1245persistenceT1112Modify Registry65Disable Remote Desktop Security Settings Through Registry4b81bcfa-fb0a-45e9-90c2-e3efe5160140command_prompt
1246persistenceT1112Modify Registry66Disabling ShowUI Settings of Windows Error Reporting (WER)09147b61-40f6-4b2a-b6fb-9e73a3437c96command_prompt
1247persistenceT1112Modify Registry67Enable Proxy Settingseb0ba433-63e5-4a8c-a9f0-27c4192e1336command_prompt
1248persistenceT1112Modify Registry68Set-Up Proxy Serverd88a3d3b-d016-4939-a745-03638aafd21bcommand_prompt
1249persistenceT1112Modify Registry69RDP Authentication Level Override7e7b62e9-5f83-477d-8935-48600f38a3c6command_prompt
1250persistenceT1112Modify Registry70Enable RDP via Registry (fDenyTSConnections)16bdbe52-371c-4ccf-b708-79fba61f1db4command_prompt
1251persistenceT1112Modify Registry71Disable Windows Prefetch Through Registry7979dd41-2045-48b2-a54e-b1bc2415c9dacommand_prompt
1252persistenceT1112Modify Registry72Setting Shadow key in Registry for RDP Shadowingac494fe5-81a4-4897-af42-e774cf005ecbpowershell
1253persistenceT1112Modify Registry73Flush Shimcacheecbd533e-b45d-4239-aeff-b857c6f6d68bcommand_prompt
1254persistenceT1112Modify Registry74Disable Windows Remote Desktop Protocol5f8e36de-37ca-455e-b054-a2584f043c06command_prompt
1255persistenceT1112Modify Registry75Enforce Smart Card Authentication Through Registry4c4bf587-fe7f-448f-ba8d-1ecec9db88becommand_prompt
1256persistenceT1112Modify Registry76Requires the BitLocker PIN for Pre-boot authentication26fc7375-a551-4336-90d7-3f2817564304command_prompt
1257persistenceT1112Modify Registry77Modify EnableBDEWithNoTPM Registry entrybacb3e73-8161-43a9-8204-a69fe0e4b482command_prompt
1258persistenceT1112Modify Registry78Modify UseTPM Registry entry7c8c7bd8-0a5c-4514-a6a3-0814c5a98cf0command_prompt
1259persistenceT1112Modify Registry79Modify UseTPMPIN Registry entry10b33fb0-c58b-44cd-8599-b6da5ad6384ccommand_prompt
1260persistenceT1112Modify Registry80Modify UseTPMKey Registry entryc8480c83-a932-446e-a919-06a1fd1e512acommand_prompt
1261persistenceT1112Modify Registry81Modify UseTPMKeyPIN Registry entry02d8b9f7-1a51-4011-8901-2d55cca667f9command_prompt
1262persistenceT1112Modify Registry82Modify EnableNonTPM Registry entrye672a340-a933-447c-954c-d68db38a09b1command_prompt
1263persistenceT1112Modify Registry83Modify UsePartialEncryptionKey Registry entryb5169fd5-85c8-4b2c-a9b6-64cc0b9febefcommand_prompt
1264persistenceT1112Modify Registry84Modify UsePIN Registry entry3ac0b30f-532f-43c6-8f01-fb657aaed7e4command_prompt
1265persistenceT1112Modify Registry85Abusing Windows TelemetryController Registry Key for Persistence4469192c-2d2d-4a3a-9758-1f31d937a92bcommand_prompt
1266persistenceT1112Modify Registry86Modify RDP-Tcp Initial Program Registry Entryc691cee2-8d17-4395-b22f-00644c7f1c2dcommand_prompt
1267persistenceT1112Modify Registry87Abusing MyComputer Disk Cleanup Path for Persistencef2915249-4485-42e2-96b7-9bf34328d497command_prompt
1268persistenceT1112Modify Registry88Abusing MyComputer Disk Fragmentation Path for Persistence3235aafe-b49d-451b-a1f1-d979fa65ddafcommand_prompt
1269persistenceT1112Modify Registry89Abusing MyComputer Disk Backup Path for Persistence599f3b5c-0323-44ed-bb63-4551623bf675command_prompt
1270persistenceT1112Modify Registry90Adding custom paths for application execution573d15da-c34e-4c59-a7d2-18f20d92dfa3command_prompt
1271persistenceT1543.004Create or Modify System Process: Launch Daemon1Launch Daemon03ab8df5-3a6b-4417-b6bd-bb7a5cfd74cfbash
1272persistenceT1574.008Hijack Execution Flow: Path Interception by Search Order Hijacking1powerShell Persistence via hijacking default modules - Get-Variable.exe1561de08-0b4b-498e-8261-e922f3494aaepowershell
1273persistenceT1505.003Server Software Component: Web Shell1Web Shell Written to Disk0a2ce662-1efa-496f-a472-2fe7b080db16command_prompt
1274persistenceT1078.001Valid Accounts: Default Accounts1Enable Guest account with RDP capability and admin privileges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
1275persistenceT1078.001Valid Accounts: Default Accounts2Activate Guest Accountaa6cb8c4-b582-4f8e-b677-37733914abdacommand_prompt
1276persistenceT1078.001Valid Accounts: Default Accounts3Enable Guest Account on macOS0315bdff-4178-47e9-81e4-f31a6d23f7e4sh
1277persistenceT1547.003Time Providers1Create a new time providerdf1efab7-bc6d-4b88-8be9-91f55ae017aapowershell
1278persistenceT1547.003Time Providers2Edit an existing time provider29e0afca-8d1d-471a-8d34-25512fc48315powershell
1279persistenceT1546.005Event Triggered Execution: Trap1Trap EXITa74b2e07-5952-4c03-8b56-56274b076b61sh
1280persistenceT1546.005Event Triggered Execution: Trap2Trap EXIT (freebsd)be1a5d70-6865-44aa-ab50-42244c9fd16fsh
1281persistenceT1546.005Event Triggered Execution: Trap3Trap SIGINTa547d1ba-1d7a-4cc5-a9cb-8d65e8809636sh
1282persistenceT1546.005Event Triggered Execution: Trap4Trap SIGINT (freebsd)ade10242-1eac-43df-8412-be0d4c704adash
1283persistenceT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
1284persistenceT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
1285persistenceT1574.006Hijack Execution Flow: LD_PRELOAD3Dylib Injection via DYLD_INSERT_LIBRARIES4d66029d-7355-43fd-93a4-b63ba92ea1bebash
1286persistenceT1136.001Create Account: Local Account1Create a user account on a Linux system40d8eabd-e394-46f6-8785-b9bfa1d011d2bash
1287persistenceT1136.001Create Account: Local Account2Create a user account on a FreeBSD systema39ee1bc-b8c1-4331-8e5f-1859eb408518sh
1288persistenceT1136.001Create Account: Local Account3Create a user account on a MacOS system01993ba5-1da3-4e15-a719-b690d4f0f0b2bash
1289persistenceT1136.001Create Account: Local Account4Create a new user in a command prompt6657864e-0323-4206-9344-ac9cd7265a4fcommand_prompt
1290persistenceT1136.001Create Account: Local Account5Create a new user in PowerShellbc8be0ac-475c-4fbf-9b1d-9fffd77afbdepowershell
1291persistenceT1136.001Create Account: Local Account6Create a new user in Linux with `root` UID and GID.a1040a30-d28b-4eda-bd99-bb2861a4616cbash
1292persistenceT1136.001Create Account: Local Account7Create a new user in FreeBSD with `root` GID.d141afeb-d2bc-4934-8dd5-b7dba0f9f67ash
1293persistenceT1136.001Create Account: Local Account8Create a new Windows admin userfda74566-a604-4581-a4cc-fbbe21d66559command_prompt
1294persistenceT1136.001Create Account: Local Account9Create a new Windows admin user via .NET2170d9b5-bacd-4819-a952-da76dae0815fpowershell
1295persistenceT1136.001Create Account: Local Account10Create a Linux user via kubectl in a Podd9efa6c7-6518-42b2-809a-4f2a8e242b9bbash
1296persistenceT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL1Winlogon Shell Key Persistence - PowerShellbf9f9d65-ee4d-4c3e-a843-777d04f19c38powershell
1297persistenceT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL2Winlogon Userinit Key Persistence - PowerShellfb32c935-ee2e-454b-8fa3-1c46b42e8dfbpowershell
1298persistenceT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL3Winlogon Notify Key Logon Persistence - PowerShelld40da266-e073-4e5a-bb8b-2b385023e5f9powershell
1299persistenceT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL4Winlogon HKLM Shell Key Persistence - PowerShell95a3c42f-8c88-4952-ad60-13b81d929a9dpowershell
1300persistenceT1547.004Boot or Logon Autostart Execution: Winlogon Helper DLL5Winlogon HKLM Userinit Key Persistence - PowerShellf9b8daff-8fa7-4e6a-a1a7-7c14675a545bpowershell
1301persistenceT1098.004SSH Authorized Keys1Modify SSH Authorized Keys342cc723-127c-4d3a-8292-9c0c6b4ecadcsh
1302persistenceT1546.012Event Triggered Execution: Image File Execution Options Injection1IFEO Add Debuggerfdda2626-5234-4c90-b163-60849a24c0b8command_prompt
1303persistenceT1546.012Event Triggered Execution: Image File Execution Options Injection2IFEO Global Flags46b1f278-c8ee-4aa5-acce-65e77b11f3c1command_prompt
1304persistenceT1546.012Event Triggered Execution: Image File Execution Options Injection3GlobalFlags in Image File Execution Options13117939-c9b2-4a43-999e-0a543df92f0dpowershell
1305persistenceT1546.008Event Triggered Execution: Accessibility Features1Attaches Command Prompt as a Debugger to a List of Target Processes3309f53e-b22b-4eb6-8fd2-a6cf58b355a9powershell
1306persistenceT1546.008Event Triggered Execution: Accessibility Features2Replace binary of sticky keys934e90cf-29ca-48b3-863c-411737ad44e3command_prompt
1307persistenceT1546.008Event Triggered Execution: Accessibility Features3Create Symbolic Link From osk.exe to cmd.exe51ef369c-5e87-4f33-88cd-6d61be63edf2command_prompt
1308persistenceT1546.008Event Triggered Execution: Accessibility Features4Atbroker.exe (AT) Executes Arbitrary Command via Registry Key444ff124-4c83-4e28-8df6-6efd3ece6bd4command_prompt
1309persistenceT1546.008Event Triggered Execution: Accessibility Features5Auto-start application on user logon7125eba8-7b30-426b-9147-781d152be6fbcommand_prompt
1310persistenceT1546.008Event Triggered Execution: Accessibility Features6Replace utilman.exe (Ease of Access Binary) with cmd.exe1db380da-3422-481d-a3c8-6d5770dba580command_prompt
1311persistenceT1546.008Event Triggered Execution: Accessibility Features7Replace Magnify.exe (Magnifier binary) with cmd.exe5e4fa70d-c789-470e-85e1-6992b92bb321command_prompt
1312persistenceT1546.008Event Triggered Execution: Accessibility Features8Replace Narrator.exe (Narrator binary) with cmd.exe2002f5ea-cd13-4c82-bf73-e46722e5dc5ecommand_prompt
1313persistenceT1546.008Event Triggered Execution: Accessibility Features9Replace DisplaySwitch.exe (Display Switcher binary) with cmd.exe825ba8ca-71cc-436b-b1dd-ea0d5e109086command_prompt
1314persistenceT1546.008Event Triggered Execution: Accessibility Features10Replace AtBroker.exe (App Switcher binary) with cmd.exe210be7ea-d841-40ec-b3e1-ff610bb62744command_prompt
1315persistenceT1136.002Create Account: Domain Account1Create a new Windows domain admin userfcec2963-9951-4173-9bfa-98d8b7834e62command_prompt
1316persistenceT1136.002Create Account: Domain Account2Create a new account similar to ANONYMOUS LOGONdc7726d2-8ccb-4cc6-af22-0d5afb53a548command_prompt
1317persistenceT1136.002Create Account: Domain Account3Create a new Domain Account using PowerShell5a3497a4-1568-4663-b12a-d4a5ed70c7d7powershell
1318persistenceT1136.002Create Account: Domain Account4Active Directory Create Admin Account562aa072-524e-459a-ba2b-91f1afccf5absh
1319persistenceT1136.002Create Account: Domain Account5Active Directory Create User Account (Non-elevated)8c992cb3-a46e-4fd5-b005-b1bab185af31sh
1320persistenceT1137.001Office Application Startup: Office Template Macros.1Injecting a Macro into the Word Normal.dotm Template for Persistence via PowerShell940db09e-80b6-4dd0-8d4d-7764f89b47a8powershell
1321persistenceT1546.009Event Triggered Execution: AppCert DLLs1Create registry persistence via AppCert DLLa5ad6104-5bab-4c43-b295-b4c44c7c6b05powershell
1322persistenceT1547.015Boot or Logon Autostart Execution: Login Items1Persistence by modifying Windows Terminal profileec5d76ef-82fe-48da-b931-bdb25a62bc65powershell
1323persistenceT1547.015Boot or Logon Autostart Execution: Login Items2Add macOS LoginItem using Applescript716e756a-607b-41f3-8204-b214baf37c1dbash
1324persistenceT1098.001Account Manipulation: Additional Cloud Credentials1Azure AD Application Hijacking - Service Principalb8e747c3-bdf7-4d71-bce2-f1df2a057406powershell
1325persistenceT1098.001Account Manipulation: Additional Cloud Credentials2Azure AD Application Hijacking - App Registrationa12b5531-acab-4618-a470-0dafb294a87apowershell
1326persistenceT1098.001Account Manipulation: Additional Cloud Credentials3AWS - Create Access Key and Secret Key8822c3b0-d9f9-4daf-a043-491160a31122sh
1327persistenceT1546.003Event Triggered Execution: Windows Management Instrumentation Event Subscription1Persistence via WMI Event Subscription - CommandLineEventConsumer3c64f177-28e2-49eb-a799-d767b24dd1e0powershell
1328persistenceT1546.003Event Triggered Execution: Windows Management Instrumentation Event Subscription2Persistence via WMI Event Subscription - ActiveScriptEventConsumerfecd0dfd-fb55-45fa-a10b-6250272d0832powershell
1329persistenceT1546.003Event Triggered Execution: Windows Management Instrumentation Event Subscription3Windows MOFComp.exe Load MOF File29786d7e-8916-4de6-9c55-be7b093b2706powershell
1330persistenceT1546.001Event Triggered Execution: Change Default File Association1Change Default File Association10a08978-2045-4d62-8c42-1957bbbea102command_prompt
1331persistenceT1546.014Event Triggered Execution: Emond1Persistance with Event Monitor - emond23c9c127-322b-4c75-95ca-eff464906114sh
1332persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder1Reg Key Rune55be3fd-3521-4610-9d1a-e210e42dcf05command_prompt
1333persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder2Reg Key RunOnce554cbd88-cde1-4b56-8168-0be552eed9ebcommand_prompt
1334persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder3PowerShell Registry RunOnceeb44f842-0457-4ddc-9b92-c4caa144ac42powershell
1335persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder4Suspicious vbs file run from startup Folder2cb98256-625e-4da9-9d44-f2e5f90b8bd5powershell
1336persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder5Suspicious jse file run from startup Folderdade9447-791e-4c8f-b04b-3a35855dfa06powershell
1337persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder6Suspicious bat file run from startup Folder5b6768e4-44d2-44f0-89da-a01d1430fd5epowershell
1338persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder7Add Executable Shortcut Link to User Startup Folder24e55612-85f6-4bd6-ae74-a73d02e3441dpowershell
1339persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder8Add persistance via Recycle binbda6a3d6-7aa7-4e89-908b-306772e9662fcommand_prompt
1340persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder9SystemBC Malware-as-a-Service Registry9dc7767b-30c1-4cc4-b999-50cab5e27891powershell
1341persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder10Change Startup Folder - HKLM Modify User Shell Folders Common Startup Valueacfef903-7662-447e-a391-9c91c2f00f7bpowershell
1342persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder11Change Startup Folder - HKCU Modify User Shell Folders Startup Value8834b65a-f808-4ece-ad7e-2acdf647aafapowershell
1343persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder12HKCU - Policy Settings Explorer Run Keya70faea1-e206-4f6f-8d9a-67379be8f6f1powershell
1344persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder13HKLM - Policy Settings Explorer Run Keyb5c9a9bc-dda3-4ea0-b16a-add8e81ab75fpowershell
1345persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder14HKLM - Append Command to Winlogon Userinit KEY Valuef7fab6cc-8ece-4ca7-a0f1-30a22fccd374powershell
1346persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder15HKLM - Modify default System Shell - Winlogon Shell KEY Value 1d958c61-09c6-4d9e-b26b-4130314e520epowershell
1347persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder16secedit used to create a Run key in the HKLM Hive14fdc3f1-6fc3-4556-8d36-aa89d9d42d02command_prompt
1348persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder17Modify BootExecute Valuebefc2b40-d487-4a5a-8813-c11085fb5672powershell
1349persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder18Allowing custom application to execute during new RDP logon sessionb051b3c0-66e7-4a81-916d-e6383bd3a669command_prompt
1350persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder19Creating Boot Verification Program Key for application execution during successful boot6e1666d5-3f2b-4b9a-80aa-f011322380d4command_prompt
1351persistenceT1547.001Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder20Add persistence via Windows Context Menude47f4a0-2acb-416d-9a6b-cee584a4c4d1command_prompt
1352persistenceT1136.003Create Account: Cloud Account1AWS - Create a new IAM user8d1c2368-b503-40c9-9057-8e42f21c58adsh
1353persistenceT1136.003Create Account: Cloud Account2Azure AD - Create a new usere62d23ef-3153-4837-8625-fa4a3829134dpowershell
1354persistenceT1136.003Create Account: Cloud Account3Azure AD - Create a new user via Azure CLI228c7498-be31-48e9-83b7-9cb906504ec8powershell
1355persistenceT1098Account Manipulation1Admin Account Manipulate5598f7cb-cf43-455e-883a-f6008c5d46afpowershell
1356persistenceT1098Account Manipulation2Domain Account and Group Manipulatea55a22e9-a3d3-42ce-bd48-2653adb8f7a9powershell
1357persistenceT1098Account Manipulation3AWS - Create a group and add a user to that group8822c3b0-d9f9-4daf-a043-49f110a31122sh
1358persistenceT1098Account Manipulation4Azure AD - adding user to Azure AD role0e65ae27-5385-46b4-98ac-607a8ee82261powershell
1359persistenceT1098Account Manipulation5Azure AD - adding service principal to Azure AD role92c40b3f-c406-4d1f-8d2b-c039bf5009e4powershell
1360persistenceT1098Account Manipulation6Azure - adding user to Azure role in subscription1a94b3fc-b080-450a-b3d8-6d9b57b472eapowershell
1361persistenceT1098Account Manipulation7Azure - adding service principal to Azure role in subscriptionc8f4bc29-a151-48da-b3be-4680af56f404powershell
1362persistenceT1098Account Manipulation8Azure AD - adding permission to application94ea9cc3-81f9-4111-8dde-3fb54f36af4bpowershell
1363persistenceT1098Account Manipulation9Password Change on Directory Service Restore Mode (DSRM) Accountd5b886d9-d1c7-4b6e-a7b0-460041bf2823command_prompt
1364persistenceT1098Account Manipulation10Domain Password Policy Check: Short Passwordfc5f9414-bd67-4f5f-a08e-e5381e29cbd1powershell
1365persistenceT1098Account Manipulation11Domain Password Policy Check: No Number in Password68190529-069b-4ffc-a942-919704158065powershell
1366persistenceT1098Account Manipulation12Domain Password Policy Check: No Special Character in Password7d984ef2-2db2-4cec-b090-e637e1698f61powershell
1367persistenceT1098Account Manipulation13Domain Password Policy Check: No Uppercase Character in Passwordb299c120-44a7-4d68-b8e2-8ba5a28511ecpowershell
