Files
atomic-red-team/atomics/Indexes/Indexes-CSV/windows-index.csv
T
2020-12-21 16:40:14 +00:00

74 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2credential-accessT1056.004Credential API Hooking1Hook PowerShell TLS Encrypt/Decrypt Messagesde1934ea-1fbf-425b-8795-65fb27dd7e33powershell
3credential-accessT1552.001Credentials In Files3Extracting passwords with findstr0e56bf29-ff49-4ea5-9af4-3b81283fd513powershell
4credential-accessT1552.001Credentials In Files4Access unattend.xml367d4004-5fc0-446d-823f-960c74ae52c3command_prompt
5credential-accessT1555Credentials from Password Stores1Extract Windows Credential Manager via VBA234f9b7c-b53d-4f32-897b-b880a6c9ea7bpowershell
6credential-accessT1555.003Credentials from Web Browsers1Run Chrome-password Collector8c05b133-d438-47ca-a630-19cc464c4622powershell
7credential-accessT1555.003Credentials from Web Browsers3LaZagne - Credentials from Browser9a2915b3-3954-4cce-8c76-00fbf4dbd014command_prompt
8credential-accessT1552.002Credentials in Registry1Enumeration for Credentials in Registryb6ec082c-7384-46b3-a111-9a9b8b14e5e7command_prompt
9credential-accessT1552.002Credentials in Registry2Enumeration for PuTTY Credentials in Registryaf197fd7-e868-448e-9bd5-05d1bcd9d9e5command_prompt
10credential-accessT1056.002GUI Input Capture2PowerShell - Prompt User for Password2b162bfd-0928-4d4c-9ec3-4d9f88374b52powershell
11credential-accessT1552.006Group Policy Preferences1GPP Passwords (findstr)870fe8fb-5e23-4f5f-b89d-dd7fe26f3b5fcommand_prompt
12credential-accessT1552.006Group Policy Preferences2GPP Passwords (Get-GPPPassword)e9584f82-322c-474a-b831-940fd8b4455cpowershell
13credential-accessT1558.003Kerberoasting1Request for service tickets3f987809-3681-43c8-bcd8-b3ff3a28533apowershell
14credential-accessT1056.001Keylogging1Input Captured9b633ca-8efb-45e6-b838-70f595c6ae26powershell
15credential-accessT1003.004LSA Secrets1Dumping LSA Secrets55295ab0-a703-433b-9ca4-ae13807de12fcommand_prompt
16credential-accessT1003.001LSASS Memory1Windows Credential Editor0f7c5301-6859-45ba-8b4d-1fac30fc31edcommand_prompt
17credential-accessT1003.001LSASS Memory2Dump LSASS.exe Memory using ProcDump0be2230c-9ab3-4ac2-8826-3199b9a0ebf8command_prompt
18credential-accessT1003.001LSASS Memory3Dump LSASS.exe Memory using comsvcs.dll2536dee2-12fb-459a-8c37-971844fa73bepowershell
19credential-accessT1003.001LSASS Memory4Dump LSASS.exe Memory using direct system calls and API unhooking7ae7102c-a099-45c8-b985-4c7a2d05790dcommand_prompt
20credential-accessT1003.001LSASS Memory5Dump LSASS.exe Memory using Windows Task Managerdea6c349-f1c6-44f3-87a1-1ed33a59a607manual
21credential-accessT1003.001LSASS Memory6Offline Credential Theft With Mimikatz453acf13-1dbd-47d7-b28a-172ce9228023command_prompt
22credential-accessT1003.001LSASS Memory7LSASS read with pypykatzc37bc535-5c62-4195-9cc3-0517673171d8command_prompt
23credential-accessT1003.003NTDS1Create Volume Shadow Copy with vssadmindcebead7-6c28-4b4b-bf3c-79deb1b1fc7fcommand_prompt
24credential-accessT1003.003NTDS2Copy NTDS.dit from Volume Shadow Copyc6237146-9ea6-4711-85c9-c56d263a6b03command_prompt
25credential-accessT1003.003NTDS3Dump Active Directory Database with NTDSUtil2364e33d-ceab-4641-8468-bfb1d7cc2723command_prompt
26credential-accessT1003.003NTDS4Create Volume Shadow Copy with WMI224f7de0-8f0a-4a94-b5d8-989b036c86dacommand_prompt
