Files
2025-11-05 01:55:34 +00:00

8.1 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2defense-evasionT1562.001Impair Defenses: Disable or Modify Tools46AWS - GuardDuty Suspension or Deletion11e65d8d-e7e4-470e-a3ff-82bc56ad938ebash
3defense-evasionT1562.008Impair Defenses: Disable Cloud Logs1AWS - CloudTrail Changes9c10dc6b-20bd-403a-8e67-50ef7d07ed4esh
4defense-evasionT1562.008Impair Defenses: Disable Cloud Logs2Azure - Eventhub Deletion5e09bed0-7d33-453b-9bf3-caea32bff719powershell
5defense-evasionT1562.008Impair Defenses: Disable Cloud Logs4AWS - Disable CloudTrail Logging Through Event Selectors using Stratusa27418de-bdce-4ebd-b655-38f11142bf0csh
6defense-evasionT1562.008Impair Defenses: Disable Cloud Logs5AWS - CloudTrail Logs Impairment Through S3 Lifecycle Rule using Stratus22d89a2f-d475-4895-b2d4-68626d49c029sh
7defense-evasionT1562.008Impair Defenses: Disable Cloud Logs6AWS - Remove VPC Flow Logs using Stratus93c150f5-ad7b-4ee3-8992-df06dec2ac79sh
8defense-evasionT1562.008Impair Defenses: Disable Cloud Logs7AWS - CloudWatch Log Group Deletes89422c87-b57b-4a04-a8ca-802bb9d06121sh
9defense-evasionT1562.008Impair Defenses: Disable Cloud Logs8AWS CloudWatch Log Stream Deletes33ca84bc-4259-4943-bd36-4655dc420932sh
10defense-evasionT1562.008Impair Defenses: Disable Cloud Logs10GCP - Delete Activity Event Logd56152ec-01d9-42a2-877c-aac1f6ebe8e6sh
11defense-evasionT1578.001Modify Cloud Compute Infrastructure: Create Snapshot1AWS - Create Snapshot from EBS Volumea3c09662-85bb-4ea8-b15b-6dc8a844e236sh
12defense-evasionT1578.001Modify Cloud Compute Infrastructure: Create Snapshot2Azure - Create Snapshot from Managed Disk89e69b4b-3458-4ec6-b819-b3008debc1bcsh
13defense-evasionT1578.001Modify Cloud Compute Infrastructure: Create Snapshot3GCP - Create Snapshot from Persistent Diske6fbc036-91e7-4ad3-b9cb-f7210f40dd5dsh
14defense-evasionT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
15defense-evasionT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
16defense-evasionT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
17credential-accessT1552.005Unsecured Credentials: Cloud Instance Metadata API2Azure - Dump Azure Instance Metadata from Virtual Machinescc99e772-4e18-4f1f-b422-c5cdd1bfd7b7powershell
18credential-accessT1552Unsecured Credentials1AWS - Retrieve EC2 Password Data using stratusa21118de-b11e-4ebd-b655-42f11142df0csh
19credential-accessT1110.003Brute Force: Password Spraying9AWS - Password Spray an AWS using GoAWSConsoleSpray9c10d16b-20b1-403a-8e67-50ef7117ed4esh
20credential-accessT1528Steal Application Access Token1Azure - Functions code upload - Functions code injection via Blob upload9a5352e4-56e5-45c2-9b3f-41a46d3b3a43powershell
21credential-accessT1528Steal Application Access Token2Azure - Functions code upload - Functions code injection via File Share modification to retrieve the Functions identity access token67aaf4cb-54ce-42e2-ab56-e0a9bcc089b1powershell
22credential-accessT1555.006Credentials from Password Stores: Cloud Secrets Management Stores1Azure - Dump All Azure Key Vaults with Microburst1b83cddb-eaa7-45aa-98a5-85fb0a8807eapowershell
23impactT1485Data Destruction4GCP - Delete Bucket4ac71389-40f4-448a-b73f-754346b3f928sh
24discoveryT1580Cloud Infrastructure Discovery1AWS - EC2 Enumeration from Cloud Instance99ee161b-dcb1-4276-8ecb-7cfdcb207820sh
25discoveryT1580Cloud Infrastructure Discovery2AWS - EC2 Security Group Enumeration99b38f24-5acc-4aa3-85e5-b7f97a5d37accommand_prompt
26discoveryT1619Cloud Storage Object Discovery1AWS S3 Enumeration3c7094f8-71ec-4917-aeb8-a633d7ec4ef5sh
27discoveryT1619Cloud Storage Object Discovery2Azure - Enumerate Storage Account Objects via Shared Key authorization using Azure CLI070322a4-2c60-4c50-8ffb-c450a34fe7bfpowershell