1368persistenceT1098Account Manipulation14Domain Password Policy Check: No Lowercase Character in Password945da11e-977e-4dab-85d2-f394d03c5887powershell
1369persistenceT1098Account Manipulation15Domain Password Policy Check: Only Two Character Classes784d1349-5a26-4d20-af5e-d6af53bae460powershell
1370persistenceT1098Account Manipulation16Domain Password Policy Check: Common Password Use81959d03-c51f-49a1-bb24-23f1ec885578powershell
1371persistenceT1098Account Manipulation17GCP - Delete Service Account Key7ece1dea-49f1-4d62-bdcc-5801e3292510sh
1372persistenceT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
1373persistenceT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions2MacOS - Load Kernel Module via kextload and kmutilf4391089-d3a5-4dd1-ab22-0419527f2672bash
1374persistenceT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions3MacOS - Load Kernel Module via KextManagerLoadKextWithURL()f0007753-beb3-41ea-9948-760785e4c1e5bash
1375persistenceT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions4Snake Malware Kernel Driver Comadmine5cb5564-cc7b-4050-86e8-f2d9eec1941fpowershell
1376persistenceT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
1377persistenceT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
1378persistenceT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
1379persistenceT1505.004IIS Components1Install IIS Module using AppCmd.exe53adbdfa-8200-490c-871c-d3b1ab3324b2command_prompt
1380persistenceT1505.004IIS Components2Install IIS Module using PowerShell Cmdlet New-WebGlobalModulecc3381fb-4bd0-405c-a8e4-6cacfac3b06cpowershell
1381persistenceT1546Event Triggered Execution1Persistence with Custom AutodialDLLaca9ae16-7425-4b6d-8c30-cad306fdbd5bpowershell
1382persistenceT1546Event Triggered Execution2HKLM - Persistence using CommandProcessor AutoRun key (With Elevation)a574dafe-a903-4cce-9701-14040f4f3532powershell
1383persistenceT1546Event Triggered Execution3HKCU - Persistence using CommandProcessor AutoRun key (Without Elevation)36b8dbf9-59b1-4e9b-a3bb-36e80563ef01powershell
1384persistenceT1546Event Triggered Execution4WMI Invoke-CimMethod Start Processadae83d3-0df6-45e7-b2c3-575f91584577powershell
1385persistenceT1546Event Triggered Execution5Adding custom debugger for Windows Error Reporting17d1a3cc-3373-495a-857a-e5dd005fb302command_prompt
1386persistenceT1546Event Triggered Execution6Load custom DLL on mstsc execution2db7852e-5a32-4ec7-937f-f4e027881700command_prompt
1387persistenceT1546Event Triggered Execution7Persistence using automatic execution of custom DLL during RDP sessionb7fc4c3f-fe6e-479a-ba27-ef91b88536e3command_prompt
1388persistenceT1546Event Triggered Execution8Persistence via ErrorHandler.cmd script execution547a4736-dd1c-4b48-b4fe-e916190bb2e7powershell
1389persistenceT1546Event Triggered Execution9Persistence using STARTUP-PATH in MS-WORDf0027655-25ef-47b0-acaf-3d83d106156ccommand_prompt
1390persistenceT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
1391persistenceT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
1392persistenceT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc3Add command to .shrc41502021-591a-4649-8b6e-83c9192aff53sh
1393persistenceT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc4Append to the system shell profile694b3cc8-6a78-4d35-9e74-0123d009e94bsh
1394persistenceT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc5Append commands user shell profilebbdb06bc-bab6-4f5b-8232-ba3fbed51d77sh
1395persistenceT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc6System shell profile scripts8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4sh
1396persistenceT1546.004Event Triggered Execution: .bash_profile .bashrc and .shrc7Create/Append to .bash_logout37ad2f24-7c53-4a50-92da-427a4ad13f58bash
1397persistenceT1547.002Authentication Package1Authentication Packagebe2590e8-4ac3-47ac-b4b5-945820f2fbe9powershell
1398persistenceT1546.015Event Triggered Execution: Component Object Model Hijacking1COM Hijacking - InprocServer3248117158-d7be-441b-bc6a-d9e36e47b52bpowershell
1399persistenceT1546.015Event Triggered Execution: Component Object Model Hijacking2Powershell Execute COM Object752191b1-7c71-445c-9dbe-21bb031b18ebpowershell
1400persistenceT1546.015Event Triggered Execution: Component Object Model Hijacking3COM Hijacking with RunDLL32 (Local Server Switch)123520cc-e998-471b-a920-bd28e3feafa0powershell
1401persistenceT1546.015Event Triggered Execution: Component Object Model Hijacking4COM hijacking via TreatAs33eacead-f117-4863-8eb0-5c6304fbfaa9powershell
1402persistenceT1137.004Office Application Startup: Outlook Home Page1Install Outlook Home Page Persistence7a91ad51-e6d2-4d43-9471-f26362f5738ecommand_prompt
1403persistenceT1574.009Hijack Execution Flow: Path Interception by Unquoted Path1Execution of program.exe as service with unquoted service path2770dea7-c50f-457b-84c4-c40a47460d9fcommand_prompt
1404persistenceT1037.005Boot or Logon Initialization Scripts: Startup Items1Add file to Local Library StartupItems134627c3-75db-410e-bff8-7a920075f198sh
1405persistenceT1037.005Boot or Logon Initialization Scripts: Startup Items2Add launch script to launch daemonfc369906-90c7-4a15-86fd-d37da624dde6bash
1406persistenceT1037.005Boot or Logon Initialization Scripts: Startup Items3Add launch script to launch agent10cf5bec-49dd-4ebf-8077-8f47e420096fbash
1407persistenceT1197BITS Jobs1Bitsadmin Download (cmd)3c73d728-75fb-4180-a12f-6712864d7421command_prompt
1408persistenceT1197BITS Jobs2Bitsadmin Download (PowerShell)f63b8bc4-07e5-4112-acba-56f646f3f0bcpowershell
1409persistenceT1197BITS Jobs3Persist, Download, & Execute62a06ec5-5754-47d2-bcfc-123d8314c6aecommand_prompt
1410persistenceT1197BITS Jobs4Bits download using desktopimgdownldr.exe (cmd)afb5e09e-e385-4dee-9a94-6ee60979d114command_prompt
1411persistenceT1546.010Event Triggered Execution: AppInit DLLs1Install AppInit Shima58d9386-3080-4242-ab5f-454c16503d18command_prompt
1412persistenceT1546.002Event Triggered Execution: Screensaver1Set Arbitrary Binary as Screensaver281201e7-de41-4dc9-b73d-f288938cbb64command_prompt
1413persistenceT1543.001Create or Modify System Process: Launch Agent1Launch Agenta5983dee-bf6c-4eaf-951c-dbc1a7b90900bash
1414persistenceT1543.001Create or Modify System Process: Launch Agent2Event Monitor Daemon Persistence11979f23-9b9d-482a-9935-6fc9cd022c3ebash
1415persistenceT1543.001Create or Modify System Process: Launch Agent3Launch Agent - Root Directory66774fa8-c562-4bae-a58d-5264a0dd9dd7bash
1416persistenceT1037.004Boot or Logon Initialization Scripts: Rc.common1rc.common97a48daa-8bca-4bc0-b1a9-c1d163e762debash
1417persistenceT1037.004Boot or Logon Initialization Scripts: Rc.common2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
1418persistenceT1037.004Boot or Logon Initialization Scripts: Rc.common3rc.local126f71af-e1c9-405c-94ef-26a47b16c102sh
1419persistenceT1543.002Create or Modify System Process: SysV/Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
1420persistenceT1543.002Create or Modify System Process: SysV/Systemd Service2Create SysV Service760fe8d2-79d9-494f-905e-a239a3df86f6sh
1421persistenceT1543.002Create or Modify System Process: SysV/Systemd Service3Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
1422persistenceT1547.007Boot or Logon Autostart Execution: Re-opened Applications1Copy in loginwindow.plist for Re-Opened Applications5fefd767-ef54-4ac6-84d3-751ab85e8abash
1423persistenceT1547.007Boot or Logon Autostart Execution: Re-opened Applications2Re-Opened Applications using LoginHook5f5b71da-e03f-42e7-ac98-d63f9e0465cbsh
1424persistenceT1547.007Boot or Logon Autostart Execution: Re-opened Applications3Append to existing loginwindow for Re-Opened Applications766b6c3c-9353-4033-8b7e-38b309fa3a93sh
1425persistenceT1098.002Account Manipulation: Additional Email Delegate Permissions1EXO - Full access mailbox permission granted to a user17d046be-fdd0-4cbb-b5c7-55c85d9d0714powershell
1426persistenceT1037.001Boot or Logon Initialization Scripts: Logon Script (Windows)1Logon Scriptsd6042746-07d4-4c92-9ad8-e644c114a231command_prompt
1427persistenceT1137.002Office Application Startup: Office Test1Office Application Startup Test Persistence (HKCU)c3e35b58-fe1c-480b-b540-7600fb612563powershell
1428persistenceT1547.008Boot or Logon Autostart Execution: LSASS Driver1Modify Registry to load Arbitrary DLL into LSASS - LsaDbExtPt8ecef16d-d289-46b4-917b-0dba6dc81cf1powershell
1429persistenceT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
1430persistenceT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
1431persistenceT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
1432persistenceT1053.002Scheduled Task/Job: At1At.exe Scheduled task4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8command_prompt
1433persistenceT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
1434persistenceT1053.002Scheduled Task/Job: At3At - Schedule a job via kubectl in a Pod9ddf2e5e-7e2c-46c2-9940-3c2ff29c7213bash
1435persistenceT1546.007Event Triggered Execution: Netsh Helper DLL1Netsh Helper DLL Registration3244697d-5a3a-4dfc-941c-550f69f91a4dcommand_prompt
1436persistenceT1078.003Valid Accounts: Local Accounts1Create local account with admin privilegesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
1437persistenceT1078.003Valid Accounts: Local Accounts2Create local account with admin privileges - MacOSf1275566-1c26-4b66-83e3-7f9f7f964daabash
1438persistenceT1078.003Valid Accounts: Local Accounts3Create local account with admin privileges using sysadminctl utility - MacOS191db57d-091a-47d5-99f3-97fde53de505bash
1439persistenceT1078.003Valid Accounts: Local Accounts4Enable root account using dsenableroot utility - MacOS20b40ea9-0e17-4155-b8e6-244911a678acbash
1440persistenceT1078.003Valid Accounts: Local Accounts5Add a new/existing user to the admin group using dseditgroup utility - macOS433842ba-e796-4fd5-a14f-95d3a1970875bash
1441persistenceT1078.003Valid Accounts: Local Accounts6WinPwn - Loot local Credentials - powerhell kittie9e9fd066-453d-442f-88c1-ad7911d32912powershell
1442persistenceT1078.003Valid Accounts: Local Accounts7WinPwn - Loot local Credentials - Safetykatze9fdb899-a980-4ba4-934b-486ad22e22f4powershell
1443persistenceT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
1444persistenceT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
1445persistenceT1078.003Valid Accounts: Local Accounts10Reactivate a locked/expired account (FreeBSD)09e3380a-fae5-4255-8b19-9950be0252cfsh
1446persistenceT1078.003Valid Accounts: Local Accounts11Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
1447persistenceT1078.003Valid Accounts: Local Accounts12Login as nobody (freebsd)16f6374f-7600-459a-9b16-6a88fd96d310sh
1448persistenceT1078.003Valid Accounts: Local Accounts13Use PsExec to elevate to NT Authority\SYSTEM account6904235f-0f55-4039-8aed-41c300ff7733command_prompt
1449persistenceT1574.012Hijack Execution Flow: COR_PROFILER1User scope COR_PROFILER9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5apowershell
1450persistenceT1574.012Hijack Execution Flow: COR_PROFILER2System Scope COR_PROFILERf373b482-48c8-4ce4-85ed-d40c8b3f7310powershell
1451persistenceT1574.012Hijack Execution Flow: COR_PROFILER3Registry-free process scope COR_PROFILER79d57242-bbef-41db-b301-9d01d9f6e817powershell
1452command-and-controlT1132.001Data Encoding: Standard Encoding1Base64 Encoded data.1164f70f-9a88-4dff-b9ff-dc70e7bf0c25sh
1453command-and-controlT1132.001Data Encoding: Standard Encoding2Base64 Encoded data (freebsd)2d97c626-7652-449e-a986-b02d9051c298sh
1454command-and-controlT1132.001Data Encoding: Standard Encoding3XOR Encoded data.c3ed6d2a-e3ad-400d-ad78-bbfdbfeacc08powershell
1455command-and-controlT1071.004Application Layer Protocol: DNS1DNS Large Query Volume1700f5d6-5a44-487b-84de-bc66f507b0a6powershell
1456command-and-controlT1071.004Application Layer Protocol: DNS2DNS Regular Beaconing3efc144e-1af8-46bb-8ca2-1376bb6db8b6powershell
1457command-and-controlT1071.004Application Layer Protocol: DNS3DNS Long Domain Queryfef31710-223a-40ee-8462-a396d6b66978powershell
1458command-and-controlT1071.004Application Layer Protocol: DNS4DNS C2e7bf9802-2e78-4db9-93b5-181b7bcd37d7powershell
1459command-and-controlT1071Application Layer Protocol1Telnet C23b0df731-030c-4768-b492-2a3216d90e53powershell
1460command-and-controlT1219Remote Access Software1TeamViewer Files Detected Test on Windows8ca3b96d-8983-4a7f-b125-fc98cc0a2aa0powershell
1461command-and-controlT1219Remote Access Software2AnyDesk Files Detected Test on Windows6b8b7391-5c0a-4f8c-baee-78d8ce0ce330powershell
1462command-and-controlT1219Remote Access Software3LogMeIn Files Detected Test on Windowsd03683ec-aae0-42f9-9b4c-534780e0f8e1powershell
1463command-and-controlT1219Remote Access Software4GoToAssist Files Detected Test on Windows1b72b3bd-72f8-4b63-a30b-84e91b9c3578powershell
1464command-and-controlT1219Remote Access Software5ScreenConnect Application Download and Install on Windows4a18cc4e-416f-4966-9a9d-75731c4684c0powershell
1465command-and-controlT1219Remote Access Software6Ammyy Admin Software Execution0ae9e327-3251-465a-a53b-485d4e3f58fapowershell
1466command-and-controlT1219Remote Access Software7RemotePC Software Executionfbff3f1f-b0bf-448e-840f-7e1687affdcepowershell
1467command-and-controlT1219Remote Access Software8NetSupport - RAT Executionecca999b-e0c8-40e8-8416-ad320b146a75powershell
1468command-and-controlT1219Remote Access Software9UltraViewer - RAT Execution19acf63b-55c4-4b6a-8552-00a8865105c8powershell
1469command-and-controlT1219Remote Access Software10UltraVNC Execution42e51815-a6cc-4c75-b970-3f0ff54b610epowershell
1470command-and-controlT1219Remote Access Software11MSP360 Connect Executionb1b8128b-c5d4-4de9-bf70-e60419274562powershell
1471command-and-controlT1219Remote Access Software12RustDesk Files Detected Test on Windowsf1641ba9-919a-4323-b74f-33372333bf0epowershell
1472command-and-controlT1219Remote Access Software13Splashtop Executionb025c580-029e-4023-888d-a42710d76934powershell
1473command-and-controlT1219Remote Access Software14Splashtop Streamer Execution3e1858ee-3550-401c-86ec-5e70ed79295bpowershell
1474command-and-controlT1219Remote Access Software15Microsoft App Quick Assist Execution1aea6d15-70f1-4b4e-8b02-397b5d5ffe75powershell
1475command-and-controlT1572Protocol Tunneling1DNS over HTTPS Large Query Volumeae9ef4b0-d8c1-49d4-8758-06206f19af0apowershell
1476command-and-controlT1572Protocol Tunneling2DNS over HTTPS Regular Beaconing0c5f9705-c575-42a6-9609-cbbff4b2fc9bpowershell
1477command-and-controlT1572Protocol Tunneling3DNS over HTTPS Long Domain Query748a73d5-cea4-4f34-84d8-839da5baa99cpowershell
1478command-and-controlT1572Protocol Tunneling4run ngrok4cdc9fc7-53fb-4894-9f0c-64836943ea60powershell
1479command-and-controlT1572Protocol Tunneling5Microsoft Dev tunnels (Linux/macOS)9f94a112-1ce2-464d-a63b-83c1f465f801bash
1480command-and-controlT1572Protocol Tunneling6VSCode tunnels (Linux/macOS)b877943f-0377-44f4-8477-f79db7f07c4dsh
1481command-and-controlT1572Protocol Tunneling7Cloudflare tunnels (Linux/macOS)228c336a-2f79-4043-8aef-bfa453a611d5sh
1482command-and-controlT1090.003Proxy: Multi-hop Proxy1Psiphon14d55ca0-920e-4b44-8425-37eedd72b173powershell
1483command-and-controlT1090.003Proxy: Multi-hop Proxy2Tor Proxy Usage - Windows7b9d85e5-c4ce-4434-8060-d3de83595e69powershell
1484command-and-controlT1090.003Proxy: Multi-hop Proxy3Tor Proxy Usage - Debian/Ubuntu/FreeBSD5ff9d047-6e9c-4357-b39b-5cf89d9b59c7sh
1485command-and-controlT1090.003Proxy: Multi-hop Proxy4Tor Proxy Usage - MacOS12631354-fdbc-4164-92be-402527e748dash
1486command-and-controlT1571Non-Standard Port1Testing usage of uncommonly used port with PowerShell21fe622f-8e53-4b31-ba83-6d333c2583f4powershell
1487command-and-controlT1571Non-Standard Port2Testing usage of uncommonly used port5db21e1d-dd9c-4a50-b885-b1e748912767sh
1488command-and-controlT1573Encrypted Channel1OpenSSL C221caf58e-87ad-440c-a6b8-3ac259964003powershell
1489command-and-controlT1095Non-Application Layer Protocol1ICMP C20268e63c-e244-42db-bef7-72a9e59fc1fcpowershell
1490command-and-controlT1095Non-Application Layer Protocol2Netcat C2bcf0d1c1-3f6a-4847-b1c9-7ed4ea321f37powershell
1491command-and-controlT1095Non-Application Layer Protocol3Powercat C23e0e0e7f-6aa2-4a61-b61d-526c2cc9330epowershell
1492command-and-controlT1095Non-Application Layer Protocol4Linux ICMP Reverse Shell using icmp-cnc8e139e1f-1f3a-4be7-901d-afae9738c064manual
1493command-and-controlT1071.001Application Layer Protocol: Web Protocols1Malicious User Agents - Powershell81c13829-f6c9-45b8-85a6-053366d55297powershell
1494command-and-controlT1071.001Application Layer Protocol: Web Protocols2Malicious User Agents - CMDdc3488b0-08c7-4fea-b585-905c83b48180command_prompt
1495command-and-controlT1071.001Application Layer Protocol: Web Protocols3Malicious User Agents - Nix2d7c471a-e887-4b78-b0dc-b0df1f2e0658sh
1496command-and-controlT1105Ingress Tool Transfer1rsync remote file copy (push)0fc6e977-cb12-44f6-b263-2824ba917409sh
1497command-and-controlT1105Ingress Tool Transfer2rsync remote file copy (pull)3180f7d5-52c0-4493-9ea0-e3431a84773fsh
1498command-and-controlT1105Ingress Tool Transfer3scp remote file copy (push)83a49600-222b-4866-80a0-37736ad29344sh
1499command-and-controlT1105Ingress Tool Transfer4scp remote file copy (pull)b9d22b9a-9778-4426-abf0-568ea64e9c33sh
1500command-and-controlT1105Ingress Tool Transfer5sftp remote file copy (push)f564c297-7978-4aa9-b37a-d90477feea4ebash
1501command-and-controlT1105Ingress Tool Transfer6sftp remote file copy (pull)0139dba1-f391-405e-a4f5-f3989f2c88efsh
1502command-and-controlT1105Ingress Tool Transfer7certutil download (urlcache)dd3b61dd-7bbc-48cd-ab51-49ad1a776df0command_prompt
1503command-and-controlT1105Ingress Tool Transfer8certutil download (verifyctl)ffd492e3-0455-4518-9fb1-46527c9f241bpowershell