27credential-accessT1003.003NTDS5Create Volume Shadow Copy with Powershell542bb97e-da53-436b-8e43-e0a7d31a6c24powershell
28credential-accessT1003.003NTDS6Create Symlink to Volume Shadow Copy21748c28-2793-4284-9e07-d6d028b66702command_prompt
29credential-accessT1040Network Sniffing3Packet Capture Windows Command Prompta5b2f6a0-24b4-493e-9590-c699f75723cacommand_prompt
30credential-accessT1040Network Sniffing4Windows Internal Packet Captureb5656f67-d67f-4de8-8e62-b5581630f528command_prompt
31credential-accessT1003OS Credential Dumping1Powershell Mimikatz66fb0bc1-3c3f-47e9-a298-550ecfefacbcpowershell
32credential-accessT1003OS Credential Dumping2Gsecdump96345bfc-8ae7-4b6a-80b7-223200f24ef9command_prompt
33credential-accessT1003OS Credential Dumping3Credential Dumping with NPPSpy9e2173c0-ba26-4cdf-b0ed-8c54b27e3ad6powershell
34credential-accessT1110.002Password Cracking1Password Cracking with Hashcat6d27df5d-69d4-4c91-bc33-5983ffe91692command_prompt
35credential-accessT1556.002Password Filter DLL1Install and Register Password Filter DLLa7961770-beb5-4134-9674-83d7e1fa865cpowershell
36credential-accessT1110.001Password Guessing1Brute Force Credentials09480053-2f98-4854-be6e-71ae5f672224command_prompt
37credential-accessT1110.003Password Spraying1Password Spray all Domain Users90bc2e54-6c84-47a5-9439-0a2a92b4b175command_prompt
38credential-accessT1110.003Password Spraying2Password Spray (DomainPasswordSpray)263ae743-515f-4786-ac7d-41ef3a0d4b2bpowershell
39credential-accessT1552.004Private Keys1Private Keys520ce462-7ca7-441e-b5a5-f8347f632696command_prompt
40credential-accessT1003.002Security Account Manager1Registry dump of SAM, creds, and secrets5c2571d0-1572-416d-9676-812e64ca9f44command_prompt
41credential-accessT1003.002Security Account Manager2Registry parse with pypykatza96872b2-cbf3-46cf-8eb4-27e8c0e85263command_prompt
42credential-accessT1003.002Security Account Manager3esentutl.exe SAM copya90c2f4d-6726-444e-99d2-a00cd7c20480command_prompt
43credential-accessT1003.002Security Account Manager4PowerDump Registry dump of SAM for hashes and usernames804f28fc-68fc-40da-b5a2-e9d0bce5c193powershell
44collectionT1560Archive Collected Data1Compress Data for Exfiltration With PowerShell41410c60-614d-4b9d-b66e-b0192dd9c597powershell
45collectionT1560.001Archive via Utility1Compress Data for Exfiltration With Rar02ea31cb-3b4c-4a2d-9bf1-e4e70ebcf5d0command_prompt
46collectionT1560.001Archive via Utility2Compress Data and lock with password for Exfiltration with winrar8dd61a55-44c6-43cc-af0c-8bdda276860ccommand_prompt
47collectionT1560.001Archive via Utility3Compress Data and lock with password for Exfiltration with winzip01df0353-d531-408d-a0c5-3161bf822134command_prompt
48collectionT1560.001Archive via Utility4Compress Data and lock with password for Exfiltration with 7zipd1334303-59cb-4a03-8313-b3e24d02c198command_prompt
49collectionT1123Audio Capture1using device audio capture commandlet9c3ad250-b185-4444-b5a9-d69218a10c95powershell
50collectionT1119Automated Collection1Automated Collection Command Promptcb379146-53f1-43e0-b884-7ce2c635ff5bcommand_prompt
51collectionT1119Automated Collection2Automated Collection PowerShell634bd9b9-dc83-4229-b19f-7f83ba9ad313powershell
52collectionT1119Automated Collection3Recon information for export with PowerShellc3f6d794-50dd-482f-b640-0384fbb7db26powershell