28discoveryT1619Cloud Storage Object Discovery3Azure - Scan for Anonymous Access to Azure Storage (Powershell)146af1f1-b74e-4aa7-9895-505eb559b4b0powershell
29discoveryT1619Cloud Storage Object Discovery4Azure - Enumerate Azure Blobs with MicroBurst3dab4bcc-667f-4459-aea7-4162dd2d6590powershell
30discoveryT1201Password Policy Discovery12Examine AWS Password Policy15330820-d405-450b-bd08-16b5be5be9f4sh
31discoveryT1526Cloud Service Discovery1Azure - Dump Subscription Data with MicroBurst1e40bb1d-195e-401e-a86b-c192f55e005cpowershell
32discoveryT1526Cloud Service Discovery2AWS - Enumerate common cloud servicesaa8b9bcc-46fa-4a59-9237-73c7b93a980cpowershell
33discoveryT1526Cloud Service Discovery3Azure - Enumerate common cloud services58f57c8f-db14-4e62-a4d3-5aaf556755d7powershell
34collectionT1530Data from Cloud Storage Object1AWS - Scan for Anonymous Access to S3979356b9-b588-4e49-bba4-c35517c484f5sh
35collectionT1530Data from Cloud Storage Object2Azure - Dump Azure Storage Account Objects via Azure CLI67374845-b4c8-4204-adcc-9b217b65d4f1powershell
36persistenceT1098.001Account Manipulation: Additional Cloud Credentials3AWS - Create Access Key and Secret Key8822c3b0-d9f9-4daf-a043-491160a31122sh
37persistenceT1136.003Create Account: Cloud Account1AWS - Create a new IAM user8d1c2368-b503-40c9-9057-8e42f21c58adsh
38persistenceT1098Account Manipulation3AWS - Create a group and add a user to that group8822c3b0-d9f9-4daf-a043-49f110a31122sh
39persistenceT1098Account Manipulation6Azure - adding user to Azure role in subscription1a94b3fc-b080-450a-b3d8-6d9b57b472eapowershell
40persistenceT1098Account Manipulation7Azure - adding service principal to Azure role in subscriptionc8f4bc29-a151-48da-b3be-4680af56f404powershell
41persistenceT1098Account Manipulation17GCP - Delete Service Account Key7ece1dea-49f1-4d62-bdcc-5801e3292510sh
42persistenceT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
43persistenceT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
44persistenceT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
45privilege-escalationT1098.001Account Manipulation: Additional Cloud Credentials3AWS - Create Access Key and Secret Key8822c3b0-d9f9-4daf-a043-491160a31122sh
46privilege-escalationT1098Account Manipulation3AWS - Create a group and add a user to that group8822c3b0-d9f9-4daf-a043-49f110a31122sh
47privilege-escalationT1098Account Manipulation6Azure - adding user to Azure role in subscription1a94b3fc-b080-450a-b3d8-6d9b57b472eapowershell
48privilege-escalationT1098Account Manipulation7Azure - adding service principal to Azure role in subscriptionc8f4bc29-a151-48da-b3be-4680af56f404powershell
49privilege-escalationT1098Account Manipulation17GCP - Delete Service Account Key7ece1dea-49f1-4d62-bdcc-5801e3292510sh
50privilege-escalationT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
51privilege-escalationT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
52privilege-escalationT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
53initial-accessT1078.004Valid Accounts: Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8esh
54initial-accessT1078.004Valid Accounts: Cloud Accounts2Azure Persistence Automation Runbook Created or Modified348f4d14-4bd3-4f6b-bd8a-61237f78b3acpowershell
55initial-accessT1078.004Valid Accounts: Cloud Accounts3GCP - Create Custom IAM Role3a159042-69e6-4398-9a69-3308a4841c85sh
56executionT1651Cloud Administration Command1AWS Run Command (and Control)a3cc9c95-c160-4b86-af6f-84fba87bfd30powershell
57executionT1648Serverless Execution1Lambda Function Hijack87a4a141-c2bb-49d1-a604-8679082d8b91powershell