1504command-and-controlT1105Ingress Tool Transfer9Windows - BITSAdmin BITS Downloada1921cd3-9a2d-47d5-a891-f1d0f2a7a31bcommand_prompt
1505command-and-controlT1105Ingress Tool Transfer10Windows - PowerShell Download42dc4460-9aa6-45d3-b1a6-3955d34e1fe8powershell
1506command-and-controlT1105Ingress Tool Transfer11OSTAP Worming Activity2ca61766-b456-4fcf-a35a-1233685e1cadcommand_prompt
1507command-and-controlT1105Ingress Tool Transfer12svchost writing a file to a UNC pathfa5a2759-41d7-4e13-a19c-e8f28a53566fcommand_prompt
1508command-and-controlT1105Ingress Tool Transfer13Download a File with Windows Defender MpCmdRun.exe815bef8b-bf91-4b67-be4c-abe4c2a94ccccommand_prompt
1509command-and-controlT1105Ingress Tool Transfer14whois file downloadc99a829f-0bb8-4187-b2c6-d47d1df74cabsh
1510command-and-controlT1105Ingress Tool Transfer15File Download via PowerShell54a4daf1-71df-4383-9ba7-f1a295d8b6d2powershell
1511command-and-controlT1105Ingress Tool Transfer16File download with finger.exe on Windows5f507e45-8411-4f99-84e7-e38530c45d01command_prompt
1512command-and-controlT1105Ingress Tool Transfer17Download a file with IMEWDBLD.exe1a02df58-09af-4064-a765-0babe1a0d1e2powershell
1513command-and-controlT1105Ingress Tool Transfer18Curl Download File2b080b99-0deb-4d51-af0f-833d37c4ca6acommand_prompt
1514command-and-controlT1105Ingress Tool Transfer19Curl Upload File635c9a38-6cbf-47dc-8615-3810bc1167cfcommand_prompt
1515command-and-controlT1105Ingress Tool Transfer20Download a file with Microsoft Connection Manager Auto-Downloadd239772b-88e2-4a2e-8473-897503401bcccommand_prompt
1516command-and-controlT1105Ingress Tool Transfer21MAZE Propagation Script70f4d07c-5c3e-4d53-bb0a-cdf3ada14bafpowershell
1517command-and-controlT1105Ingress Tool Transfer22Printer Migration Command-Line Tool UNC share folder into a zip file49845fc1-7961-4590-a0f0-3dbcf065ae7ecommand_prompt
1518command-and-controlT1105Ingress Tool Transfer23Lolbas replace.exe use to copy file54782d65-12f0-47a5-b4c1-b70ee23de6dfcommand_prompt
1519command-and-controlT1105Ingress Tool Transfer24Lolbas replace.exe use to copy UNC fileed0335ac-0354-400c-8148-f6151d20035acommand_prompt
1520command-and-controlT1105Ingress Tool Transfer25certreq download6fdaae87-c05b-42f8-842e-991a74e8376bcommand_prompt
1521command-and-controlT1105Ingress Tool Transfer26Download a file using wscript97116a3f-efac-4b26-8336-b9cb18c45188command_prompt
1522command-and-controlT1105Ingress Tool Transfer27Linux Download File and Runbdc373c5-e9cf-4563-8a7b-a9ba720a90f3sh
1523command-and-controlT1105Ingress Tool Transfer28Nimgrab - Transfer Filesb1729c57-9384-4d1c-9b99-9b220afb384ecommand_prompt
1524command-and-controlT1105Ingress Tool Transfer29iwr or Invoke Web-Request downloadc01cad7f-7a4c-49df-985e-b190dcf6a279command_prompt
1525command-and-controlT1105Ingress Tool Transfer30Arbitrary file download using the Notepad++ GUP.exe binary66ee226e-64cb-4dae-80e3-5bf5763e4a51command_prompt
1526command-and-controlT1105Ingress Tool Transfer31File download via nscurl5bcefe5f-3f30-4f1c-a61a-8d7db3f4450csh
1527command-and-controlT1105Ingress Tool Transfer32File Download with Sqlcmd.exe6934c16e-0b3a-4e7f-ab8c-c414acd32181powershell
1528command-and-controlT1105Ingress Tool Transfer33Remote File Copy using PSCPc82b1e60-c549-406f-9b00-0a8ae31c9cfecommand_prompt
1529command-and-controlT1105Ingress Tool Transfer34Windows push file using scp.exe2a4b0d29-e5dd-4b66-b729-07423ba1cd9dpowershell
1530command-and-controlT1105Ingress Tool Transfer35Windows pull file using scp.exe401667dc-05a6-4da0-a2a7-acfe4819559cpowershell
1531command-and-controlT1105Ingress Tool Transfer36Windows push file using sftp.exe205e676e-0401-4bae-83a5-94b8c5daeb22powershell
1532command-and-controlT1105Ingress Tool Transfer37Windows pull file using sftp.exe3d25f1f2-55cb-4a41-a523-d17ad4cfba19powershell
1533command-and-controlT1105Ingress Tool Transfer38Download a file with OneDrive Standalone Updater3dd6a6cf-9c78-462c-bd75-e9b54fc8925bpowershell
1534command-and-controlT1105Ingress Tool Transfer39Curl Insecure Connection from a Pod7e2ad0db-1efa-4af2-a77c-bc6e87d7b3f3bash
1535command-and-controlT1001.002Data Obfuscation via Steganography1Steganographic Tarball Embeddingc7921449-8b62-4c4d-8a83-d9281ac0190bpowershell
1536command-and-controlT1001.002Data Obfuscation via Steganography2Embedded Script in Image Execution via Extract-Invoke-PSImage04bb8e3d-1670-46ab-a3f1-5cee64da29b6powershell
1537command-and-controlT1001.002Data Obfuscation via Steganography3Execute Embedded Script in Image via Steganography4ff61684-ad91-405c-9fbc-048354ff1d07sh
1538command-and-controlT1090.001Proxy: Internal Proxy1Connection Proxy0ac21132-4485-4212-a681-349e8a6637cdsh
1539command-and-controlT1090.001Proxy: Internal Proxy2Connection Proxy for macOS UI648d68c1-8bcd-4486-9abe-71c6655b6a2csh
1540command-and-controlT1090.001Proxy: Internal Proxy3portproxy reg keyb8223ea9-4be2-44a6-b50a-9657a3d4e72apowershell
1541collectionT1560.001Archive Collected Data: Archive via Utility1Compress Data for Exfiltration With Rar02ea31cb-3b4c-4a2d-9bf1-e4e70ebcf5d0command_prompt
1542collectionT1560.001Archive Collected Data: Archive via Utility2Compress Data and lock with password for Exfiltration with winrar8dd61a55-44c6-43cc-af0c-8bdda276860ccommand_prompt
1543collectionT1560.001Archive Collected Data: Archive via Utility3Compress Data and lock with password for Exfiltration with winzip01df0353-d531-408d-a0c5-3161bf822134command_prompt
1544collectionT1560.001Archive Collected Data: Archive via Utility4Compress Data and lock with password for Exfiltration with 7zipd1334303-59cb-4a03-8313-b3e24d02c198command_prompt
1545collectionT1560.001Archive Collected Data: Archive via Utility5Data Compressed - nix - zipc51cec55-28dd-4ad2-9461-1eacbc82c3a0bash
1546collectionT1560.001Archive Collected Data: Archive via Utility6Data Compressed - nix - gzip Single Filecde3c2af-3485-49eb-9c1f-0ed60e9cc0afsh
1547collectionT1560.001Archive Collected Data: Archive via Utility7Data Compressed - nix - tar Folder or File7af2b51e-ad1c-498c-aca8-d3290c19535ash
1548collectionT1560.001Archive Collected Data: Archive via Utility8Data Encrypted with zip and gpg symmetric0286eb44-e7ce-41a0-b109-3da516e05a5fsh
1549collectionT1560.001Archive Collected Data: Archive via Utility9Encrypts collected data with AES-256 and Base64a743e3a6-e8b2-4a30-abe7-ca85d201b5d3bash
1550collectionT1560.001Archive Collected Data: Archive via Utility10ESXi - Remove Syslog remote IP36c62584-d360-41d6-886f-d194654be7c2powershell
1551collectionT1560.001Archive Collected Data: Archive via Utility11Compress a File for Exfiltration using Makecab2a7bc405-9555-4f49-ace2-b2ae2941d629command_prompt
1552collectionT1560.001Archive Collected Data: Archive via Utility12Copy and Compress AppData Folder05e8942e-f04f-460a-b560-f7781257feecpowershell
1553collectionT1113Screen Capture1Screencapture0f47ceb1-720f-4275-96b8-21f0562217acbash
1554collectionT1113Screen Capture2Screencapture (silent)deb7d358-5fbd-4dc4-aecc-ee0054d2d9a4bash
1555collectionT1113Screen Capture3X Windows Capture8206dd0c-faf6-4d74-ba13-7fbe13dce6acbash
1556collectionT1113Screen Capture4X Windows Capture (freebsd)562f3bc2-74e8-46c5-95c7-0e01f9ccc65csh
1557collectionT1113Screen Capture5Capture Linux Desktop using Import Tool9cd1cccb-91e4-4550-9139-e20a586fcea1bash
1558collectionT1113Screen Capture6Capture Linux Desktop using Import Tool (freebsd)18397d87-38aa-4443-a098-8a48a8ca5d8dsh
1559collectionT1113Screen Capture7Windows Screencapture3c898f62-626c-47d5-aad2-6de873d69153powershell
1560collectionT1113Screen Capture8Windows Screen Capture (CopyFromScreen)e9313014-985a-48ef-80d9-cde604ffc187powershell
1561collectionT1113Screen Capture9Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted5a496325-0115-4274-8eb9-755b649ad0fbpowershell
1562collectionT1056.001Input Capture: Keylogging1Input Captured9b633ca-8efb-45e6-b838-70f595c6ae26powershell
1563collectionT1056.001Input Capture: Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
1564collectionT1056.001Input Capture: Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
1565collectionT1056.001Input Capture: Keylogging4Logging sh history to syslog/messagesb04284dc-3bd9-4840-8d21-61b8d31c99f2sh
1566collectionT1056.001Input Capture: Keylogging5Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258bash
1567collectionT1056.001Input Capture: Keylogging6SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
1568collectionT1056.001Input Capture: Keylogging7Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
1569collectionT1056.001Input Capture: Keylogging8MacOS Swift Keyloggeraee3a097-4c5c-4fff-bbd3-0a705867ae29bash
1570collectionT1123Audio Capture1using device audio capture commandlet9c3ad250-b185-4444-b5a9-d69218a10c95powershell
1571collectionT1123Audio Capture2Registry artefact when application use microphone7a21cce2-6ada-4f7c-afd9-e1e9c481e44acommand_prompt
1572collectionT1123Audio Capture3using Quicktime Playerc7a0bb71-70ce-4a53-b115-881f241b795bsh
1573collectionT1025Data from Removable Media1Identify Documents on USB and Removable Media via PowerShell0b29f7e3-a050-44b7-bf05-9fb86af1ec2ecommand_prompt
1574collectionT1074.001Data Staged: Local Data Staging1Stage data from Discovery.bat107706a5-6f9f-451a-adae-bab8c667829fpowershell
1575collectionT1074.001Data Staged: Local Data Staging2Stage data from Discovery.sh39ce0303-ae16-4b9e-bb5b-4f53e8262066sh
1576collectionT1074.001Data Staged: Local Data Staging3Zip a Folder with PowerShell for Staging in Tempa57fbe4b-3440-452a-88a7-943531ac872apowershell
1577collectionT1114.001Email Collection: Local Email Collection1Email Collection with PowerShell Get-Inbox3f1b5096-0139-4736-9b78-19bcb02bb1cbpowershell
1578collectionT1119Automated Collection1Automated Collection Command Promptcb379146-53f1-43e0-b884-7ce2c635ff5bcommand_prompt
1579collectionT1119Automated Collection2Automated Collection PowerShell634bd9b9-dc83-4229-b19f-7f83ba9ad313powershell
1580collectionT1119Automated Collection3Recon information for export with PowerShellc3f6d794-50dd-482f-b640-0384fbb7db26powershell
1581collectionT1119Automated Collection4Recon information for export with Command Promptaa1180e2-f329-4e1e-8625-2472ec0bfaf3command_prompt
1582collectionT1115Clipboard Data1Utilize Clipboard to store or execute commands from0cd14633-58d4-4422-9ede-daa2c9474ae7command_prompt
1583collectionT1115Clipboard Data2Execute Commands from Clipboard using PowerShelld6dc21af-bec9-4152-be86-326b6babd416powershell
1584collectionT1115Clipboard Data3Execute commands from clipboard1ac2247f-65f8-4051-b51f-b0ccdfaaa5ffbash
1585collectionT1115Clipboard Data4Collect Clipboard Data via VBA9c8d5a72-9c98-48d3-b9bf-da2cc43bdf52powershell
1586collectionT1115Clipboard Data5Add or copy content to clipboard with xClipee363e53-b083-4230-aff3-f8d955f2d5bbsh
1587collectionT1530Data from Cloud Storage Object1AWS - Scan for Anonymous Access to S3979356b9-b588-4e49-bba4-c35517c484f5sh
1588collectionT1530Data from Cloud Storage Object2Azure - Dump Azure Storage Account Objects via Azure CLI67374845-b4c8-4204-adcc-9b217b65d4f1powershell
1589collectionT1005Data from Local System1Search files of interest and save them to a single zip file (Windows)d3d9af44-b8ad-4375-8b0a-4bff4b7e419cpowershell
1590collectionT1005Data from Local System2Find and dump sqlite databases (Linux)00cbb875-7ae4-4cf1-b638-e543fd825300bash
1591collectionT1005Data from Local System3Copy Apple Notes database files using AppleScriptcfb6d400-a269-4c06-a347-6d88d584d5f7sh
1592collectionT1560.002Archive Collected Data: Archive via Library1Compressing data using GZip in Python (FreeBSD/Linux)391f5298-b12d-4636-8482-35d9c17d53a8sh
1593collectionT1560.002Archive Collected Data: Archive via Library2Compressing data using bz2 in Python (FreeBSD/Linux)c75612b2-9de0-4d7c-879c-10d7b077072dsh
1594collectionT1560.002Archive Collected Data: Archive via Library3Compressing data using zipfile in Python (FreeBSD/Linux)001a042b-859f-44d9-bf81-fd1c4e2200b0sh
1595collectionT1560.002Archive Collected Data: Archive via Library4Compressing data using tarfile in Python (FreeBSD/Linux)e86f1b4b-fcc1-4a2a-ae10-b49da01458dbsh
1596collectionT1560Archive Collected Data1Compress Data for Exfiltration With PowerShell41410c60-614d-4b9d-b66e-b0192dd9c597powershell
1597collectionT1557.001Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay1LLMNR Poisoning with Inveigh (PowerShell)deecd55f-afe0-4a62-9fba-4d1ba2deb321powershell
1598collectionT1125Video Capture1Registry artefact when application use webcam6581e4a7-42e3-43c5-a0d2-5a0d62f9702acommand_prompt
1599collectionT1114.003Email Collection: Email Forwarding Rule1Office365 - Email Forwarding3234117e-151d-4254-9150-3d0bac41e38cpowershell
1600collectionT1056.002Input Capture: GUI Input Capture1AppleScript - Prompt User for Password76628574-0bc1-4646-8fe2-8f4427b47d15bash
1601collectionT1056.002Input Capture: GUI Input Capture2PowerShell - Prompt User for Password2b162bfd-0928-4d4c-9ec3-4d9f88374b52powershell
1602collectionT1056.002Input Capture: GUI Input Capture3AppleScript - Spoofing a credential prompt using osascriptb7037b89-947a-427a-ba29-e7e9f09bc045bash
1603collectionT1039Data from Network Shared Drive1Copy a sensitive File over Administrative share with copy6ed67921-1774-44ba-bac6-adb51ed60660command_prompt
1604collectionT1039Data from Network Shared Drive2Copy a sensitive File over Administrative share with Powershell7762e120-5879-44ff-97f8-008b401b9a98powershell
1605collectionT1114.002Email Collection: Remote Email Collection1Office365 - Remote Mail Collected36657d95-d9d6-4fbf-8a31-f4085607bafdpowershell
1606collectionT1056.004Input Capture: Credential API Hooking1Hook PowerShell TLS Encrypt/Decrypt Messagesde1934ea-1fbf-425b-8795-65fb27dd7e33powershell
1607lateral-movementT1021.005Remote Services:VNC1Enable Apple Remote Desktop Agent8a930abe-841c-4d4f-a877-72e9fe90b9eash
1608lateral-movementT1021.004Remote Services: SSH1ESXi - Enable SSH via PowerCLI8f6c14d1-f13d-4616-b7fc-98cc69fe56ecpowershell
1609lateral-movementT1021.004Remote Services: SSH2ESXi - Enable SSH via VIM-CMD280812c8-4dae-43e9-a74e-1d08ab997c0ecommand_prompt
1610lateral-movementT1091Replication Through Removable Media1USB Malware Spread Simulationd44b7297-622c-4be8-ad88-ec40d7563c75powershell
1611lateral-movementT1021.002Remote Services: SMB/Windows Admin Shares1Map admin share3386975b-367a-4fbb-9d77-4dcf3639ffd3command_prompt
1612lateral-movementT1021.002Remote Services: SMB/Windows Admin Shares2Map Admin Share PowerShell514e9cd7-9207-4882-98b1-c8f791bae3c5powershell
1613lateral-movementT1021.002Remote Services: SMB/Windows Admin Shares3Copy and Execute File with PsExec0eb03d41-79e4-4393-8e57-6344856be1cfcommand_prompt
1614lateral-movementT1021.002Remote Services: SMB/Windows Admin Shares4Execute command writing output to local Admin Shared41aaab5-bdfe-431d-a3d5-c29e9136ff46command_prompt
1615lateral-movementT1021.006Remote Services: Windows Remote Management1Enable Windows Remote Management9059e8de-3d7d-4954-a322-46161880b9cfpowershell
1616lateral-movementT1021.006Remote Services: Windows Remote Management2Remote Code Execution with PS Credentials Using Invoke-Command5295bd61-bd7e-4744-9d52-85962a4cf2d6powershell
1617lateral-movementT1021.006Remote Services: Windows Remote Management3WinRM Access with Evil-WinRMefe86d95-44c4-4509-ae42-7bfd9d1f5b3dpowershell
1618lateral-movementT1021.003Remote Services: Distributed Component Object Model1PowerShell Lateral Movement using MMC206dc74eb1-c9d6-4c53-b3b5-6f50ae339673powershell
1619lateral-movementT1021.003Remote Services: Distributed Component Object Model2PowerShell Lateral Movement Using Excel Application Object505f24be-1c11-4694-b614-e01ae1cd2570powershell
1620lateral-movementT1550.003Use Alternate Authentication Material: Pass the Ticket1Mimikatz Kerberos Ticket Attackdbf38128-7ba7-4776-bedf-cc2eed432098command_prompt
1621lateral-movementT1550.003Use Alternate Authentication Material: Pass the Ticket2Rubeus Kerberos Pass The Ticketa2fc4ec5-12c6-4fb4-b661-961f23f359cbpowershell
1622lateral-movementT1072Software Deployment Tools1Radmin Viewer Utilityb4988cad-6ed2-434d-ace5-ea2670782129command_prompt
1623lateral-movementT1072Software Deployment Tools2PDQ Deploy RATe447b83b-a698-4feb-bed1-a7aaf45c3443command_prompt
1624lateral-movementT1072Software Deployment Tools3Deploy 7-Zip Using Chocolatey2169e8b0-2ee7-44cb-8a6e-d816a5db7d8apowershell
1625lateral-movementT1570Lateral Tool Transfer1Exfiltration Over SMB over QUIC (New-SmbMapping)d8d13303-159e-4f33-89f4-9f07812d016fpowershell
1626lateral-movementT1570Lateral Tool Transfer2Exfiltration Over SMB over QUIC (NET USE)183235ca-8e6c-422c-88c2-3aa28c4825d9powershell
1627lateral-movementT1563.002Remote Service Session Hijacking: RDP Hijacking1RDP hijackinga37ac520-b911-458e-8aed-c5f1576d9f46command_prompt
1628lateral-movementT1550.002Use Alternate Authentication Material: Pass the Hash1Mimikatz Pass the Hashec23cef9-27d9-46e4-a68d-6f75f7b86908command_prompt
1629lateral-movementT1550.002Use Alternate Authentication Material: Pass the Hash2crackmapexec Pass the Hasheb05b028-16c8-4ad8-adea-6f5b219da9a9command_prompt
1630lateral-movementT1550.002Use Alternate Authentication Material: Pass the Hash3Invoke-WMIExec Pass the Hashf8757545-b00a-4e4e-8cfb-8cfb961ee713powershell
1631lateral-movementT1021.001Remote Services: Remote Desktop Protocol1RDP to DomainController355d4632-8cb9-449d-91ce-b566d0253d3epowershell
1632lateral-movementT1021.001Remote Services: Remote Desktop Protocol2Changing RDP Port to Non Standard Port via Powershell2f840dd4-8a2e-4f44-beb3-6b2399ea3771powershell
1633lateral-movementT1021.001Remote Services: Remote Desktop Protocol3Changing RDP Port to Non Standard Port via Command_Prompt74ace21e-a31c-4f7d-b540-53e4eb6d1f73command_prompt
1634lateral-movementT1021.001Remote Services: Remote Desktop Protocol4Disable NLA for RDP via Command Prompt01d1c6c0-faf0-408e-b368-752a02285cb2command_prompt