53collectionT1119Automated Collection4Recon information for export with Command Promptaa1180e2-f329-4e1e-8625-2472ec0bfaf3command_prompt
54collectionT1115Clipboard Data1Utilize Clipboard to store or execute commands from0cd14633-58d4-4422-9ede-daa2c9474ae7command_prompt
55collectionT1115Clipboard Data2Execute Commands from Clipboard using PowerShelld6dc21af-bec9-4152-be86-326b6babd416powershell
56collectionT1115Clipboard Data4Collect Clipboard Data via VBA9c8d5a72-9c98-48d3-b9bf-da2cc43bdf52powershell
57collectionT1056.004Credential API Hooking1Hook PowerShell TLS Encrypt/Decrypt Messagesde1934ea-1fbf-425b-8795-65fb27dd7e33powershell
58collectionT1056.002GUI Input Capture2PowerShell - Prompt User for Password2b162bfd-0928-4d4c-9ec3-4d9f88374b52powershell
59collectionT1056.001Keylogging1Input Captured9b633ca-8efb-45e6-b838-70f595c6ae26powershell
60collectionT1074.001Local Data Staging1Stage data from Discovery.bat107706a5-6f9f-451a-adae-bab8c667829fpowershell
61collectionT1074.001Local Data Staging3Zip a Folder with PowerShell for Staging in Tempa57fbe4b-3440-452a-88a7-943531ac872apowershell
62collectionT1114.001Local Email Collection1Email Collection with PowerShell Get-Inbox3f1b5096-0139-4736-9b78-19bcb02bb1cbpowershell
63collectionT1113Screen Capture5Windows Screencapture3c898f62-626c-47d5-aad2-6de873d69153powershell
64privilege-escalationT1546.008Accessibility Features1Attaches Command Prompt as a Debugger to a List of Target Processes3309f53e-b22b-4eb6-8fd2-a6cf58b355a9powershell
65privilege-escalationT1546.008Accessibility Features2Replace binary of sticky keys934e90cf-29ca-48b3-863c-411737ad44e3command_prompt
66privilege-escalationT1546.010AppInit DLLs1Install AppInit Shima58d9386-3080-4242-ab5f-454c16503d18command_prompt
67privilege-escalationT1546.011Application Shimming1Application Shim Installation9ab27e22-ee62-4211-962b-d36d9a0e6a18command_prompt
68privilege-escalationT1546.011Application Shimming2New shim database files created in the default shim database directoryaefd6866-d753-431f-a7a4-215ca7e3f13dpowershell
69privilege-escalationT1546.011Application Shimming3Registry key creation and/or modification events for SDB9b6a06f9-ab5e-4e8d-8289-1df4289db02fpowershell
70privilege-escalationT1055.004Asynchronous Procedure Call1Process Injection via C#611b39b7-e243-4c81-87a4-7145a90358b1command_prompt
71privilege-escalationT1053.002At (Windows)1At.exe Scheduled task4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8command_prompt
72privilege-escalationT1548.002Bypass User Account Control1Bypass UAC using Event Viewer (cmd)5073adf8-9a50-4bd9-b298-a9bd2ead8af9command_prompt
73privilege-escalationT1548.002Bypass User Account Control2Bypass UAC using Event Viewer (PowerShell)a6ce9acf-842a-4af6-8f79-539be7608e2bpowershell
74privilege-escalationT1548.002Bypass User Account Control3Bypass UAC using Fodhelper58f641ea-12e3-499a-b684-44dee46bd182command_prompt
75privilege-escalationT1548.002Bypass User Account Control4Bypass UAC using Fodhelper - PowerShell3f627297-6c38-4e7d-a278-fc2563eaaeaapowershell
76privilege-escalationT1548.002Bypass User Account Control5Bypass UAC using ComputerDefaults (PowerShell)3c51abf2-44bf-42d8-9111-dc96ff66750fpowershell
77privilege-escalationT1548.002Bypass User Account Control6Bypass UAC by Mocking Trusted Directoriesf7a35090-6f7f-4f64-bb47-d657bf5b10c1command_prompt