1635credential-accessT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
1636credential-accessT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM rule (freebsd)b17eacac-282d-4ca8-a240-46602cf863e3sh
1637credential-accessT1556.003Modify Authentication Process: Pluggable Authentication Modules3Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
1638credential-accessT1056.001Input Capture: Keylogging1Input Captured9b633ca-8efb-45e6-b838-70f595c6ae26powershell
1639credential-accessT1056.001Input Capture: Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
1640credential-accessT1056.001Input Capture: Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
1641credential-accessT1056.001Input Capture: Keylogging4Logging sh history to syslog/messagesb04284dc-3bd9-4840-8d21-61b8d31c99f2sh
1642credential-accessT1056.001Input Capture: Keylogging5Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258bash
1643credential-accessT1056.001Input Capture: Keylogging6SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
1644credential-accessT1056.001Input Capture: Keylogging7Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
1645credential-accessT1056.001Input Capture: Keylogging8MacOS Swift Keyloggeraee3a097-4c5c-4fff-bbd3-0a705867ae29bash
1646credential-accessT1110.001Brute Force: Password Guessing1Brute Force Credentials of single Active Directory domain users via SMB09480053-2f98-4854-be6e-71ae5f672224command_prompt
1647credential-accessT1110.001Brute Force: Password Guessing2Brute Force Credentials of single Active Directory domain user via LDAP against domain controller (NTLM or Kerberos)c2969434-672b-4ec8-8df0-bbb91f40e250powershell
1648credential-accessT1110.001Brute Force: Password Guessing3Brute Force Credentials of single Azure AD user5a51ef57-299e-4d62-8e11-2d440df55e69powershell
1649credential-accessT1110.001Brute Force: Password Guessing4Password Brute User using Kerbrute Tool59dbeb1a-79a7-4c2a-baf4-46d0f4c761c4powershell
1650credential-accessT1110.001Brute Force: Password Guessing5SUDO Brute Force - Debianba1bf0b6-f32b-4db0-b7cc-d78cacc76700bash
1651credential-accessT1110.001Brute Force: Password Guessing6SUDO Brute Force - Redhat4097bc00-5eeb-4d56-aaf9-287d60351d95bash
1652credential-accessT1110.001Brute Force: Password Guessing7SUDO Brute Force - FreeBSDabcde488-e083-4ee7-bc85-a5684edd7541bash
1653credential-accessT1110.001Brute Force: Password Guessing8ESXi - Brute Force Until Account Lockouted6c2c87-bba6-4a28-ac6e-c8af3d6c2ab5powershell
1654credential-accessT1003OS Credential Dumping1Gsecdump96345bfc-8ae7-4b6a-80b7-223200f24ef9command_prompt
1655credential-accessT1003OS Credential Dumping2Credential Dumping with NPPSpy9e2173c0-ba26-4cdf-b0ed-8c54b27e3ad6powershell
1656credential-accessT1003OS Credential Dumping3Dump svchost.exe to gather RDP credentialsd400090a-d8ca-4be0-982e-c70598a23de9powershell
1657credential-accessT1003OS Credential Dumping4Retrieve Microsoft IIS Service Account Credentials Using AppCmd (using list)6c7a4fd3-5b0b-4b30-a93e-39411b25d889powershell
1658credential-accessT1003OS Credential Dumping5Retrieve Microsoft IIS Service Account Credentials Using AppCmd (using config)42510244-5019-48fa-a0e5-66c3b76e6049powershell
1659credential-accessT1003OS Credential Dumping6Dump Credential Manager using keymgr.dll and rundll32.exe84113186-ed3c-4d0d-8a3c-8980c86c1f4apowershell
1660credential-accessT1003OS Credential Dumping7Send NTLM Hash with RPC Test Connection0b207037-813c-4444-ac3f-b597cf280a67powershell
1661credential-accessT1539Steal Web Session Cookie1Steal Firefox Cookies (Windows)4b437357-f4e9-4c84-9fa6-9bcee6f826aapowershell
1662credential-accessT1539Steal Web Session Cookie2Steal Chrome Cookies (Windows)26a6b840-4943-4965-8df5-ef1f9a282440powershell
1663credential-accessT1539Steal Web Session Cookie3Steal Chrome Cookies via Remote Debugging (Mac)e43cfdaf-3fb8-4a45-8de0-7eee8741d072bash
1664credential-accessT1539Steal Web Session Cookie4Steal Chrome v127+ cookies via Remote Debugging (Windows)b647f4ee-88de-40ac-9419-f17fac9489a7powershell
1665credential-accessT1539Steal Web Session Cookie5Copy Safari BinaryCookies files using AppleScripte57ba07b-3a33-40cd-a892-748273b9b49ash
1666credential-accessT1003.002OS Credential Dumping: Security Account Manager1Registry dump of SAM, creds, and secrets5c2571d0-1572-416d-9676-812e64ca9f44command_prompt
1667credential-accessT1003.002OS Credential Dumping: Security Account Manager2Registry parse with pypykatza96872b2-cbf3-46cf-8eb4-27e8c0e85263command_prompt
1668credential-accessT1003.002OS Credential Dumping: Security Account Manager3esentutl.exe SAM copya90c2f4d-6726-444e-99d2-a00cd7c20480command_prompt
1669credential-accessT1003.002OS Credential Dumping: Security Account Manager4PowerDump Hashes and Usernames from Registry804f28fc-68fc-40da-b5a2-e9d0bce5c193powershell
1670credential-accessT1003.002OS Credential Dumping: Security Account Manager5dump volume shadow copy hives with certutileeb9751a-d598-42d3-b11c-c122d9c3f6c7command_prompt
1671credential-accessT1003.002OS Credential Dumping: Security Account Manager6dump volume shadow copy hives with System.IO.File9d77fed7-05f8-476e-a81b-8ff0472c64d0powershell
1672credential-accessT1003.002OS Credential Dumping: Security Account Manager7WinPwn - Loot local Credentials - Dump SAM-File for NTLM Hashes0c0f5f06-166a-4f4d-bb4a-719df9a01dbbpowershell
1673credential-accessT1003.002OS Credential Dumping: Security Account Manager8Dumping of SAM, creds, and secrets(Reg Export)21df41be-cdd8-4695-a650-c3981113aa3ccommand_prompt
1674credential-accessT1552.005Unsecured Credentials: Cloud Instance Metadata API1Azure - Search Azure AD User Attributes for Passwordsae9b2e3e-efa1-4483-86e2-fae529ab9fb6powershell
1675credential-accessT1552.005Unsecured Credentials: Cloud Instance Metadata API2Azure - Dump Azure Instance Metadata from Virtual Machinescc99e772-4e18-4f1f-b422-c5cdd1bfd7b7powershell
1676credential-accessT1110.002Brute Force: Password Cracking1Password Cracking with Hashcat6d27df5d-69d4-4c91-bc33-5983ffe91692command_prompt
1677credential-accessT1555.001Credentials from Password Stores: Keychain1Keychain Dump88e1fa00-bf63-4e5b-a3e1-e2ea51c8cca6sh
1678credential-accessT1555.001Credentials from Password Stores: Keychain2Export Certificate Item(s)1864fdec-ff86-4452-8c30-f12507582a93sh
1679credential-accessT1555.001Credentials from Password Stores: Keychain3Import Certificate Item(s) into Keychaine544bbcb-c4e0-4bd0-b614-b92131635f59sh
1680credential-accessT1555.001Credentials from Password Stores: Keychain4Copy Keychain using cat utility5c32102a-c508-49d3-978f-288f8a9f6617sh
1681credential-accessT1003.004OS Credential Dumping: LSA Secrets1Dumping LSA Secrets55295ab0-a703-433b-9ca4-ae13807de12fcommand_prompt
1682credential-accessT1003.004OS Credential Dumping: LSA Secrets2Dump Kerberos Tickets from LSA using dumper.ps12dfa3bff-9a27-46db-ab75-7faefdaca732powershell
1683credential-accessT1606.002Forge Web Credentials: SAML token1Golden SAMLb16a03bc-1089-4dcc-ad98-30fe8f3a2b31powershell
1684credential-accessT1003.007OS Credential Dumping: Proc Filesystem1Dump individual process memory with sh (Local)7e91138a-8e74-456d-a007-973d67a0bb80sh
1685credential-accessT1003.007OS Credential Dumping: Proc Filesystem2Dump individual process memory with sh on FreeBSD (Local)fa37b633-e097-4415-b2b8-c5bf4c86e423sh
1686credential-accessT1003.007OS Credential Dumping: Proc Filesystem3Dump individual process memory with Python (Local)437b2003-a20d-4ed8-834c-4964f24eec63sh
1687credential-accessT1003.007OS Credential Dumping: Proc Filesystem4Capture Passwords with MimiPenguina27418de-bdce-4ebd-b655-38f04842bf0cbash
1688credential-accessT1040Network Sniffing1Packet Capture Linux using tshark or tcpdump7fe741f7-b265-4951-a7c7-320889083b3ebash
1689credential-accessT1040Network Sniffing2Packet Capture FreeBSD using tshark or tcpdumpc93f2492-9ebe-44b5-8b45-36574cccfe67sh
1690credential-accessT1040Network Sniffing3Packet Capture macOS using tcpdump or tshark9d04efee-eff5-4240-b8d2-07792b873608bash
1691credential-accessT1040Network Sniffing4Packet Capture Windows Command Prompta5b2f6a0-24b4-493e-9590-c699f75723cacommand_prompt
1692credential-accessT1040Network Sniffing5Windows Internal Packet Captureb5656f67-d67f-4de8-8e62-b5581630f528command_prompt
1693credential-accessT1040Network Sniffing6Windows Internal pktmon capturec67ba807-f48b-446e-b955-e4928cd1bf91command_prompt
1694credential-accessT1040Network Sniffing7Windows Internal pktmon set filter855fb8b4-b8ab-4785-ae77-09f5df7bff55command_prompt
1695credential-accessT1040Network Sniffing8Packet Capture macOS using /dev/bpfN with sudoe6fe5095-545d-4c8b-a0ae-e863914be3aabash
1696credential-accessT1040Network Sniffing9Filtered Packet Capture macOS using /dev/bpfN with sudoe2480aee-23f3-4f34-80ce-de221e27cd19bash
1697credential-accessT1040Network Sniffing10Packet Capture FreeBSD using /dev/bpfN with sudoe2028771-1bfb-48f5-b5e6-e50ee0942a14sh
1698credential-accessT1040Network Sniffing11Filtered Packet Capture FreeBSD using /dev/bpfN with sudoa3a0d4c9-c068-4563-a08d-583bd05b884csh
1699credential-accessT1040Network Sniffing12Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo10c710c9-9104-4d5f-8829-5b65391e2a29bash
1700credential-accessT1040Network Sniffing13Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo7a0895f0-84c1-4adf-8491-a21510b1d4c1bash
1701credential-accessT1040Network Sniffing14Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo515575ab-d213-42b1-aa64-ef6a2dd4641bbash
1702credential-accessT1040Network Sniffing15Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudob1cbdf8b-6078-48f5-a890-11ea19d7f8e9bash
1703credential-accessT1040Network Sniffing16PowerShell Network Sniffing9c15a7de-de14-46c3-bc2a-6d94130986aepowershell
1704credential-accessT1552.002Unsecured Credentials: Credentials in Registry1Enumeration for Credentials in Registryb6ec082c-7384-46b3-a111-9a9b8b14e5e7command_prompt
1705credential-accessT1552.002Unsecured Credentials: Credentials in Registry2Enumeration for PuTTY Credentials in Registryaf197fd7-e868-448e-9bd5-05d1bcd9d9e5command_prompt
1706credential-accessT1556.002Modify Authentication Process: Password Filter DLL1Install and Register Password Filter DLLa7961770-beb5-4134-9674-83d7e1fa865cpowershell
1707credential-accessT1556.002Modify Authentication Process: Password Filter DLL2Install Additional Authentication Packages91580da6-bc6e-431b-8b88-ac77180005f2powershell
1708credential-accessT1558.004Steal or Forge Kerberos Tickets: AS-REP Roasting1Rubeus asreproast615bd568-2859-41b5-9aed-61f6a88e48ddpowershell
1709credential-accessT1558.004Steal or Forge Kerberos Tickets: AS-REP Roasting2Get-DomainUser with PowerViewd6139549-7b72-4e48-9ea1-324fc9bdf88apowershell
1710credential-accessT1558.004Steal or Forge Kerberos Tickets: AS-REP Roasting3WinPwn - PowerSharpPack - Kerberoasting Using Rubeus8c385f88-4d47-4c9a-814d-93d9deec8c71powershell
1711credential-accessT1555Credentials from Password Stores1Extract Windows Credential Manager via VBA234f9b7c-b53d-4f32-897b-b880a6c9ea7bpowershell
1712credential-accessT1555Credentials from Password Stores2Dump credentials from Windows Credential Manager With PowerShell [windows Credentials]c89becbe-1758-4e7d-a0f4-97d2188a23e3powershell
1713credential-accessT1555Credentials from Password Stores3Dump credentials from Windows Credential Manager With PowerShell [web Credentials]8fd5a296-6772-4766-9991-ff4e92af7240powershell
1714credential-accessT1555Credentials from Password Stores4Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Windows Credentials]36753ded-e5c4-4eb5-bc3c-e8fba236878dpowershell
1715credential-accessT1555Credentials from Password Stores5Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Web Credentials]bc071188-459f-44d5-901a-f8f2625b2d2epowershell
1716credential-accessT1555Credentials from Password Stores6WinPwn - Loot local Credentials - lazagne079ee2e9-6f16-47ca-a635-14efcd994118powershell
1717credential-accessT1555Credentials from Password Stores7WinPwn - Loot local Credentials - Wifi Credentialsafe369c2-b42e-447f-98a3-fb1f4e2b8552powershell
1718credential-accessT1555Credentials from Password Stores8WinPwn - Loot local Credentials - Decrypt Teamviewer Passwordsdb965264-3117-4bad-b7b7-2523b7856b92powershell
1719credential-accessT1552Unsecured Credentials1AWS - Retrieve EC2 Password Data using stratusa21118de-b11e-4ebd-b655-42f11142df0csh
1720credential-accessT1552Unsecured Credentials2Search for Passwords in Powershell Historyf9c3d0ab-479b-4019-945f-22ace2b1731apowershell
1721credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers1Run Chrome-password Collector8c05b133-d438-47ca-a630-19cc464c4622powershell
1722credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers2Search macOS Safari Cookiesc1402f7b-67ca-43a8-b5f3-3143abedc01bsh
1723credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers3LaZagne - Credentials from Browser9a2915b3-3954-4cce-8c76-00fbf4dbd014command_prompt
1724credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers4Simulating access to Chrome Login Data3d111226-d09a-4911-8715-fe11664f960dpowershell
1725credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers5Simulating access to Opera Login Data28498c17-57e4-495a-b0be-cc1e36de408bpowershell
1726credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers6Simulating access to Windows Firefox Login Dataeb8da98a-2e16-4551-b3dd-83de49baa14cpowershell
1727credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers7Simulating access to Windows Edge Login Dataa6a5ec26-a2d1-4109-9d35-58b867689329powershell
1728credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers8Decrypt Mozilla Passwords with Firepwd.pydc9cd677-c70f-4df5-bd1c-f114af3c2381powershell
1729credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers9LaZagne.py - Dump Credentials from Firefox Browser87e88698-621b-4c45-8a89-4eaebdeaabb1sh
1730credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers10Stage Popular Credential Files for Exfiltrationf543635c-1705-42c3-b180-efd6dc6e7ee7powershell
1731credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers11WinPwn - BrowserPwn764ea176-fb71-494c-90ea-72e9d85dce76powershell
1732credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers12WinPwn - Loot local Credentials - mimi-kittenzec1d0b37-f659-4186-869f-31a554891611powershell
1733credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers13WinPwn - PowerSharpPack - Sharpweb for Browser Credentialse5e3d639-6ea8-4408-9ecd-d5a286268ca0powershell
1734credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers14Simulating Access to Chrome Login Data - MacOS124e13e5-d8a1-4378-a6ee-a53cd0c7e369sh
1735credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers15WebBrowserPassView - Credentials from Browsere359627f-2d90-4320-ba5e-b0f878155bbepowershell
1736credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers16BrowserStealer (Chrome / Firefox / Microsoft Edge)6f2c5c87-a4d5-4898-9bd1-47a55ecaf1ddpowershell
1737credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers17Dump Chrome Login Data with esentutl70422253-8198-4019-b617-6be401b49fcecommand_prompt
1738credential-accessT1552.004Unsecured Credentials: Private Keys1Private Keys520ce462-7ca7-441e-b5a5-f8347f632696command_prompt
1739credential-accessT1552.004Unsecured Credentials: Private Keys2Discover Private SSH Keys46959285-906d-40fa-9437-5a439accd878sh
1740credential-accessT1552.004Unsecured Credentials: Private Keys3Copy Private SSH Keys with CP7c247dc7-5128-4643-907b-73a76d9135c3sh
1741credential-accessT1552.004Unsecured Credentials: Private Keys4Copy Private SSH Keys with CP (freebsd)12e4a260-a7fd-4ed8-bf18-1a28c1395775sh
1742credential-accessT1552.004Unsecured Credentials: Private Keys5Copy Private SSH Keys with rsync864bb0b2-6bb5-489a-b43b-a77b3a16d68ash
1743credential-accessT1552.004Unsecured Credentials: Private Keys6Copy Private SSH Keys with rsync (freebsd)922b1080-0b95-42b0-9585-b9a5ea0af044sh
1744credential-accessT1552.004Unsecured Credentials: Private Keys7Copy the users GnuPG directory with rsync2a5a0601-f5fb-4e2e-aa09-73282ae6afcash
1745credential-accessT1552.004Unsecured Credentials: Private Keys8Copy the users GnuPG directory with rsync (freebsd)b05ac39b-515f-48e9-88e9-2f141b5bcad0sh
1746credential-accessT1552.004Unsecured Credentials: Private Keys9ADFS token signing and encryption certificates theft - Local78e95057-d429-4e66-8f82-0f060c1ac96fpowershell
1747credential-accessT1552.004Unsecured Credentials: Private Keys10ADFS token signing and encryption certificates theft - Remotecab413d8-9e4a-4b8d-9b84-c985bd73a442powershell
1748credential-accessT1552.004Unsecured Credentials: Private Keys11CertUtil ExportPFX336b25bf-4514-4684-8924-474974f28137powershell
1749credential-accessT1552.004Unsecured Credentials: Private Keys12Export Root Certificate with Export-PFXCertificate7617f689-bbd8-44bc-adcd-6f8968897848powershell
1750credential-accessT1552.004Unsecured Credentials: Private Keys13Export Root Certificate with Export-Certificate78b274f8-acb0-428b-b1f7-7b0d0e73330apowershell
1751credential-accessT1552.004Unsecured Credentials: Private Keys14Export Certificates with Mimikatz290df60e-4b5d-4a5e-b0c7-dc5348ea0c86command_prompt
1752credential-accessT1557.001Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay1LLMNR Poisoning with Inveigh (PowerShell)deecd55f-afe0-4a62-9fba-4d1ba2deb321powershell
1753credential-accessT1003.001OS Credential Dumping: LSASS Memory1Dump LSASS.exe Memory using ProcDump0be2230c-9ab3-4ac2-8826-3199b9a0ebf8command_prompt
1754credential-accessT1003.001OS Credential Dumping: LSASS Memory2Dump LSASS.exe Memory using comsvcs.dll2536dee2-12fb-459a-8c37-971844fa73bepowershell
1755credential-accessT1003.001OS Credential Dumping: LSASS Memory3Dump LSASS.exe Memory using direct system calls and API unhooking7ae7102c-a099-45c8-b985-4c7a2d05790dcommand_prompt
1756credential-accessT1003.001OS Credential Dumping: LSASS Memory4Dump LSASS.exe Memory using NanoDumpdddd4aca-bbed-46f0-984d-e4c5971c51eacommand_prompt
1757credential-accessT1003.001OS Credential Dumping: LSASS Memory5Dump LSASS.exe Memory using Windows Task Managerdea6c349-f1c6-44f3-87a1-1ed33a59a607manual
1758credential-accessT1003.001OS Credential Dumping: LSASS Memory6Offline Credential Theft With Mimikatz453acf13-1dbd-47d7-b28a-172ce9228023command_prompt
1759credential-accessT1003.001OS Credential Dumping: LSASS Memory7LSASS read with pypykatzc37bc535-5c62-4195-9cc3-0517673171d8command_prompt
1760credential-accessT1003.001OS Credential Dumping: LSASS Memory8Dump LSASS.exe Memory using Out-Minidump.ps16502c8f0-b775-4dbd-9193-1298f56b6781powershell
1761credential-accessT1003.001OS Credential Dumping: LSASS Memory9Create Mini Dump of LSASS.exe using ProcDump7cede33f-0acd-44ef-9774-15511300b24bcommand_prompt
1762credential-accessT1003.001OS Credential Dumping: LSASS Memory10Powershell Mimikatz66fb0bc1-3c3f-47e9-a298-550ecfefacbcpowershell
1763credential-accessT1003.001OS Credential Dumping: LSASS Memory11Dump LSASS with createdump.exe from .Net v59d0072c8-7cca-45c4-bd14-f852cfa35cf0powershell
1764credential-accessT1003.001OS Credential Dumping: LSASS Memory12Dump LSASS.exe using imported Microsoft DLLs86fc3f40-237f-4701-b155-81c01c48d697powershell
1765credential-accessT1003.001OS Credential Dumping: LSASS Memory13Dump LSASS.exe using lolbin rdrleakdiag.exe47a539d1-61b9-4364-bf49-a68bc2a95ef0powershell
1766credential-accessT1003.001OS Credential Dumping: LSASS Memory14Dump LSASS.exe Memory through Silent Process Exiteb5adf16-b601-4926-bca7-dad22adffb37command_prompt
1767credential-accessT1110.003Brute Force: Password Spraying1Password Spray all Domain Users90bc2e54-6c84-47a5-9439-0a2a92b4b175command_prompt
1768credential-accessT1110.003Brute Force: Password Spraying2Password Spray (DomainPasswordSpray)263ae743-515f-4786-ac7d-41ef3a0d4b2bpowershell
1769credential-accessT1110.003Brute Force: Password Spraying3Password spray all Active Directory domain users with a single password via LDAP against domain controller (NTLM or Kerberos)f14d956a-5b6e-4a93-847f-0c415142f07dpowershell
1770credential-accessT1110.003Brute Force: Password Spraying4Password spray all Azure AD users with a single passworda8aa2d3e-1c52-4016-bc73-0f8854cfa80apowershell
1771credential-accessT1110.003Brute Force: Password Spraying5WinPwn - DomainPasswordSpray Attacks5ccf4bbd-7bf6-43fc-83ac-d9e38aff1d82powershell
1772credential-accessT1110.003Brute Force: Password Spraying6Password Spray Invoke-DomainPasswordSpray Lightb15bc9a5-a4f3-4879-9304-ea0011ace63apowershell
1773credential-accessT1110.003Brute Force: Password Spraying7Password Spray Microsoft Online Accounts with MSOLSpray (Azure/O365)f3a10056-0160-4785-8744-d9bd7c12dc39powershell
1774credential-accessT1110.003Brute Force: Password Spraying8Password Spray using Kerbrute Toolc6f25ec3-6475-47a9-b75d-09ac593c5ecbpowershell
1775credential-accessT1110.003Brute Force: Password Spraying9AWS - Password Spray an AWS using GoAWSConsoleSpray9c10d16b-20b1-403a-8e67-50ef7117ed4esh
1776credential-accessT1003.005OS Credential Dumping: Cached Domain Credentials1Cached Credential Dump via Cmdkey56506854-89d6-46a3-9804-b7fde90791f9command_prompt
1777credential-accessT1558.001Steal or Forge Kerberos Tickets: Golden Ticket1Crafting Active Directory golden tickets with mimikatz9726592a-dabc-4d4d-81cd-44070008b3afpowershell
1778credential-accessT1558.001Steal or Forge Kerberos Tickets: Golden Ticket2Crafting Active Directory golden tickets with Rubeuse42d33cd-205c-4acf-ab59-a9f38f6bad9cpowershell
1779credential-accessT1649Steal or Forge Authentication Certificates1Staging Local Certificates via Export-Certificateeb121494-82d1-4148-9e2b-e624e03fbf3dpowershell
1780credential-accessT1552.003Unsecured Credentials: Bash History1Search Through Bash History3cfde62b-7c33-4b26-a61e-755d6131c8cesh
1781credential-accessT1552.003Unsecured Credentials: Bash History2Search Through sh Historyd87d3b94-05b4-40f2-a80f-99864ffa6803sh
1782credential-accessT1552.001Unsecured Credentials: Credentials In Files1Find AWS credentials37807632-d3da-442e-8c2e-00f44928ff8fsh
1783credential-accessT1552.001Unsecured Credentials: Credentials In Files2Extract Browser and System credentials with LaZagne9e507bb8-1d30-4e3b-a49b-cb5727d7ea79bash
1784credential-accessT1552.001Unsecured Credentials: Credentials In Files3Extract passwords with grepbd4cf0d1-7646-474e-8610-78ccf5a097c4sh
1785credential-accessT1552.001Unsecured Credentials: Credentials In Files4Extracting passwords with findstr0e56bf29-ff49-4ea5-9af4-3b81283fd513powershell
1786credential-accessT1552.001Unsecured Credentials: Credentials In Files5Access unattend.xml367d4004-5fc0-446d-823f-960c74ae52c3command_prompt
1787credential-accessT1552.001Unsecured Credentials: Credentials In Files6Find and Access Github Credentialsda4f751a-020b-40d7-b9ff-d433b7799803bash
1788credential-accessT1552.001Unsecured Credentials: Credentials In Files7WinPwn - sensitivefiles114dd4e3-8d1c-4ea7-bb8d-8d8f6aca21f0powershell
1789credential-accessT1552.001Unsecured Credentials: Credentials In Files8WinPwn - Snafflerfdd0c913-714b-4c13-b40f-1824d6c015f2powershell
1790credential-accessT1552.001Unsecured Credentials: Credentials In Files9WinPwn - powershellsensitive75f66e03-37d3-4704-9520-3210efbe33cepowershell
1791credential-accessT1552.001Unsecured Credentials: Credentials In Files10WinPwn - passhunt00e3e3c7-6c3c-455e-bd4b-461c7f0e7797powershell
1792credential-accessT1552.001Unsecured Credentials: Credentials In Files11WinPwn - SessionGopherc9dc9de3-f961-4284-bd2d-f959c9f9fda5powershell
1793credential-accessT1552.001Unsecured Credentials: Credentials In Files12WinPwn - Loot local Credentials - AWS, Microsoft Azure, and Google Compute credentialsaaa87b0e-5232-4649-ae5c-f1724a4b2798powershell
1794credential-accessT1552.001Unsecured Credentials: Credentials In Files13List Credential Files via PowerShell0d4f2281-f720-4572-adc8-d5bb1618affepowershell
1795credential-accessT1552.001Unsecured Credentials: Credentials In Files14List Credential Files via Command Promptb0cdacf6-8949-4ffe-9274-a9643a788e55command_prompt
1796credential-accessT1552.001Unsecured Credentials: Credentials In Files15Find Azure credentialsa8f6148d-478a-4f43-bc62-5efee9f931a4sh
1797credential-accessT1552.001Unsecured Credentials: Credentials In Files16Find GCP credentialsaa12eb29-2dbb-414e-8b20-33d34af93543sh
1798credential-accessT1552.001Unsecured Credentials: Credentials In Files17Find OCI credentials9d9c22c9-fa97-4008-a204-478cf68c40afsh
1799credential-accessT1528Steal Application Access Token1Azure - Functions code upload - Functions code injection via Blob upload9a5352e4-56e5-45c2-9b3f-41a46d3b3a43powershell
1800credential-accessT1528Steal Application Access Token2Azure - Functions code upload - Functions code injection via File Share modification to retrieve the Functions identity access token67aaf4cb-54ce-42e2-ab56-e0a9bcc089b1powershell
1801credential-accessT1552.006Unsecured Credentials: Group Policy Preferences1GPP Passwords (findstr)870fe8fb-5e23-4f5f-b89d-dd7fe26f3b5fcommand_prompt
1802credential-accessT1552.006Unsecured Credentials: Group Policy Preferences2GPP Passwords (Get-GPPPassword)e9584f82-322c-474a-b831-940fd8b4455cpowershell
1803credential-accessT1056.002Input Capture: GUI Input Capture1AppleScript - Prompt User for Password76628574-0bc1-4646-8fe2-8f4427b47d15bash
1804credential-accessT1056.002Input Capture: GUI Input Capture2PowerShell - Prompt User for Password2b162bfd-0928-4d4c-9ec3-4d9f88374b52powershell
1805credential-accessT1056.002Input Capture: GUI Input Capture3AppleScript - Spoofing a credential prompt using osascriptb7037b89-947a-427a-ba29-e7e9f09bc045bash
1806credential-accessT1110.004Brute Force: Credential Stuffing1SSH Credential Stuffing From Linux4f08197a-2a8a-472d-9589-cd2895ef22adbash
1807credential-accessT1110.004Brute Force: Credential Stuffing2SSH Credential Stuffing From MacOSd546a3d9-0be5-40c7-ad82-5a7d79e1b66bbash
1808credential-accessT1110.004Brute Force: Credential Stuffing3SSH Credential Stuffing From FreeBSDa790d50e-7ebf-48de-8daa-d9367e0911d4sh
1809credential-accessT1110.004Brute Force: Credential Stuffing4Brute Force:Credential Stuffing using Kerbrute Tool4852c630-87a9-409b-bb5e-5dc12c9ebcdepowershell
1810credential-accessT1187Forced Authentication1PetitPotam485ce873-2e65-4706-9c7e-ae3ab9e14213powershell
1811credential-accessT1187Forced Authentication2WinPwn - PowerSharpPack - Retrieving NTLM Hashes without Touching LSASS7f06b25c-799e-40f1-89db-999c9cc84317powershell
1812credential-accessT1187Forced Authentication3Trigger an authenticated RPC call to a target server with no Sign flag set81cfdd7f-1f41-4cc5-9845-bb5149438e37powershell
1813credential-accessT1555.006Credentials from Password Stores: Cloud Secrets Management Stores1Azure - Dump All Azure Key Vaults with Microburst1b83cddb-eaa7-45aa-98a5-85fb0a8807eapowershell
1814credential-accessT1003.008OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow1Access /etc/shadow (Local)3723ab77-c546-403c-8fb4-bb577033b235bash
1815credential-accessT1003.008OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow2Access /etc/master.passwd (Local)5076874f-a8e6-4077-8ace-9e5ab54114a5sh
1816credential-accessT1003.008OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow3Access /etc/passwd (Local)60e860b6-8ae6-49db-ad07-5e73edd88f5dsh
1817credential-accessT1003.008OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow4Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not catdf1a55ae-019d-4120-bc35-94f4bc5c4b0ash
1818credential-accessT1003.008OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow5Access /etc/{shadow,passwd,master.passwd} with shell builtinsf5aa6543-6cb2-4fae-b9c2-b96e14721713sh
1819credential-accessT1558.002Steal or Forge Kerberos Tickets: Silver Ticket1Crafting Active Directory silver tickets with mimikatz385e59aa-113e-4711-84d9-f637aef01f2cpowershell
1820credential-accessT1555.004Credentials from Password Stores: Windows Credential Manager1Access Saved Credentials via VaultCmd9c2dd36d-5c8b-4b29-8d72-a11b0d5d7439command_prompt
1821credential-accessT1555.004Credentials from Password Stores: Windows Credential Manager2WinPwn - Loot local Credentials - Invoke-WCMDumpfa714db1-63dd-479e-a58e-7b2b52ca5997powershell
1822credential-accessT1003.003OS Credential Dumping: NTDS1Create Volume Shadow Copy with vssadmindcebead7-6c28-4b4b-bf3c-79deb1b1fc7fcommand_prompt
1823credential-accessT1003.003OS Credential Dumping: NTDS2Copy NTDS.dit from Volume Shadow Copyc6237146-9ea6-4711-85c9-c56d263a6b03command_prompt
1824credential-accessT1003.003OS Credential Dumping: NTDS3Dump Active Directory Database with NTDSUtil2364e33d-ceab-4641-8468-bfb1d7cc2723command_prompt
1825credential-accessT1003.003OS Credential Dumping: NTDS4Create Volume Shadow Copy with WMI224f7de0-8f0a-4a94-b5d8-989b036c86dacommand_prompt
1826credential-accessT1003.003OS Credential Dumping: NTDS5Create Volume Shadow Copy remotely with WMId893459f-71f0-484d-9808-ec83b2b64226command_prompt
1827credential-accessT1003.003OS Credential Dumping: NTDS6Create Volume Shadow Copy remotely (WMI) with esentutl21c7bf80-3e8b-40fa-8f9d-f5b194ff2865command_prompt
1828credential-accessT1003.003OS Credential Dumping: NTDS7Create Volume Shadow Copy with Powershell542bb97e-da53-436b-8e43-e0a7d31a6c24powershell
1829credential-accessT1003.003OS Credential Dumping: NTDS8Create Symlink to Volume Shadow Copy21748c28-2793-4284-9e07-d6d028b66702command_prompt
1830credential-accessT1003.003OS Credential Dumping: NTDS9Create Volume Shadow Copy with diskshadowb385996c-0e7d-4e27-95a4-aca046b119a7command_prompt
1831credential-accessT1558.003Steal or Forge Kerberos Tickets: Kerberoasting1Request for service tickets3f987809-3681-43c8-bcd8-b3ff3a28533apowershell
1832credential-accessT1558.003Steal or Forge Kerberos Tickets: Kerberoasting2Rubeus kerberoast14625569-6def-4497-99ac-8e7817105b55powershell
1833credential-accessT1558.003Steal or Forge Kerberos Tickets: Kerberoasting3Extract all accounts in use as SPN using setspne6f4affd-d826-4871-9a62-6c9004b8fe06command_prompt
1834credential-accessT1558.003Steal or Forge Kerberos Tickets: Kerberoasting4Request A Single Ticket via PowerShell988539bc-2ed7-4e62-aec6-7c5cf6680863powershell
1835credential-accessT1558.003Steal or Forge Kerberos Tickets: Kerberoasting5Request All Tickets via PowerShell902f4ed2-1aba-4133-90f2-cff6d299d6dapowershell
1836credential-accessT1558.003Steal or Forge Kerberos Tickets: Kerberoasting6WinPwn - Kerberoasting78d10e20-c874-45f2-a9df-6fea0120ec27powershell
1837credential-accessT1558.003Steal or Forge Kerberos Tickets: Kerberoasting7WinPwn - PowerSharpPack - Kerberoasting Using Rubeus29094950-2c96-4cbd-b5e4-f7c65079678fpowershell
1838credential-accessT1003.006OS Credential Dumping: DCSync1DCSync (Active Directory)129efd28-8497-4c87-a1b0-73b9a870ca3ecommand_prompt
1839credential-accessT1003.006OS Credential Dumping: DCSync2Run DSInternals Get-ADReplAccounta0bced08-3fc5-4d8b-93b7-e8344739376epowershell
1840credential-accessT1056.004Input Capture: Credential API Hooking1Hook PowerShell TLS Encrypt/Decrypt Messagesde1934ea-1fbf-425b-8795-65fb27dd7e33powershell
1841credential-accessT1552.007Kubernetes List Secrets1List All Secrets31e794c4-48fd-4a76-aca4-6587c155bc11bash
1842credential-accessT1552.007Kubernetes List Secrets2ListSecrets43c3a49d-d15c-45e6-b303-f6e177e44a9abash
1843credential-accessT1552.007Kubernetes List Secrets3Cat the contents of a Kubernetes service account token file788e0019-a483-45da-bcfe-96353d46820fsh
1844discoveryT1033System Owner/User Discovery1System Owner/User Discovery4c4959bf-addf-4b4a-be86-8d09cc1857aacommand_prompt
1845discoveryT1033System Owner/User Discovery2System Owner/User Discovery2a9b677d-a230-44f4-ad86-782df1ef108csh
1846discoveryT1033System Owner/User Discovery3Find computers where user has session - Stealth mode (PowerView)29857f27-a36f-4f7e-8084-4557cd6207capowershell
1847discoveryT1033System Owner/User Discovery4User Discovery With Env Vars PowerShell Scriptdcb6cdee-1fb0-4087-8bf8-88cfd136ba51powershell
1848discoveryT1033System Owner/User Discovery5GetCurrent User with PowerShell Script1392bd0f-5d5a-429e-81d9-eb9d4d4d5b3bpowershell
1849discoveryT1033System Owner/User Discovery6System Discovery - SocGholish whoami3d257a03-eb80-41c5-b744-bb37ac7f65c7powershell
1850discoveryT1033System Owner/User Discovery7System Owner/User Discovery Using Command Promptba38e193-37a6-4c41-b214-61b33277fe36command_prompt
1851discoveryT1613Container and Resource Discovery1Docker Container and Resource Discoveryea2255df-d781-493b-9693-ac328f9afc3fsh
1852discoveryT1613Container and Resource Discovery2Podman Container and Resource Discoveryfc631702-3f03-4f2b-8d8a-6b3d055580a1sh
1853discoveryT1016.001System Network Configuration Discovery: Internet Connection Discovery1Check internet connection using ping Windowse184b6bd-fb28-48aa-9a59-13012e33d7dccommand_prompt
1854discoveryT1016.001System Network Configuration Discovery: Internet Connection Discovery2Check internet connection using ping freebsd, linux or macosbe8f4019-d8b6-434c-a814-53123cdcc11ebash
1855discoveryT1016.001System Network Configuration Discovery: Internet Connection Discovery3Check internet connection using Test-NetConnection in PowerShell (ICMP-Ping)f8160cde-4e16-4c8b-8450-6042d5363eb0powershell
1856discoveryT1016.001System Network Configuration Discovery: Internet Connection Discovery4Check internet connection using Test-NetConnection in PowerShell (TCP-HTTP)7c35779d-42ec-42ab-a283-6255b28e9d68powershell
1857discoveryT1016.001System Network Configuration Discovery: Internet Connection Discovery5Check internet connection using Test-NetConnection in PowerShell (TCP-SMB)d9c32b3b-7916-45ad-aca5-6c902da80319powershell
1858discoveryT1615Group Policy Discovery1Display group policy information via gpresult0976990f-53b1-4d3f-a185-6df5be429d3bcommand_prompt
1859discoveryT1615Group Policy Discovery2Get-DomainGPO to display group policy information via PowerView4e524c4e-0e02-49aa-8df5-93f3f7959b9fpowershell
1860discoveryT1615Group Policy Discovery3WinPwn - GPOAuditbc25c04b-841e-4965-855f-d1f645d7ab73powershell
1861discoveryT1615Group Policy Discovery4WinPwn - GPORemoteAccessPolicy7230d01a-0a72-4bd5-9d7f-c6d472bc6a59powershell
1862discoveryT1615Group Policy Discovery5MSFT Get-GPO Cmdlet52778a8f-a10b-41a4-9eae-52ddb74072bfpowershell
1863discoveryT1652Device Driver Discovery1Device Driver Discovery235b30a2-e5b1-441f-9705-be6231c88dddpowershell
1864discoveryT1087.002Account Discovery: Domain Account1Enumerate all accounts (Domain)6fbc9e68-5ad7-444a-bd11-8bf3136c477ecommand_prompt
1865discoveryT1087.002Account Discovery: Domain Account2Enumerate all accounts via PowerShell (Domain)8b8a6449-be98-4f42-afd2-dedddc7453b2powershell
1866discoveryT1087.002Account Discovery: Domain Account3Enumerate logged on users via CMD (Domain)161dcd85-d014-4f5e-900c-d3eaae82a0f7command_prompt
1867discoveryT1087.002Account Discovery: Domain Account4Automated AD Recon (ADRecon)95018438-454a-468c-a0fa-59c800149b59powershell
1868discoveryT1087.002Account Discovery: Domain Account5Adfind -Listing password policy736b4f53-f400-4c22-855d-1a6b5a551600command_prompt
1869discoveryT1087.002Account Discovery: Domain Account6Adfind - Enumerate Active Directory Adminsb95fd967-4e62-4109-b48d-265edfd28c3acommand_prompt
1870discoveryT1087.002Account Discovery: Domain Account7Adfind - Enumerate Active Directory User Objectse1ec8d20-509a-4b9a-b820-06c9b2da8eb7command_prompt
1871discoveryT1087.002Account Discovery: Domain Account8Adfind - Enumerate Active Directory Exchange AD Objects5e2938fb-f919-47b6-8b29-2f6a1f718e99command_prompt
1872discoveryT1087.002Account Discovery: Domain Account9Enumerate Default Domain Admin Details (Domain)c70ab9fd-19e2-4e02-a83c-9cfa8eaa8fefcommand_prompt
1873discoveryT1087.002Account Discovery: Domain Account10Enumerate Active Directory for Unconstrained Delegation46f8dbe9-22a5-4770-8513-66119c5be63bpowershell