78privilege-escalationT1548.002Bypass User Account Control7Bypass UAC using sdclt DelegateExecute3be891eb-4608-4173-87e8-78b494c029b7powershell
79privilege-escalationT1548.002Bypass User Account Control8Disable UAC using reg.exe9e8af564-53ec-407e-aaa8-3cb20c3af7f9command_prompt
80privilege-escalationT1574.012COR_PROFILER1User scope COR_PROFILER9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5apowershell
81privilege-escalationT1574.012COR_PROFILER2System Scope COR_PROFILERf373b482-48c8-4ce4-85ed-d40c8b3f7310powershell
82privilege-escalationT1574.012COR_PROFILER3Registry-free process scope COR_PROFILER79d57242-bbef-41db-b301-9d01d9f6e817powershell
83privilege-escalationT1546.001Change Default File Association1Change Default File Association10a08978-2045-4d62-8c42-1957bbbea102command_prompt
84privilege-escalationT1574.001DLL Search Order Hijacking1DLL Search Order Hijacking - amsi.dll8549ad4b-b5df-4a2d-a3d7-2aee9e7052a3command_prompt
85privilege-escalationT1574.002DLL Side-Loading1DLL Side-Loading using the Notepad++ GUP.exe binary65526037-7079-44a9-bda1-2cb624838040command_prompt
86privilege-escalationT1078.001Default Accounts1Enable Guest account with RDP capability and admin priviliges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
87privilege-escalationT1546.012Image File Execution Options Injection1IFEO Add Debuggerfdda2626-5234-4c90-b163-60849a24c0b8command_prompt
88privilege-escalationT1546.012Image File Execution Options Injection2IFEO Global Flags46b1f278-c8ee-4aa5-acce-65e77b11f3c1command_prompt
89privilege-escalationT1078.003Local Accounts1Create local account with admin priviligesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
90privilege-escalationT1037.001Logon Script (Windows)1Logon Scriptsd6042746-07d4-4c92-9ad8-e644c114a231command_prompt
91privilege-escalationT1546.007Netsh Helper DLL1Netsh Helper DLL Registration3244697d-5a3a-4dfc-941c-550f69f91a4dcommand_prompt
92privilege-escalationT1134.004Parent PID Spoofing1Parent PID Spoofing using PowerShell069258f4-2162-46e9-9a25-c9c6c56150d2powershell
93privilege-escalationT1134.004Parent PID Spoofing2Parent PID Spoofing - Spawn from Current Process14920ebd-1d61-491a-85e0-fe98efe37f25powershell
94privilege-escalationT1134.004Parent PID Spoofing3Parent PID Spoofing - Spawn from Specified Processcbbff285-9051-444a-9d17-c07cd2d230ebpowershell
95privilege-escalationT1134.004Parent PID Spoofing4Parent PID Spoofing - Spawn from svchost.exee9f2b777-3123-430b-805d-5cedc66ab591powershell
96privilege-escalationT1134.004Parent PID Spoofing5Parent PID Spoofing - Spawn from New Process2988133e-561c-4e42-a15f-6281e6a9b2dbpowershell
97privilege-escalationT1574.009Path Interception by Unquoted Path1Execution of program.exe as service with unquoted service path2770dea7-c50f-457b-84c4-c40a47460d9fcommand_prompt
98privilege-escalationT1546.013PowerShell Profile1Append malicious start-process cmdlet090e5aa5-32b6-473b-a49b-21e843a56896powershell
99privilege-escalationT1055.012Process Hollowing1Process Hollowing using PowerShell562427b4-39ef-4e8c-af88-463a78e70b9cpowershell
100privilege-escalationT1055.012Process Hollowing2RunPE via VBA3ad4a037-1598-4136-837c-4027e4fa319bpowershell
101privilege-escalationT1055Process Injection1Process Injection via mavinject.exe74496461-11a1-4982-b439-4d87a550d254powershell