1874discoveryT1087.002Account Discovery: Domain Account11Get-DomainUser with PowerView93662494-5ed7-4454-a04c-8c8372808ac2powershell
1875discoveryT1087.002Account Discovery: Domain Account12Enumerate Active Directory Users with ADSISearcher02e8be5a-3065-4e54-8cc8-a14d138834d3powershell
1876discoveryT1087.002Account Discovery: Domain Account13Enumerate Linked Policies In ADSISearcher Discovery7ab0205a-34e4-4a44-9b04-e1541d1a57bepowershell
1877discoveryT1087.002Account Discovery: Domain Account14Enumerate Root Domain linked policies Discovery00c652e2-0750-4ca6-82ff-0204684a6fe4powershell
1878discoveryT1087.002Account Discovery: Domain Account15WinPwn - generaldomaininfoce483c35-c74b-45a7-a670-631d1e69db3dpowershell
1879discoveryT1087.002Account Discovery: Domain Account16Kerbrute - userenumf450461c-18d1-4452-9f0d-2c42c3f08624powershell
1880discoveryT1087.002Account Discovery: Domain Account17Wevtutil - Discover NTLM Users Remoteb8a563d4-a836-4993-a74e-0a19b8481bfepowershell
1881discoveryT1087.002Account Discovery: Domain Account18Suspicious LAPS Attributes Query with Get-ADComputer all properties394012d9-2164-4d4f-b9e5-acf30ba933fepowershell
1882discoveryT1087.002Account Discovery: Domain Account19Suspicious LAPS Attributes Query with Get-ADComputer ms-Mcs-AdmPwd property6e85bdf9-7bc4-4259-ac0f-f0cb39964443powershell
1883discoveryT1087.002Account Discovery: Domain Account20Suspicious LAPS Attributes Query with Get-ADComputer all properties and SearchScopeffbcfd62-15d6-4989-a21a-80bfc8e58bb5powershell
1884discoveryT1087.002Account Discovery: Domain Account21Suspicious LAPS Attributes Query with adfind all propertiesabf00f6c-9983-4d9a-afbc-6b1c6c6448e1powershell
1885discoveryT1087.002Account Discovery: Domain Account22Suspicious LAPS Attributes Query with adfind ms-Mcs-AdmPwd51a98f96-0269-4e09-a10f-e307779a8b05powershell
1886discoveryT1087.002Account Discovery: Domain Account23Active Directory Domain Search096b6d2a-b63f-4100-8fa0-525da4cd25cash
1887discoveryT1087.002Account Discovery: Domain Account24Account Enumeration with LDAPDomainDumpa54d497e-8dbe-4558-9895-44944baa395fsh
1888discoveryT1087.001Account Discovery: Local Account1Enumerate all accounts (Local)f8aab3dd-5990-4bf8-b8ab-2226c951696fsh
1889discoveryT1087.001Account Discovery: Local Account2View sudoers accessfed9be70-0186-4bde-9f8a-20945f9370c2sh
1890discoveryT1087.001Account Discovery: Local Account3View accounts with UID 0c955a599-3653-4fe5-b631-f11c00eb0397sh
1891discoveryT1087.001Account Discovery: Local Account4List opened files by user7e46c7a5-0142-45be-a858-1a3ecb4fd3cbsh
1892discoveryT1087.001Account Discovery: Local Account5Show if a user account has ever logged in remotely0f0b6a29-08c3-44ad-a30b-47fd996b2110sh
1893discoveryT1087.001Account Discovery: Local Account6Enumerate users and groupse6f36545-dc1e-47f0-9f48-7f730f54a02esh
1894discoveryT1087.001Account Discovery: Local Account7Enumerate users and groups319e9f6c-7a9e-432e-8c62-9385c803b6f2sh
1895discoveryT1087.001Account Discovery: Local Account8Enumerate all accounts on Windows (Local)80887bec-5a9b-4efc-a81d-f83eb2eb32abcommand_prompt
1896discoveryT1087.001Account Discovery: Local Account9Enumerate all accounts via PowerShell (Local)ae4b6361-b5f8-46cb-a3f9-9cf108ccfe7bpowershell
1897discoveryT1087.001Account Discovery: Local Account10Enumerate logged on users via CMD (Local)a138085e-bfe5-46ba-a242-74a6fb884af3command_prompt
1898discoveryT1087.001Account Discovery: Local Account11ESXi - Local Account Discovery via ESXCLI9762ac6e-aa60-4449-a2f0-cbbd0e1fd22ccommand_prompt
1899discoveryT1497.001Virtualization/Sandbox Evasion: System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
1900discoveryT1497.001Virtualization/Sandbox Evasion: System Checks2Detect Virtualization Environment (FreeBSD)e129d73b-3e03-4ae9-bf1e-67fc8921e0fdsh
1901discoveryT1497.001Virtualization/Sandbox Evasion: System Checks3Detect Virtualization Environment (Windows)502a7dc4-9d6f-4d28-abf2-f0e84692562dpowershell
1902discoveryT1497.001Virtualization/Sandbox Evasion: System Checks4Detect Virtualization Environment via iorega960185f-aef6-4547-8350-d1ce16680d09sh
1903discoveryT1497.001Virtualization/Sandbox Evasion: System Checks5Detect Virtualization Environment via WMI Manufacturer/Model Listing (Windows)4a41089a-48e0-47aa-82cb-5b81a463bc78powershell
1904discoveryT1497.001Virtualization/Sandbox Evasion: System Checks6Detect Virtualization Environment using sysctl (hw.model)6beae646-eb4c-4730-95be-691a4094408csh
1905discoveryT1497.001Virtualization/Sandbox Evasion: System Checks7Check if System Integrity Protection is enabled2b73cd9b-b2fb-4357-b9d7-c73c41d9e945sh
1906discoveryT1497.001Virtualization/Sandbox Evasion: System Checks8Detect Virtualization Environment using system_profilere04d2e89-de15-4d90-92f9-a335c7337f0fsh
1907discoveryT1069.002Permission Groups Discovery: Domain Groups1Basic Permission Groups Discovery Windows (Domain)dd66d77d-8998-48c0-8024-df263dc2ce5dcommand_prompt
1908discoveryT1069.002Permission Groups Discovery: Domain Groups2Permission Groups Discovery PowerShell (Domain)6d5d8c96-3d2a-4da9-9d6d-9a9d341899a7powershell
1909discoveryT1069.002Permission Groups Discovery: Domain Groups3Elevated group enumeration using net group (Domain)0afb5163-8181-432e-9405-4322710c0c37command_prompt
1910discoveryT1069.002Permission Groups Discovery: Domain Groups4Find machines where user has local admin access (PowerView)a2d71eee-a353-4232-9f86-54f4288dd8c1powershell
1911discoveryT1069.002Permission Groups Discovery: Domain Groups5Find local admins on all machines in domain (PowerView)a5f0d9f8-d3c9-46c0-8378-846ddd6b1cbdpowershell
1912discoveryT1069.002Permission Groups Discovery: Domain Groups6Find Local Admins via Group Policy (PowerView)64fdb43b-5259-467a-b000-1b02c00e510apowershell
1913discoveryT1069.002Permission Groups Discovery: Domain Groups7Enumerate Users Not Requiring Pre Auth (ASRepRoast)870ba71e-6858-4f6d-895c-bb6237f6121bpowershell
1914discoveryT1069.002Permission Groups Discovery: Domain Groups8Adfind - Query Active Directory Groups48ddc687-82af-40b7-8472-ff1e742e8274command_prompt
1915discoveryT1069.002Permission Groups Discovery: Domain Groups9Enumerate Active Directory Groups with Get-AdGroup3d1fcd2a-e51c-4cbe-8d84-9a843bad8dc8powershell
1916discoveryT1069.002Permission Groups Discovery: Domain Groups10Enumerate Active Directory Groups with ADSISearcher9f4e344b-8434-41b3-85b1-d38f29d148d0powershell
1917discoveryT1069.002Permission Groups Discovery: Domain Groups11Get-ADUser Enumeration using UserAccountControl flags (AS-REP Roasting)43fa81fb-34bb-4b5f-867b-03c7dbe0e3d8powershell
1918discoveryT1069.002Permission Groups Discovery: Domain Groups12Get-DomainGroupMember with PowerView46352f40-f283-4fe5-b56d-d9a71750e145powershell
1919discoveryT1069.002Permission Groups Discovery: Domain Groups13Get-DomainGroup with PowerView5a8a181c-2c8e-478d-a943-549305a01230powershell
1920discoveryT1069.002Permission Groups Discovery: Domain Groups14Active Directory Enumeration with LDIFDE22cf8cb9-adb1-4e8c-80ca-7c723dfc8784command_prompt
1921discoveryT1069.002Permission Groups Discovery: Domain Groups15Active Directory Domain Search Using LDAP - Linux (Ubuntu)/macOSd58d749c-4450-4975-a9e9-8b1d562755c2sh
1922discoveryT1007System Service Discovery1System Service Discovery89676ba1-b1f8-47ee-b940-2e1a113ebc71command_prompt
1923discoveryT1007System Service Discovery2System Service Discovery - net.exe5f864a3f-8ce9-45c0-812c-bdf7d8aeacc3command_prompt
1924discoveryT1007System Service Discovery3System Service Discovery - systemctl/servicef4b26bce-4c2c-46c0-bcc5-fce062d38befbash
1925discoveryT1007System Service Discovery4Get-Service Execution51f17016-d8fa-4360-888a-df4bf92c4a04command_prompt
1926discoveryT1040Network Sniffing1Packet Capture Linux using tshark or tcpdump7fe741f7-b265-4951-a7c7-320889083b3ebash
1927discoveryT1040Network Sniffing2Packet Capture FreeBSD using tshark or tcpdumpc93f2492-9ebe-44b5-8b45-36574cccfe67sh
1928discoveryT1040Network Sniffing3Packet Capture macOS using tcpdump or tshark9d04efee-eff5-4240-b8d2-07792b873608bash
1929discoveryT1040Network Sniffing4Packet Capture Windows Command Prompta5b2f6a0-24b4-493e-9590-c699f75723cacommand_prompt
1930discoveryT1040Network Sniffing5Windows Internal Packet Captureb5656f67-d67f-4de8-8e62-b5581630f528command_prompt
1931discoveryT1040Network Sniffing6Windows Internal pktmon capturec67ba807-f48b-446e-b955-e4928cd1bf91command_prompt
1932discoveryT1040Network Sniffing7Windows Internal pktmon set filter855fb8b4-b8ab-4785-ae77-09f5df7bff55command_prompt
1933discoveryT1040Network Sniffing8Packet Capture macOS using /dev/bpfN with sudoe6fe5095-545d-4c8b-a0ae-e863914be3aabash
1934discoveryT1040Network Sniffing9Filtered Packet Capture macOS using /dev/bpfN with sudoe2480aee-23f3-4f34-80ce-de221e27cd19bash
1935discoveryT1040Network Sniffing10Packet Capture FreeBSD using /dev/bpfN with sudoe2028771-1bfb-48f5-b5e6-e50ee0942a14sh
1936discoveryT1040Network Sniffing11Filtered Packet Capture FreeBSD using /dev/bpfN with sudoa3a0d4c9-c068-4563-a08d-583bd05b884csh
1937discoveryT1040Network Sniffing12Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo10c710c9-9104-4d5f-8829-5b65391e2a29bash
1938discoveryT1040Network Sniffing13Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo7a0895f0-84c1-4adf-8491-a21510b1d4c1bash
1939discoveryT1040Network Sniffing14Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo515575ab-d213-42b1-aa64-ef6a2dd4641bbash
1940discoveryT1040Network Sniffing15Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudob1cbdf8b-6078-48f5-a890-11ea19d7f8e9bash
1941discoveryT1040Network Sniffing16PowerShell Network Sniffing9c15a7de-de14-46c3-bc2a-6d94130986aepowershell
1942discoveryT1135Network Share Discovery1Network Share Discoveryf94b5ad9-911c-4eff-9718-fd21899db4f7sh
1943discoveryT1135Network Share Discovery2Network Share Discovery - linux875805bc-9e86-4e87-be86-3a5527315caebash
1944discoveryT1135Network Share Discovery3Network Share Discovery - FreeBSD77e468a6-3e5c-45a1-9948-c4b5603747cbsh
1945discoveryT1135Network Share Discovery4Network Share Discovery command prompt20f1097d-81c1-405c-8380-32174d493bbbcommand_prompt
1946discoveryT1135Network Share Discovery5Network Share Discovery PowerShell1b0814d1-bb24-402d-9615-1b20c50733fbpowershell
1947discoveryT1135Network Share Discovery6View available share drivesab39a04f-0c93-4540-9ff2-83f862c385aecommand_prompt
1948discoveryT1135Network Share Discovery7Share Discovery with PowerViewb1636f0a-ba82-435c-b699-0d78794d8bfdpowershell
1949discoveryT1135Network Share Discovery8PowerView ShareFinderd07e4cc1-98ae-447e-9d31-36cb430d28c4powershell
1950discoveryT1135Network Share Discovery9WinPwn - shareenumeration987901d1-5b87-4558-a6d9-cffcabc638b8powershell
1951discoveryT1135Network Share Discovery10Network Share Discovery via dir command13daa2cf-195a-43df-a8bd-7dd5ffb607b5command_prompt
1952discoveryT1135Network Share Discovery11Enumerate All Network Shares with SharpSharesd1fa2a69-b0a2-4e8a-9112-529b00c19a41powershell
1953discoveryT1135Network Share Discovery12Enumerate All Network Shares with Snafflerb19d74b7-5e72-450a-8499-82e49e379d1apowershell
1954discoveryT1120Peripheral Device Discovery1Win32_PnPEntity Hardware Inventory2cb4dbf2-2dca-4597-8678-4d39d207a3a5powershell
1955discoveryT1120Peripheral Device Discovery2WinPwn - printercheckcb6e76ca-861e-4a7f-be08-564caa3e6f75powershell
1956discoveryT1120Peripheral Device Discovery3Peripheral Device Discovery via fsutil424e18fd-48b8-4201-8d3a-bf591523a686command_prompt
1957discoveryT1120Peripheral Device Discovery4Get Printer Device List via PowerShell Command5c876daf-db1e-41cf-988d-139a7443ccd4powershell
1958discoveryT1082System Information Discovery1System Information Discovery66703791-c902-4560-8770-42b8a91f7667command_prompt
1959discoveryT1082System Information Discovery2System Information Discoveryedff98ec-0f73-4f63-9890-6b117092aff6sh
1960discoveryT1082System Information Discovery3List OS Informationcccb070c-df86-4216-a5bc-9fb60c74e27csh
1961discoveryT1082System Information Discovery4Linux VM Check via Hardware31dad7ad-2286-4c02-ae92-274418c85fecbash
1962discoveryT1082System Information Discovery5Linux VM Check via Kernel Modules8057d484-0fae-49a4-8302-4812c4f1e64ebash
1963discoveryT1082System Information Discovery6FreeBSD VM Check via Kernel Moduleseefe6a49-d88b-41d8-8fc2-b46822da90d3sh
1964discoveryT1082System Information Discovery7Hostname Discovery (Windows)85cfbf23-4a1e-4342-8792-007e004b975fcommand_prompt
1965discoveryT1082System Information Discovery8Hostname Discovery486e88ea-4f56-470f-9b57-3f4d73f39133sh
1966discoveryT1082System Information Discovery9Windows MachineGUID Discovery224b4daf-db44-404e-b6b2-f4d1f0126ef8command_prompt
1967discoveryT1082System Information Discovery10Griffon Recon69bd4abe-8759-49a6-8d21-0f15822d6370powershell
1968discoveryT1082System Information Discovery11Environment variables discovery on windowsf400d1c0-1804-4ff8-b069-ef5ddd2adbf3command_prompt
1969discoveryT1082System Information Discovery12Environment variables discovery on freebsd, macos and linuxfcbdd43f-f4ad-42d5-98f3-0218097e2720sh
1970discoveryT1082System Information Discovery13Show System Integrity Protection status (MacOS)327cc050-9e99-4c8e-99b5-1d15f2fb6b96sh
1971discoveryT1082System Information Discovery14WinPwn - winPEASeea1d918-825e-47dd-acc2-814d6c58c0e1powershell
1972discoveryT1082System Information Discovery15WinPwn - itm4nprivesc3d256a2f-5e57-4003-8eb6-64d91b1da7cepowershell
1973discoveryT1082System Information Discovery16WinPwn - Powersploits privesc checks345cb8e4-d2de-4011-a580-619cf5a9e2d7powershell
1974discoveryT1082System Information Discovery17WinPwn - General privesc checks5b6f39a2-6ec7-4783-a5fd-2c54a55409edpowershell
1975discoveryT1082System Information Discovery18WinPwn - GeneralRecon7804659b-fdbf-4cf6-b06a-c03e758590e8powershell
1976discoveryT1082System Information Discovery19WinPwn - Morerecon3278b2f6-f733-4875-9ef4-bfed34244f0apowershell
1977discoveryT1082System Information Discovery20WinPwn - RBCD-Checkdec6a0d8-bcaf-4c22-9d48-2aee59fb692bpowershell
1978discoveryT1082System Information Discovery21WinPwn - PowerSharpPack - Watson searching for missing windows patches07b18a66-6304-47d2-bad0-ef421eb2e107powershell
1979discoveryT1082System Information Discovery22WinPwn - PowerSharpPack - Sharpup checking common Privesc vectorsefb79454-1101-4224-a4d0-30c9c8b29ffcpowershell
1980discoveryT1082System Information Discovery23WinPwn - PowerSharpPack - Seatbelt5c16ceb4-ba3a-43d7-b848-a13c1f216d95powershell
1981discoveryT1082System Information Discovery24Azure Security Scan with SkyArk26a18d3d-f8bc-486b-9a33-d6df5d78a594powershell
1982discoveryT1082System Information Discovery25Linux List Kernel Modules034fe21c-3186-49dd-8d5d-128b35f181c7sh
1983discoveryT1082System Information Discovery26FreeBSD List Kernel Modules4947897f-643a-4b75-b3f5-bed6885749f6sh
1984discoveryT1082System Information Discovery27System Information Discovery with WMIC8851b73a-3624-4bf7-8704-aa312411565ccommand_prompt
1985discoveryT1082System Information Discovery28System Information Discovery4060ee98-01ae-4c8e-8aad-af8300519cc7command_prompt
1986discoveryT1082System Information Discovery29Check computer location96be6002-9200-47db-94cb-c3e27de1cb36command_prompt
1987discoveryT1082System Information Discovery30BIOS Information Discovery through Registryf2f91612-d904-49d7-87c2-6c165d23beadcommand_prompt
1988discoveryT1082System Information Discovery31ESXi - VM Discovery using ESXCLI2040405c-eea6-4c1c-aef3-c2acc430fac9command_prompt
1989discoveryT1082System Information Discovery32ESXi - Darkside system information discoveryf89812e5-67d1-4f49-86fa-cbc6609ea86acommand_prompt
1990discoveryT1082System Information Discovery33sysctl to gather macOS hardware infoc8d40da9-31bd-47da-a497-11ea55d1ef6csh
1991discoveryT1082System Information Discovery34operating system discovery 70e13ef4-5a74-47e4-9d16-760b41b0e2dbpowershell
1992discoveryT1082System Information Discovery35Check OS version via "ver" commandf6ecb109-df24-4303-8d85-1987dbae6160command_prompt
1993discoveryT1082System Information Discovery36Display volume shadow copies with "vssadmin"7161b085-816a-491f-bab4-d68e974b7995command_prompt
1994discoveryT1082System Information Discovery37Identify System Locale and Regional Settings with PowerShellce479c1a-e8fa-42b2-812a-96b0f2f4d28acommand_prompt
1995discoveryT1082System Information Discovery38Enumerate Available Drives via gdrc187c9bc-4511-40b3-aa10-487b2c70b6a5command_prompt
1996discoveryT1082System Information Discovery39Discover OS Product Name via Registrybe3b5fe3-a575-4fb8-83f6-ad4a68dd5ce7command_prompt
1997discoveryT1082System Information Discovery40Discover OS Build Number via Registryacfcd709-0013-4f1e-b9ee-bc1e7bafaaeccommand_prompt
1998discoveryT1016.002System Network Configuration Discovery: Wi-Fi Discovery1Enumerate Stored Wi-Fi Profiles And Passwords via netsh53cf1903-0fa7-4177-ab14-f358ae809eeccommand_prompt
1999discoveryT1010Application Window Discovery1List Process Main Windows - C# .NETfe94a1c3-3e22-4dc9-9fdf-3a8bdbc10dc4command_prompt
2000discoveryT1497.003Time Based Evasion1Delay execution with ping8b87dd03-8204-478c-bac3-3959f6528de3sh
2001discoveryT1580Cloud Infrastructure Discovery1AWS - EC2 Enumeration from Cloud Instance99ee161b-dcb1-4276-8ecb-7cfdcb207820sh
2002discoveryT1580Cloud Infrastructure Discovery2AWS - EC2 Security Group Enumeration99b38f24-5acc-4aa3-85e5-b7f97a5d37accommand_prompt
2003discoveryT1217Browser Bookmark Discovery1List Mozilla Firefox Bookmark Database Files on FreeBSD/Linux3a41f169-a5ab-407f-9269-abafdb5da6c2sh
2004discoveryT1217Browser Bookmark Discovery2List Mozilla Firefox Bookmark Database Files on macOS1ca1f9c7-44bc-46bb-8c85-c50e2e94267bsh
2005discoveryT1217Browser Bookmark Discovery3List Google Chrome Bookmark JSON Files on macOSb789d341-154b-4a42-a071-9111588be9bcsh
2006discoveryT1217Browser Bookmark Discovery4List Google Chromium Bookmark JSON Files on FreeBSD88ca025b-3040-44eb-9168-bd8af22b82fash
2007discoveryT1217Browser Bookmark Discovery5List Google Chrome / Opera Bookmarks on Windows with powershellfaab755e-4299-48ec-8202-fc7885eb6545powershell
2008discoveryT1217Browser Bookmark Discovery6List Google Chrome / Edge Chromium Bookmarks on Windows with command prompt76f71e2f-480e-4bed-b61e-398fe17499d5command_prompt
2009discoveryT1217Browser Bookmark Discovery7List Mozilla Firefox bookmarks on Windows with command prompt4312cdbc-79fc-4a9c-becc-53d49c734bc5command_prompt
2010discoveryT1217Browser Bookmark Discovery8List Internet Explorer Bookmarks using the command prompt727dbcdb-e495-4ab1-a6c4-80c7f77aef85command_prompt
2011discoveryT1217Browser Bookmark Discovery9List Safari Bookmarks on MacOS5fc528dd-79de-47f5-8188-25572b7fafe0sh
2012discoveryT1217Browser Bookmark Discovery10Extract Edge Browsing History74094120-e1f5-47c9-b162-a418a0f624d5powershell
2013discoveryT1217Browser Bookmark Discovery11Extract chrome Browsing Historycfe6315c-4945-40f7-b5a4-48f7af2262afpowershell
2014discoveryT1016System Network Configuration Discovery1System Network Configuration Discovery on Windows970ab6a1-0157-4f3f-9a73-ec4166754b23command_prompt
2015discoveryT1016System Network Configuration Discovery2List Windows Firewall Rules038263cb-00f4-4b0a-98ae-0696c67e1752command_prompt
2016discoveryT1016System Network Configuration Discovery3System Network Configuration Discoveryc141bbdb-7fca-4254-9fd6-f47e79447e17sh
2017discoveryT1016System Network Configuration Discovery4System Network Configuration Discovery (TrickBot Style)dafaf052-5508-402d-bf77-51e0700c02e2command_prompt
2018discoveryT1016System Network Configuration Discovery5List Open Egress Ports4b467538-f102-491d-ace7-ed487b853bf5powershell
2019discoveryT1016System Network Configuration Discovery6Adfind - Enumerate Active Directory Subnet Objects9bb45dd7-c466-4f93-83a1-be30e56033eecommand_prompt
2020discoveryT1016System Network Configuration Discovery7Qakbot Recon121de5c6-5818-4868-b8a7-8fd07c455c1bcommand_prompt
2021discoveryT1016System Network Configuration Discovery8List macOS Firewall Rulesff1d8c25-2aa4-4f18-a425-fede4a41ee88bash
2022discoveryT1016System Network Configuration Discovery9DNS Server Discovery Using nslookup34557863-344a-468f-808b-a1bfb89b4fa9command_prompt
2023discoveryT1482Domain Trust Discovery1Windows - Discover domain trusts with dsquery4700a710-c821-4e17-a3ec-9e4c81d6845fcommand_prompt
2024discoveryT1482Domain Trust Discovery2Windows - Discover domain trusts with nltest2e22641d-0498-48d2-b9ff-c71e496ccdbecommand_prompt
2025discoveryT1482Domain Trust Discovery3Powershell enumerate domains and forestsc58fbc62-8a62-489e-8f2d-3565d7d96f30powershell
2026discoveryT1482Domain Trust Discovery4Adfind - Enumerate Active Directory OUsd1c73b96-ab87-4031-bad8-0e1b3b8bf3eccommand_prompt
2027discoveryT1482Domain Trust Discovery5Adfind - Enumerate Active Directory Trusts15fe436d-e771-4ff3-b655-2dca9ba52834command_prompt
2028discoveryT1482Domain Trust Discovery6Get-DomainTrust with PowerViewf974894c-5991-4b19-aaf5-7cc2fe298c5dpowershell
2029discoveryT1482Domain Trust Discovery7Get-ForestTrust with PowerView58ed10e8-0738-4651-8408-3a3e9a526279powershell
2030discoveryT1482Domain Trust Discovery8TruffleSnout - Listing AD Infrastructureea1b4f2d-5b82-4006-b64f-f2845608a3bfcommand_prompt
2031discoveryT1083File and Directory Discovery1File and Directory Discovery (cmd.exe)0e36303b-6762-4500-b003-127743b80ba6command_prompt
2032discoveryT1083File and Directory Discovery2File and Directory Discovery (PowerShell)2158908e-b7ef-4c21-8a83-3ce4dd05a924powershell
2033discoveryT1083File and Directory Discovery3Nix File and Directory Discoveryffc8b249-372a-4b74-adcd-e4c0430842desh
2034discoveryT1083File and Directory Discovery4Nix File and Directory Discovery 213c5e1ae-605b-46c4-a79f-db28c77ff24esh
2035discoveryT1083File and Directory Discovery5Simulating MAZE Directory Enumerationc6c34f61-1c3e-40fb-8a58-d017d88286d8powershell
2036discoveryT1083File and Directory Discovery6Launch DirLister Executablec5bec457-43c9-4a18-9a24-fe151d8971b7powershell
2037discoveryT1083File and Directory Discovery7ESXi - Enumerate VMDKs available on an ESXi Host4a233a40-caf7-4cf1-890a-c6331bbc72cfcommand_prompt
2038discoveryT1083File and Directory Discovery8Identifying Network Shares - Linux361fe49d-0c19-46ec-a483-ccb92d38e88esh
2039discoveryT1083File and Directory Discovery9Recursive Enumerate Files And Directories By Powershell95a21323-770d-434c-80cd-6f6fbf7af432powershell
2040discoveryT1049System Network Connections Discovery1System Network Connections Discovery0940a971-809a-48f1-9c4d-b1d785e96ee5command_prompt
2041discoveryT1049System Network Connections Discovery2System Network Connections Discovery with PowerShellf069f0f1-baad-4831-aa2b-eddac4baac4apowershell
2042discoveryT1049System Network Connections Discovery3System Network Connections Discovery FreeBSD, Linux & MacOS9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2sh
2043discoveryT1049System Network Connections Discovery4System Discovery using SharpView96f974bb-a0da-4d87-a744-ff33e73367e9powershell
2044discoveryT1619Cloud Storage Object Discovery1AWS S3 Enumeration3c7094f8-71ec-4917-aeb8-a633d7ec4ef5sh
2045discoveryT1619Cloud Storage Object Discovery2Azure - Enumerate Storage Account Objects via Shared Key authorization using Azure CLI070322a4-2c60-4c50-8ffb-c450a34fe7bfpowershell
2046discoveryT1619Cloud Storage Object Discovery3Azure - Scan for Anonymous Access to Azure Storage (Powershell)146af1f1-b74e-4aa7-9895-505eb559b4b0powershell
2047discoveryT1619Cloud Storage Object Discovery4Azure - Enumerate Azure Blobs with MicroBurst3dab4bcc-667f-4459-aea7-4162dd2d6590powershell
2048discoveryT1654Log Enumeration1Get-EventLog To Enumerate Windows Security Loga9030b20-dd4b-4405-875e-3462c6078fdcpowershell
2049discoveryT1654Log Enumeration2Enumerate Windows Security Log via WevtUtilfef0ace1-3550-4bf1-a075-9fea55a778ddcommand_prompt
2050discoveryT1057Process Discovery1Process Discovery - ps4ff64f0b-aaf2-4866-b39d-38d9791407ccsh
2051discoveryT1057Process Discovery2Process Discovery - tasklistc5806a4f-62b8-4900-980b-c7ec004e9908command_prompt
2052discoveryT1057Process Discovery3Process Discovery - Get-Process3b3809b6-a54b-4f5b-8aff-cb51f2e97b34powershell
2053discoveryT1057Process Discovery4Process Discovery - get-wmiObjectb51239b4-0129-474f-a2b4-70f855b9f2c2powershell
2054discoveryT1057Process Discovery5Process Discovery - wmic process640cbf6d-659b-498b-ba53-f6dd1a1cc02ccommand_prompt
2055discoveryT1057Process Discovery6Discover Specific Process - tasklist11ba69ee-902e-4a0f-b3b6-418aed7d7ddbcommand_prompt
2056discoveryT1057Process Discovery7Process Discovery - Process Hacker966f4c16-1925-4d9b-8ce0-01334ee0867dpowershell
2057discoveryT1057Process Discovery8Process Discovery - PC Hunterb4ca838d-d013-4461-bf2c-f7132617b409powershell
2058discoveryT1057Process Discovery9Launch Taskmgr from cmd to View running processes4fd35378-39aa-481e-b7c4-e3bf49375c67command_prompt
2059discoveryT1069.001Permission Groups Discovery: Local Groups1Permission Groups Discovery (Local)952931a4-af0b-4335-bbbe-73c8c5b327aesh
2060discoveryT1069.001Permission Groups Discovery: Local Groups2Basic Permission Groups Discovery Windows (Local)1f454dd6-e134-44df-bebb-67de70fb6cd8command_prompt
2061discoveryT1069.001Permission Groups Discovery: Local Groups3Permission Groups Discovery PowerShell (Local)a580462d-2c19-4bc7-8b9a-57a41b7d3ba4powershell
2062discoveryT1069.001Permission Groups Discovery: Local Groups4SharpHound3 - LocalAdmine03ada14-0980-4107-aff1-7783b2b59bb1powershell
2063discoveryT1069.001Permission Groups Discovery: Local Groups5Wmic Group Discovery7413be50-be8e-430f-ad4d-07bf197884b2command_prompt
2064discoveryT1069.001Permission Groups Discovery: Local Groups6WMIObject Group Discovery69119e58-96db-4110-ad27-954e48f3bb13powershell
2065discoveryT1069.001Permission Groups Discovery: Local Groups7Permission Groups Discovery for Containers- Local Groups007d7aa4-8c4d-4f55-ba6a-7c965d51219csh
2066discoveryT1201Password Policy Discovery1Examine password complexity policy - Ubuntu085fe567-ac84-47c7-ac4c-2688ce28265bbash
2067discoveryT1201Password Policy Discovery2Examine password complexity policy - FreeBSDa7893624-a3d7-4aed-9676-80498f31820fsh
2068discoveryT1201Password Policy Discovery3Examine password complexity policy - CentOS/RHEL 7.x78a12e65-efff-4617-bc01-88f17d71315dbash
2069discoveryT1201Password Policy Discovery4Examine password complexity policy - CentOS/RHEL 6.x6ce12552-0adb-4f56-89ff-95ce268f6358bash
2070discoveryT1201Password Policy Discovery5Examine password expiration policy - All Linux7c86c55c-70fa-4a05-83c9-3aa19b145d1abash
2071discoveryT1201Password Policy Discovery6Examine local password policy - Windows4588d243-f24e-4549-b2e3-e627acc089f6command_prompt
2072discoveryT1201Password Policy Discovery7Examine domain password policy - Windows46c2c362-2679-4ef5-aec9-0e958e135be4command_prompt
2073discoveryT1201Password Policy Discovery8Examine password policy - macOS4b7fa042-9482-45e1-b348-4b756b2a0742bash
2074discoveryT1201Password Policy Discovery9Get-DomainPolicy with PowerView3177f4da-3d4b-4592-8bdc-aa23d0b2e843powershell
2075discoveryT1201Password Policy Discovery10Enumerate Active Directory Password Policy with get-addefaultdomainpasswordpolicyb2698b33-984c-4a1c-93bb-e4ba72a0babbpowershell
2076discoveryT1201Password Policy Discovery11Use of SecEdit.exe to export the local security policy (including the password policy)510cc97f-56ac-4cd3-a198-d3218c23d889command_prompt
2077discoveryT1201Password Policy Discovery12Examine AWS Password Policy15330820-d405-450b-bd08-16b5be5be9f4sh
2078discoveryT1614.001System Location Discovery: System Language Discovery1Discover System Language by Registry Query631d4cf1-42c9-4209-8fe9-6bd4de9421becommand_prompt
2079discoveryT1614.001System Location Discovery: System Language Discovery2Discover System Language with chcpd91473ca-944e-477a-b484-0e80217cd789command_prompt
2080discoveryT1614.001System Location Discovery: System Language Discovery3Discover System Language with locale837d609b-845e-4519-90ce-edc3b4b0e138sh
2081discoveryT1614.001System Location Discovery: System Language Discovery4Discover System Language with localectl07ce871a-b3c3-44a3-97fa-a20118fdc7c9sh
2082discoveryT1614.001System Location Discovery: System Language Discovery5Discover System Language by locale file5d7057c9-2c8a-4026-91dd-13b5584daa69sh
2083discoveryT1614.001System Location Discovery: System Language Discovery6Discover System Language by Environment Variable Querycb8f7cdc-36c4-4ed0-befc-7ad7d24dfd7ash
2084discoveryT1614.001System Location Discovery: System Language Discovery7Discover System Language with dism.exe69f625ba-938f-4900-bdff-82ada3df5d9ccommand_prompt
2085discoveryT1614.001System Location Discovery: System Language Discovery8Discover System Language by Windows API Querye39b99e9-ce7f-4b24-9c88-0fbad069e6c6command_prompt
2086discoveryT1614.001System Location Discovery: System Language Discovery9Discover System Language with WMIC4758003d-db14-4959-9c0f-9e87558ac69ecommand_prompt
2087discoveryT1614.001System Location Discovery: System Language Discovery10Discover System Language with Powershell1f23bfe8-36d4-49ce-903a-19a1e8c6631bpowershell
2088discoveryT1012Query Registry1Query Registry8f7578c4-9863-4d83-875c-a565573bbdf0command_prompt
2089discoveryT1012Query Registry2Query Registry with Powershell cmdlets0434d081-bb32-42ce-bcbb-3548e4f2628fpowershell
2090discoveryT1012Query Registry3Enumerate COM Objects in Registry with Powershell0d80d088-a84c-4353-af1a-fc8b439f1564powershell
2091discoveryT1012Query Registry4Reg query for AlwaysInstallElevated status6fb4c4c5-f949-4fd2-8af5-ddbc61595223command_prompt
2092discoveryT1012Query Registry5Check Software Inventory Logging (SIL) status via Registry5c784969-1d43-4ac7-8c3d-ed6d025ed10dcommand_prompt
2093discoveryT1012Query Registry6Inspect SystemStartOptions Value in Registry96257079-cdc1-4aba-8705-3146e94b6dcecommand_prompt
2094discoveryT1614System Location Discovery1Get geolocation info through IP-Lookup services using curl Windowsfe53e878-10a3-477b-963e-4367348f5af5command_prompt
2095discoveryT1614System Location Discovery2Get geolocation info through IP-Lookup services using curl freebsd, linux or macos552b4db3-8850-412c-abce-ab5cc8a86604bash
2096discoveryT1518.001Software Discovery: Security Software Discovery1Security Software Discoveryf92a380f-ced9-491f-b338-95a991418ce2command_prompt
2097discoveryT1518.001Software Discovery: Security Software Discovery2Security Software Discovery - powershell7f566051-f033-49fb-89de-b6bacab730f0powershell
2098discoveryT1518.001Software Discovery: Security Software Discovery3Security Software Discovery - ps (macOS)ba62ce11-e820-485f-9c17-6f3c857cd840sh
2099discoveryT1518.001Software Discovery: Security Software Discovery4Security Software Discovery - ps (Linux)23b91cd2-c99c-4002-9e41-317c63e024a2sh
2100discoveryT1518.001Software Discovery: Security Software Discovery5Security Software Discovery - pgrep (FreeBSD)fa96c21c-5fd6-4428-aa28-51a2fbecdbdcsh
2101discoveryT1518.001Software Discovery: Security Software Discovery6Security Software Discovery - Sysmon Servicefe613cf3-8009-4446-9a0f-bc78a15b66c9command_prompt
2102discoveryT1518.001Software Discovery: Security Software Discovery7Security Software Discovery - AV Discovery via WMI1553252f-14ea-4d3b-8a08-d7a4211aa945command_prompt
2103discoveryT1518.001Software Discovery: Security Software Discovery8Security Software Discovery - AV Discovery via Get-CimInstance and Get-WmiObject cmdlets015cd268-996e-4c32-8347-94c80c6286eecommand_prompt
2104discoveryT1518.001Software Discovery: Security Software Discovery9Security Software Discovery - Windows Defender Enumerationd3415a0e-66ef-429b-acf4-a768876954f6powershell
2105discoveryT1518.001Software Discovery: Security Software Discovery10Security Software Discovery - Windows Firewall Enumeration9dca5a1d-f78c-4a8d-accb-d6de67cfed6bpowershell
2106discoveryT1518.001Software Discovery: Security Software Discovery11Get Windows Defender exclusion settings using WMICe31564c8-4c60-40cd-a8f4-9261307e8336command_prompt
2107discoveryT1526Cloud Service Discovery1Azure - Dump Subscription Data with MicroBurst1e40bb1d-195e-401e-a86b-c192f55e005cpowershell
2108discoveryT1526Cloud Service Discovery2AWS - Enumerate common cloud servicesaa8b9bcc-46fa-4a59-9237-73c7b93a980cpowershell
2109discoveryT1526Cloud Service Discovery3Azure - Enumerate common cloud services58f57c8f-db14-4e62-a4d3-5aaf556755d7powershell
2110discoveryT1018Remote System Discovery1Remote System Discovery - net85321a9c-897f-4a60-9f20-29788e50bccdcommand_prompt
2111discoveryT1018Remote System Discovery2Remote System Discovery - net group Domain Computersf1bf6c8f-9016-4edf-aff9-80b65f5d711fcommand_prompt
2112discoveryT1018Remote System Discovery3Remote System Discovery - nltest52ab5108-3f6f-42fb-8ba3-73bc054f22c8command_prompt
2113discoveryT1018Remote System Discovery4Remote System Discovery - ping sweep6db1f57f-d1d5-4223-8a66-55c9c65a9592command_prompt
2114discoveryT1018Remote System Discovery5Remote System Discovery - arp2d5a61f5-0447-4be4-944a-1f8530ed6574command_prompt
2115discoveryT1018Remote System Discovery6Remote System Discovery - arp nixacb6b1ff-e2ad-4d64-806c-6c35fe73b951sh
2116discoveryT1018Remote System Discovery7Remote System Discovery - sweep96db2632-8417-4dbb-b8bb-a8b92ba391desh
2117discoveryT1018Remote System Discovery8Remote System Discovery - nslookupbaa01aaa-5e13-45ec-8a0d-e46c93c9760fpowershell
2118discoveryT1018Remote System Discovery9Remote System Discovery - adidnsdump95e19466-469e-4316-86d2-1dc401b5a959command_prompt
2119discoveryT1018Remote System Discovery10Adfind - Enumerate Active Directory Computer Objectsa889f5be-2d54-4050-bd05-884578748bb4command_prompt
2120discoveryT1018Remote System Discovery11Adfind - Enumerate Active Directory Domain Controller Objects5838c31e-a0e2-4b9f-b60a-d79d2cb7995ecommand_prompt
2121discoveryT1018Remote System Discovery12Remote System Discovery - ip neighbour158bd4dd-6359-40ab-b13c-285b9ef6fa25sh
2122discoveryT1018Remote System Discovery13Remote System Discovery - ip route1a4ebe70-31d0-417b-ade2-ef4cb3e7d0e1sh
2123discoveryT1018Remote System Discovery14Remote System Discovery - netstatd2791d72-b67f-4615-814f-ec824a91f514sh
2124discoveryT1018Remote System Discovery15Remote System Discovery - ip tcp_metrics6c2da894-0b57-43cb-87af-46ea3b501388sh
2125discoveryT1018Remote System Discovery16Enumerate domain computers within Active Directory using DirectorySearcher962a6017-1c09-45a6-880b-adc9c57cb22epowershell
2126discoveryT1018Remote System Discovery17Enumerate Active Directory Computers with Get-AdComputer97e89d9e-e3f5-41b5-a90f-1e0825df0fdfpowershell
2127discoveryT1018Remote System Discovery18Enumerate Active Directory Computers with ADSISearcher64ede6ac-b57a-41c2-a7d1-32c6cd35397dpowershell
2128discoveryT1018Remote System Discovery19Get-DomainController with PowerViewb9d2e8ca-5520-4737-8076-4f08913da2c4powershell
2129discoveryT1018Remote System Discovery20Get-WmiObject to Enumerate Domain Controllerse3cf5123-f6c9-4375-bdf2-1bb3ba43a1adpowershell
2130discoveryT1018Remote System Discovery21Remote System Discovery - net group Domain Controller5843529a-5056-4bc1-9c13-a311e2af4ca0command_prompt
2131discoveryT1018Remote System Discovery22Enumerate Remote Hosts with Netscanb8147c9a-84db-4ec1-8eee-4e0da75f0de5powershell
2132discoveryT1046Network Service Discovery1Port Scan68e907da-2539-48f6-9fc9-257a78c05540bash
2133discoveryT1046Network Service Discovery2Port Scan Nmap515942b0-a09f-4163-a7bb-22fefb6f185fsh
2134discoveryT1046Network Service Discovery3Port Scan NMap for Windowsd696a3cb-d7a8-4976-8eb5-5af4abf2e3dfpowershell
2135discoveryT1046Network Service Discovery4Port Scan using python6ca45b04-9f15-4424-b9d3-84a217285a5cpowershell