102privilege-escalationT1055Process Injection2Shellcode execution via VBA1c91e740-1729-4329-b779-feba6e71d048powershell
103privilege-escalationT1547.001Registry Run Keys / Startup Folder1Reg Key Rune55be3fd-3521-4610-9d1a-e210e42dcf05command_prompt
104privilege-escalationT1547.001Registry Run Keys / Startup Folder2Reg Key RunOnce554cbd88-cde1-4b56-8168-0be552eed9ebcommand_prompt
105privilege-escalationT1547.001Registry Run Keys / Startup Folder3PowerShell Registry RunOnceeb44f842-0457-4ddc-9b92-c4caa144ac42powershell
106privilege-escalationT1547.001Registry Run Keys / Startup Folder4Suspicious vbs file run from startup Folder2cb98256-625e-4da9-9d44-f2e5f90b8bd5powershell
107privilege-escalationT1547.001Registry Run Keys / Startup Folder5Suspicious jse file run from startup Folderdade9447-791e-4c8f-b04b-3a35855dfa06powershell
108privilege-escalationT1547.001Registry Run Keys / Startup Folder6Suspicious bat file run from startup Folder5b6768e4-44d2-44f0-89da-a01d1430fd5epowershell
109privilege-escalationT1547.001Registry Run Keys / Startup Folder7Add Executable Shortcut Link to User Startup Folder24e55612-85f6-4bd6-ae74-a73d02e3441dpowershell
110privilege-escalationT1053.005Scheduled Task1Scheduled Task Startup Scriptfec27f65-db86-4c2d-b66c-61945aee87c2command_prompt
111privilege-escalationT1053.005Scheduled Task2Scheduled task Local42f53695-ad4a-4546-abb6-7d837f644a71command_prompt
112privilege-escalationT1053.005Scheduled Task3Scheduled task Remote2e5eac3e-327b-4a88-a0c0-c4057039a8ddcommand_prompt
113privilege-escalationT1053.005Scheduled Task4Powershell Cmdlet Scheduled Taskaf9fd58f-c4ac-4bf2-a9ba-224b71ff25fdpowershell
114privilege-escalationT1053.005Scheduled Task5Task Scheduler via VBAecd3fa21-7792-41a2-8726-2c5c673414d3powershell
115privilege-escalationT1546.002Screensaver1Set Arbitrary Binary as Screensaver281201e7-de41-4dc9-b73d-f288938cbb64command_prompt
116privilege-escalationT1547.005Security Support Provider1Modify SSP configuration in registryafdfd7e3-8a0b-409f-85f7-886fdf249c9epowershell
117privilege-escalationT1574.011Services Registry Permissions Weakness1Service Registry Permissions Weaknessf7536d63-7fd4-466f-89da-7e48d550752apowershell
118privilege-escalationT1574.011Services Registry Permissions Weakness2Service ImagePath Change with reg.exef38e9eea-e1d7-4ba6-b716-584791963827command_prompt
119privilege-escalationT1547.009Shortcut Modification1Shortcut Modificationce4fc678-364f-4282-af16-2fb4c78005cecommand_prompt
120privilege-escalationT1547.009Shortcut Modification2Create shortcut to cmd in startup folderscfdc954d-4bb0-4027-875b-a1893ce406f2powershell
121privilege-escalationT1134.001Token Impersonation/Theft1Named pipe client impersonation90db9e27-8e7c-4c04-b602-a45927884966powershell
122privilege-escalationT1134.001Token Impersonation/Theft2`SeDebugPrivilege` token duplication34f0a430-9d04-4d98-bcb5-1989f14719f0powershell
123privilege-escalationT1546.003Windows Management Instrumentation Event Subscription1Persistence via WMI Event Subscription3c64f177-28e2-49eb-a799-d767b24dd1e0powershell
124privilege-escalationT1543.003Windows Service1Modify Fax service to run PowerShelled366cde-7d12-49df-a833-671904770b9fcommand_prompt
125privilege-escalationT1543.003Windows Service2Service Installation CMD981e2942-e433-44e9-afc1-8c957a1496b6command_prompt
126privilege-escalationT1543.003Windows Service3Service Installation PowerShell491a4af6-a521-4b74-b23b-f7b3f1ee9e77powershell
127privilege-escalationT1547.004Winlogon Helper DLL1Winlogon Shell Key Persistence - PowerShellbf9f9d65-ee4d-4c3e-a843-777d04f19c38powershell
128privilege-escalationT1547.004Winlogon Helper DLL2Winlogon Userinit Key Persistence - PowerShellfb32c935-ee2e-454b-8fa3-1c46b42e8dfbpowershell
129privilege-escalationT1547.004Winlogon Helper DLL3Winlogon Notify Key Logon Persistence - PowerShelld40da266-e073-4e5a-bb8b-2b385023e5f9powershell
130defense-evasionT1055.004Asynchronous Procedure Call1Process Injection via C#611b39b7-e243-4c81-87a4-7145a90358b1command_prompt
131defense-evasionT1197BITS Jobs1Bitsadmin Download (cmd)3c73d728-75fb-4180-a12f-6712864d7421command_prompt
132defense-evasionT1197BITS Jobs2Bitsadmin Download (PowerShell)f63b8bc4-07e5-4112-acba-56f646f3f0bcpowershell
133defense-evasionT1197BITS Jobs3Persist, Download, & Execute62a06ec5-5754-47d2-bcfc-123d8314c6aecommand_prompt
134defense-evasionT1197BITS Jobs4Bits download using destktopimgdownldr.exe (cmd)afb5e09e-e385-4dee-9a94-6ee60979d114command_prompt
135defense-evasionT1548.002Bypass User Account Control1Bypass UAC using Event Viewer (cmd)5073adf8-9a50-4bd9-b298-a9bd2ead8af9command_prompt
136defense-evasionT1548.002Bypass User Account Control2Bypass UAC using Event Viewer (PowerShell)a6ce9acf-842a-4af6-8f79-539be7608e2bpowershell
137defense-evasionT1548.002Bypass User Account Control3Bypass UAC using Fodhelper58f641ea-12e3-499a-b684-44dee46bd182command_prompt
138defense-evasionT1548.002Bypass User Account Control4Bypass UAC using Fodhelper - PowerShell3f627297-6c38-4e7d-a278-fc2563eaaeaapowershell
139defense-evasionT1548.002Bypass User Account Control5Bypass UAC using ComputerDefaults (PowerShell)3c51abf2-44bf-42d8-9111-dc96ff66750fpowershell
140defense-evasionT1548.002Bypass User Account Control6Bypass UAC by Mocking Trusted Directoriesf7a35090-6f7f-4f64-bb47-d657bf5b10c1command_prompt
141defense-evasionT1548.002Bypass User Account Control7Bypass UAC using sdclt DelegateExecute3be891eb-4608-4173-87e8-78b494c029b7powershell
142defense-evasionT1548.002Bypass User Account Control8Disable UAC using reg.exe9e8af564-53ec-407e-aaa8-3cb20c3af7f9command_prompt
143defense-evasionT1218.003CMSTP1CMSTP Executing Remote Scriptlet34e63321-9683-496b-bbc1-7566bc55e624command_prompt
144defense-evasionT1218.003CMSTP2CMSTP Executing UAC Bypass748cb4f6-2fb3-4e97-b7ad-b22635a09ab0command_prompt
145defense-evasionT1574.012COR_PROFILER1User scope COR_PROFILER9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5apowershell
146defense-evasionT1574.012COR_PROFILER2System Scope COR_PROFILERf373b482-48c8-4ce4-85ed-d40c8b3f7310powershell
147defense-evasionT1574.012COR_PROFILER3Registry-free process scope COR_PROFILER79d57242-bbef-41db-b301-9d01d9f6e817powershell
148defense-evasionT1070.003Clear Command History9Prevent Powershell History Logging2f898b81-3e97-4abb-bc3f-a95138988370powershell
149defense-evasionT1070.003Clear Command History10Clear Powershell History by Deleting History Fileda75ae8d-26d6-4483-b0fe-700e4df4f037powershell
150defense-evasionT1070.001Clear Windows Event Logs1Clear Logse6abb60e-26b8-41da-8aae-0c35174b0967command_prompt
151defense-evasionT1070.001Clear Windows Event Logs2Delete System Logs Using Clear-EventLogb13e9306-3351-4b4b-a6e8-477358b0b498powershell