2136discoveryT1046Network Service Discovery5WinPwn - spoolvulnscan54574908-f1de-4356-9021-8053dd57439apowershell
2137discoveryT1046Network Service Discovery6WinPwn - MS17-1097585b04-5be2-40e9-8c31-82157b8af2d6powershell
2138discoveryT1046Network Service Discovery7WinPwn - bluekeep1cca5640-32a9-46e6-b8e0-fabbe2384a73powershell
2139discoveryT1046Network Service Discovery8WinPwn - fruitbb037826-cbe8-4a41-93ea-b94059d6bb98powershell
2140discoveryT1046Network Service Discovery9Network Service Discovery for Containers06eaafdb-8982-426e-8a31-d572da633caash
2141discoveryT1046Network Service Discovery10Port-Scanning /24 Subnet with PowerShell05df2a79-dba6-4088-a804-9ca0802ca8e4powershell
2142discoveryT1046Network Service Discovery11Remote Desktop Services Discovery via PowerShell9e55750e-4cbf-4013-9627-e9a045b541bfpowershell
2143discoveryT1046Network Service Discovery12Port Scan using nmap (Port range)0d5a2b03-3a26-45e4-96ae-89485b4d1f97sh
2144discoveryT1518Software Discovery1Find and Display Internet Explorer Browser Version68981660-6670-47ee-a5fa-7e74806420a4command_prompt
2145discoveryT1518Software Discovery2Applications Installedc49978f6-bd6e-4221-ad2c-9e3e30cc1e3bpowershell
2146discoveryT1518Software Discovery3Find and Display Safari Browser Version103d6533-fd2a-4d08-976a-4a598565280fsh
2147discoveryT1518Software Discovery4WinPwn - Dotnetsearch7e79a1b6-519e-433c-ad55-3ff293667101powershell
2148discoveryT1518Software Discovery5WinPwn - DotNet10ba02d0-ab76-4f80-940d-451633f24c5bpowershell
2149discoveryT1518Software Discovery6WinPwn - powerSQL0bb64470-582a-4155-bde2-d6003a95ed34powershell
2150discoveryT1622Debugger Evasion1Detect a Debugger Presence in the Machine58bd8c8d-3a1a-4467-a69c-439c75469b07powershell
2151discoveryT1124System Time Discovery1System Time Discovery20aba24b-e61f-4b26-b4ce-4784f763ca20command_prompt
2152discoveryT1124System Time Discovery2System Time Discovery - PowerShell1d5711d6-655c-4a47-ae9c-6503c74fa877powershell
2153discoveryT1124System Time Discovery3System Time Discovery in FreeBSD/macOSf449c933-0891-407f-821e-7916a21a1a6fsh
2154discoveryT1124System Time Discovery4System Time Discovery W32tm as a Delayd5d5a6b0-0f92-42d8-985d-47aafa2dd4dbcommand_prompt
2155discoveryT1124System Time Discovery5System Time with Windows time Command53ead5db-7098-4111-bb3f-563be390e72ecommand_prompt
2156discoveryT1124System Time Discovery6Discover System Time Zone via Registry25c5d1f1-a24b-494a-a6c5-5f50a1ae7f47command_prompt
2157reconnaissanceT1592.001Gather Victim Host Information: Hardware1Enumerate PlugNPlay Camerad430bf85-b656-40e7-b238-42db01df0183powershell
2158reconnaissanceT1595.003Active Scanning: Wordlist Scanning1Web Server Wordlist Scan89a83c3e-0b39-4c80-99f5-c2aa084098bdpowershell
2159impactT1489Service Stop1Windows - Stop service using Service Controller21dfb440-830d-4c86-a3e5-2a491d5a8d04command_prompt
2160impactT1489Service Stop2Windows - Stop service using net.exe41274289-ec9c-4213-bea4-e43c4aa57954command_prompt
2161impactT1489Service Stop3Windows - Stop service by killing processf3191b84-c38b-400b-867e-3a217a27795fcommand_prompt
2162impactT1489Service Stop4Linux - Stop service using systemctl42e3a5bd-1e45-427f-aa08-2a65fa29a820sh
2163impactT1489Service Stop5Linux - Stop service by killing process using killalle5d95be6-02ee-4ff1-aebe-cf86013b6189sh
2164impactT1489Service Stop6Linux - Stop service by killing process using kill332f4c76-7e96-41a6-8cc2-7361c49db8besh
2165impactT1489Service Stop7Linux - Stop service by killing process using pkill08b4718f-a8bf-4bb5-a552-294fc5178feash
2166impactT1489Service Stop8Abuse of linux magic system request key for Send a SIGTERM to all processes6e76f56f-2373-4a6c-a63f-98b7b72761f1bash
2167impactT1491.001Defacement: Internal Defacement1Replace Desktop Wallpaper30558d53-9d76-41c4-9267-a7bd5184bed3powershell
2168impactT1491.001Defacement: Internal Defacement2Configure LegalNoticeCaption and LegalNoticeText registry keys to display ransom messageffcbfaab-c9ff-470b-928c-f086b326089bpowershell
2169impactT1491.001Defacement: Internal Defacement3ESXi - Change Welcome Message on Direct Console User Interface (DCUI)30905f21-34f3-4504-8b4c-f7a5e314b810command_prompt
2170impactT1491.001Defacement: Internal Defacement4Windows - Display a simulated ransom note via Notepad (non-destructive)0eeb68ce-e64c-4420-8d53-ad5bdc6f86d5powershell
2171impactT1531Account Access Removal1Change User Password - Windows1b99ef28-f83c-4ec5-8a08-1a56263a5bb2command_prompt
2172impactT1531Account Access Removal2Delete User - Windowsf21a1d7d-a62f-442a-8c3a-2440d43b19e5command_prompt
2173impactT1531Account Access Removal3Remove Account From Domain Admin Group43f71395-6c37-498e-ab17-897d814a0947powershell
2174impactT1531Account Access Removal4Change User Password via passwd3c717bf3-2ecc-4d79-8ac8-0bfbf08fbce6sh
2175impactT1531Account Access Removal5Delete User via dscl utility4d938c43-2fe8-4d70-a5b3-5bf239aa7846sh
2176impactT1531Account Access Removal6Delete User via sysadminctl utilityd3812c4e-30ee-466a-a0aa-07e355b561d6sh
2177impactT1531Account Access Removal7Azure AD - Delete user via Azure AD PowerShell4f577511-dc1c-4045-bcb8-75d2457f01f4powershell
2178impactT1531Account Access Removal8Azure AD - Delete user via Azure CLIc955c1c7-3145-4a22-af2d-63eea0d967f0powershell
2179impactT1486Data Encrypted for Impact1Encrypt files using gpg (FreeBSD/Linux)7b8ce084-3922-4618-8d22-95f996173765sh
2180impactT1486Data Encrypted for Impact2Encrypt files using 7z (FreeBSD/Linux)53e6735a-4727-44cc-b35b-237682a151adsh
2181impactT1486Data Encrypted for Impact3Encrypt files using ccrypt (FreeBSD/Linux)08cbf59f-85da-4369-a5f4-049cffd7709fsh
2182impactT1486Data Encrypted for Impact4Encrypt files using openssl (FreeBSD/Linux)142752dc-ca71-443b-9359-cf6f497315f1sh
2183impactT1486Data Encrypted for Impact5PureLocker Ransom Note649349c7-9abf-493b-a7a2-b1aa4d141528command_prompt
2184impactT1486Data Encrypted for Impact6Encrypt files using 7z utility - macOS645f0f5a-ef09-48d8-b9bc-f0e24c642d72sh
2185impactT1486Data Encrypted for Impact7Encrypt files using openssl utility - macOS1a01f6b8-b1e8-418e-bbe3-78a6f822759esh
2186impactT1486Data Encrypted for Impact8Data Encrypted with GPG4Win4541e2c2-33c8-44b1-be79-9161440f1718powershell
2187impactT1486Data Encrypted for Impact9Data Encrypt Using DiskCryptor44b68e11-9da2-4d45-a0d9-893dabd60f30command_prompt
2188impactT1486Data Encrypted for Impact10Akira Ransomware drop Files with .akira Extension and Ransomnoteab3f793f-2dcc-4da5-9c71-34988307263fpowershell
2189impactT1496Resource Hijacking1FreeBSD/macOS/Linux - Simulate CPU Load with Yes904a5a0e-fb02-490d-9f8d-0e256eb37549sh
2190impactT1485Data Destruction1Windows - Overwrite file with SysInternals SDelete476419b5-aebf-4366-a131-ae3e8dae5fc2powershell
2191impactT1485Data Destruction2FreeBSD/macOS/Linux - Overwrite file with DD38deee99-fd65-4031-bec8-bfa4f9f26146sh
2192impactT1485Data Destruction3Overwrite deleted data on C drive321fd25e-0007-417f-adec-33232252be19command_prompt
2193impactT1485Data Destruction4GCP - Delete Bucket4ac71389-40f4-448a-b73f-754346b3f928sh
2194impactT1485Data Destruction5ESXi - Delete VM Snapshots1207ddff-f25b-41b3-aa0e-7c26d2b546d1command_prompt
2195impactT1490Inhibit System Recovery1Windows - Delete Volume Shadow Copies43819286-91a9-4369-90ed-d31fb4da2c01command_prompt
2196impactT1490Inhibit System Recovery2Windows - Delete Volume Shadow Copies via WMI6a3ff8dd-f49c-4272-a658-11c2fe58bd88command_prompt
2197impactT1490Inhibit System Recovery3Windows - wbadmin Delete Windows Backup Catalog263ba6cb-ea2b-41c9-9d4e-b652dadd002ccommand_prompt
2198impactT1490Inhibit System Recovery4Windows - Disable Windows Recovery Console Repaircf21060a-80b3-4238-a595-22525de4ab81command_prompt
2199impactT1490Inhibit System Recovery5Windows - Delete Volume Shadow Copies via WMI with PowerShell39a295ca-7059-4a88-86f6-09556c1211e7powershell
2200impactT1490Inhibit System Recovery6Windows - Delete Backup Files6b1dbaf6-cc8a-4ea6-891f-6058569653bfcommand_prompt
2201impactT1490Inhibit System Recovery7Windows - wbadmin Delete systemstatebackup584331dd-75bc-4c02-9e0b-17f5fd81c748command_prompt
2202impactT1490Inhibit System Recovery8Windows - Disable the SR scheduled task1c68c68d-83a4-4981-974e-8993055fa034command_prompt
2203impactT1490Inhibit System Recovery9Disable System Restore Through Registry66e647d1-8741-4e43-b7c1-334760c2047fcommand_prompt
2204impactT1490Inhibit System Recovery10Windows - vssadmin Resize Shadowstorage Volumeda558b07-69ae-41b9-b9d4-4d98154a7049powershell
2205impactT1490Inhibit System Recovery11Modify VSS Service Permissionsa4420f93-5386-4290-b780-f4f66abc7070command_prompt
2206impactT1490Inhibit System Recovery12Disable Time Machineed952f70-91d4-445a-b7ff-30966bfb1affsh
2207impactT1529System Shutdown/Reboot1Shutdown System - Windowsad254fa8-45c0-403b-8c77-e00b3d3e7a64command_prompt
2208impactT1529System Shutdown/Reboot2Restart System - Windowsf4648f0d-bf78-483c-bafc-3ec99cd1c302command_prompt
2209impactT1529System Shutdown/Reboot3Restart System via `shutdown` - FreeBSD/macOS/Linux6326dbc4-444b-4c04-88f4-27e94d0327cbsh
2210impactT1529System Shutdown/Reboot4Shutdown System via `shutdown` - FreeBSD/macOS/Linux4963a81e-a3ad-4f02-adda-812343b351desh
2211impactT1529System Shutdown/Reboot5Restart System via `reboot` - FreeBSD/macOS/Linux47d0b042-a918-40ab-8cf9-150ffe919027sh
2212impactT1529System Shutdown/Reboot6Shutdown System via `halt` - FreeBSD/Linux918f70ab-e1ef-49ff-bc57-b27021df84ddsh
2213impactT1529System Shutdown/Reboot7Reboot System via `halt` - FreeBSD7b1cee42-320f-4890-b056-d65c8b884ba5sh
2214impactT1529System Shutdown/Reboot8Reboot System via `halt` - Linux78f92e14-f1e9-4446-b3e9-f1b921f2459ebash
2215impactT1529System Shutdown/Reboot9Shutdown System via `poweroff` - FreeBSD/Linux73a90cd2-48a2-4ac5-8594-2af35fa909fash
2216impactT1529System Shutdown/Reboot10Reboot System via `poweroff` - FreeBSD5a282e50-86ff-438d-8cef-8ae01c9e62e1sh
2217impactT1529System Shutdown/Reboot11Reboot System via `poweroff` - Linux61303105-ff60-427b-999e-efb90b314e41bash
2218impactT1529System Shutdown/Reboot12Logoff System - Windows3d8c25b5-7ff5-4c9d-b21f-85ebd06654a4command_prompt
2219impactT1529System Shutdown/Reboot13ESXi - Terminates VMs using pkill987c9b4d-a637-42db-b1cb-e9e242c3991bcommand_prompt
2220impactT1529System Shutdown/Reboot14ESXi - Avoslocker enumerates VMs and forcefully kills VMs189f7d6e-9442-4160-9bc3-5e4104d93ececommand_prompt
2221impactT1529System Shutdown/Reboot15ESXi - vim-cmd Used to Power Off VMs622cc1a0-45e7-428c-aed7-c96dd605fbe6command_prompt
2222impactT1529System Shutdown/Reboot16Abuse of Linux Magic System Request Key for Rebootd2a1f4bc-a064-4223-8281-a086dce5423cbash
2223initial-accessT1133External Remote Services1Running Chrome VPN Extensions via the Registry 2 vpn extension4c8db261-a58b-42a6-a866-0a294deedde4powershell
2224initial-accessT1566.002Phishing: Spearphishing Link1Paste and run techniquebc177ef9-6a12-4ebc-a2ec-d41e19c2791dpowershell
2225initial-accessT1566.001Phishing: Spearphishing Attachment1Download Macro-Enabled Phishing Attachment114ccff9-ae6d-4547-9ead-4cd69f687306powershell
2226initial-accessT1566.001Phishing: Spearphishing Attachment2Word spawned a command shell and used an IP address in the command linecbb6799a-425c-4f83-9194-5447a909d67fpowershell
2227initial-accessT1091Replication Through Removable Media1USB Malware Spread Simulationd44b7297-622c-4be8-ad88-ec40d7563c75powershell
2228initial-accessT1195Supply Chain Compromise1Octopus Scanner Malware Open Source Supply Chain82a9f001-94c5-495e-9ed5-f530dbded5e2command_prompt
2229initial-accessT1078.001Valid Accounts: Default Accounts1Enable Guest account with RDP capability and admin privileges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
2230initial-accessT1078.001Valid Accounts: Default Accounts2Activate Guest Accountaa6cb8c4-b582-4f8e-b677-37733914abdacommand_prompt
2231initial-accessT1078.001Valid Accounts: Default Accounts3Enable Guest Account on macOS0315bdff-4178-47e9-81e4-f31a6d23f7e4sh
2232initial-accessT1195.002Compromise Software Supply Chain1Simulate npm package installation on a Linux systema9604672-cd46-493b-b58f-fd4124c22dd3bash
2233initial-accessT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
2234initial-accessT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
2235initial-accessT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
2236initial-accessT1078.003Valid Accounts: Local Accounts1Create local account with admin privilegesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
2237initial-accessT1078.003Valid Accounts: Local Accounts2Create local account with admin privileges - MacOSf1275566-1c26-4b66-83e3-7f9f7f964daabash
2238initial-accessT1078.003Valid Accounts: Local Accounts3Create local account with admin privileges using sysadminctl utility - MacOS191db57d-091a-47d5-99f3-97fde53de505bash
2239initial-accessT1078.003Valid Accounts: Local Accounts4Enable root account using dsenableroot utility - MacOS20b40ea9-0e17-4155-b8e6-244911a678acbash
2240initial-accessT1078.003Valid Accounts: Local Accounts5Add a new/existing user to the admin group using dseditgroup utility - macOS433842ba-e796-4fd5-a14f-95d3a1970875bash
2241initial-accessT1078.003Valid Accounts: Local Accounts6WinPwn - Loot local Credentials - powerhell kittie9e9fd066-453d-442f-88c1-ad7911d32912powershell
2242initial-accessT1078.003Valid Accounts: Local Accounts7WinPwn - Loot local Credentials - Safetykatze9fdb899-a980-4ba4-934b-486ad22e22f4powershell
2243initial-accessT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
2244initial-accessT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
2245initial-accessT1078.003Valid Accounts: Local Accounts10Reactivate a locked/expired account (FreeBSD)09e3380a-fae5-4255-8b19-9950be0252cfsh
2246initial-accessT1078.003Valid Accounts: Local Accounts11Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
2247initial-accessT1078.003Valid Accounts: Local Accounts12Login as nobody (freebsd)16f6374f-7600-459a-9b16-6a88fd96d310sh
2248initial-accessT1078.003Valid Accounts: Local Accounts13Use PsExec to elevate to NT Authority\SYSTEM account6904235f-0f55-4039-8aed-41c300ff7733command_prompt
2249exfiltrationT1020Automated Exfiltration1IcedID Botnet HTTP PUT9c780d3d-3a14-4278-8ee5-faaeb2ccfbe0powershell
2250exfiltrationT1020Automated Exfiltration2Exfiltration via Encrypted FTP5b380e96-b0ef-4072-8a8e-f194cb9eb9acpowershell
2251exfiltrationT1048.002Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol1Exfiltrate data HTTPS using curl windows1cdf2fb0-51b6-4fd8-96af-77020d5f1bf0command_prompt
2252exfiltrationT1048.002Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol2Exfiltrate data HTTPS using curl freebsd,linux or macos4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01bash
2253exfiltrationT1048.002Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol3Exfiltrate data in a file over HTTPS using wget7ccdfcfa-6707-46bc-b812-007ab6ff951csh
2254exfiltrationT1048.002Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol4Exfiltrate data as text over HTTPS using wget8bec51da-7a6d-4346-b941-51eca448c4b0sh
2255exfiltrationT1041Exfiltration Over C2 Channel1C2 Data Exfiltrationd1253f6e-c29b-49dc-b466-2147a6191932powershell
2256exfiltrationT1041Exfiltration Over C2 Channel2Text Based Data Exfiltration using DNS subdomainsc9207f3e-213d-4cc7-ad2a-7697a7237df9powershell
2257exfiltrationT1048Exfiltration Over Alternative Protocol1Exfiltration Over Alternative Protocol - SSHf6786cc8-beda-4915-a4d6-ac2f193bb988sh
2258exfiltrationT1048Exfiltration Over Alternative Protocol2Exfiltration Over Alternative Protocol - SSH7c3cb337-35ae-4d06-bf03-3032ed2ec268sh
2259exfiltrationT1048Exfiltration Over Alternative Protocol3DNSExfiltration (doh)c943d285-ada3-45ca-b3aa-7cd6500c6a48powershell
2260exfiltrationT1048Exfiltration Over Alternative Protocol4Exfiltrate Data using DNS Queries via diga27916da-05f2-4316-a3ee-feec67a437bebash
2261exfiltrationT1567.003Exfiltration Over Web Service: Exfiltration to Text Storage Sites1Exfiltrate data with HTTP POST to text storage sites - pastebin.com (Windows)c2e8ab6e-431e-460a-a2aa-3bc6a32022e3powershell
2262exfiltrationT1567.002Exfiltration Over Web Service: Exfiltration to Cloud Storage1Exfiltrate data with rclone to cloud Storage - Mega (Windows)8529ee44-279a-4a19-80bf-b846a40dda58powershell
2263exfiltrationT1567.002Exfiltration Over Web Service: Exfiltration to Cloud Storage2Exfiltrate data with rclone to cloud Storage - AWS S3a4b74723-5cee-4300-91c3-5e34166909b4powershell
2264exfiltrationT1030Data Transfer Size Limits1Data Transfer Size Limitsab936c51-10f4-46ce-9144-e02137b2016ash
2265exfiltrationT1030Data Transfer Size Limits2Network-Based Data Transfer in Small Chunksf0287b58-f4bc-40f6-87eb-692e126e7f8fpowershell
2266exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol1Exfiltration Over Alternative Protocol - HTTP1d1abbd6-a3d3-4b2e-bef5-c59293f46effmanual
2267exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol2Exfiltration Over Alternative Protocol - ICMPdd4b4421-2e25-4593-90ae-7021947ad12epowershell
2268exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol3Exfiltration Over Alternative Protocol - DNSc403b5a4-b5fc-49f2-b181-d1c80d27db45manual
2269exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol4Exfiltration Over Alternative Protocol - HTTP6aa58451-1121-4490-a8e9-1dada3f1c68cpowershell
2270exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol5Exfiltration Over Alternative Protocol - SMTPec3a835e-adca-4c7c-88d2-853b69c11bb9powershell
2271exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol6MAZE FTP Upload57799bc2-ad1e-4130-a793-fb0c385130bapowershell
2272exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol7Exfiltration Over Alternative Protocol - FTP - Rcloneb854eb97-bf9b-45ab-a1b5-b94e4880c56bpowershell
2273exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol8Python3 http.server3ea1f938-f80a-4305-9aa8-431bc4867313sh