152defense-evasionT1070.001Clear Windows Event Logs3Clear Event Logs via VBA1b682d84-f075-4f93-9a89-8a8de19ffd6epowershell
153defense-evasionT1027.004Compile After Delivery1Compile After Delivery using csc.exeffcdbd6a-b0e8-487d-927a-09127fe9a206command_prompt
154defense-evasionT1027.004Compile After Delivery2Dynamic C# Compile453614d8-3ba6-4147-acc0-7ec4b3e1faefpowershell
155defense-evasionT1218.001Compiled HTML File1Compiled HTML Help Local Payload5cb87818-0d7c-4469-b7ef-9224107aebe8command_prompt
156defense-evasionT1218.001Compiled HTML File2Compiled HTML Help Remote Payload0f8af516-9818-4172-922b-42986ef1e81dcommand_prompt
157defense-evasionT1218.001Compiled HTML File3Invoke CHM with default Shortcut Command Execution29d6f0d7-be63-4482-8827-ea77126c1ef7powershell
158defense-evasionT1218.001Compiled HTML File4Invoke CHM with InfoTech Storage Protocol Handlerb4094750-5fc7-4e8e-af12-b4e36bf5e7f6powershell
159defense-evasionT1218.001Compiled HTML File5Invoke CHM Simulate Double click5decef42-92b8-4a93-9eb2-877ddcb9401apowershell
160defense-evasionT1218.001Compiled HTML File6Invoke CHM with Script Engine and Help Topic4f83adda-f5ec-406d-b318-9773c9ca92e5powershell
161defense-evasionT1218.001Compiled HTML File7Invoke CHM Shortcut Command with ITS and Help Topic15756147-7470-4a83-87fb-bb5662526247powershell
162defense-evasionT1218.002Control Panel1Control Panel Items037e9d8a-9e46-4255-8b33-2ae3b545ca6fcommand_prompt
163defense-evasionT1574.001DLL Search Order Hijacking1DLL Search Order Hijacking - amsi.dll8549ad4b-b5df-4a2d-a3d7-2aee9e7052a3command_prompt
164defense-evasionT1574.002DLL Side-Loading1DLL Side-Loading using the Notepad++ GUP.exe binary65526037-7079-44a9-bda1-2cb624838040command_prompt
165defense-evasionT1078.001Default Accounts1Enable Guest account with RDP capability and admin priviliges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
166defense-evasionT1140Deobfuscate/Decode Files or Information1Deobfuscate/Decode Files Or Informationdc6fe391-69e6-4506-bd06-ea5eeb4082f8command_prompt
167defense-evasionT1140Deobfuscate/Decode Files or Information2Certutil Rename and Decode71abc534-3c05-4d0c-80f7-cbe93cb2aa94command_prompt
168defense-evasionT1006Direct Volume Access1Read volume boot sector via DOS device path (PowerShell)88f6327e-51ec-4bbf-b2e8-3fea534eab8bpowershell
169defense-evasionT1562.002Disable Windows Event Logging1Disable Windows IIS HTTP Logging69435dcf-c66f-4ec0-a8b1-82beb76b34dbpowershell
170defense-evasionT1562.002Disable Windows Event Logging2Kill Event Log Service Threads41ac52ba-5d5e-40c0-b267-573ed90489bdpowershell
171defense-evasionT1562.004Disable or Modify System Firewall2Disable Microsoft Defender Firewall88d05800-a5e4-407e-9b53-ece4174f197fcommand_prompt
172defense-evasionT1562.004Disable or Modify System Firewall3Allow SMB and RDP on Microsoft Defender Firewalld9841bf8-f161-4c73-81e9-fd773a5ff8c1command_prompt
173defense-evasionT1562.004Disable or Modify System Firewall4Opening ports for proxy - HARDRAIN15e57006-79dd-46df-9bf9-31bc24fb5a80command_prompt
174defense-evasionT1562.004Disable or Modify System Firewall5Open a local port through Windows Firewall to any profile9636dd6e-7599-40d2-8eee-ac16434f35edpowershell
175defense-evasionT1562.004Disable or Modify System Firewall6Allow Executable Through Firewall Located in Non-Standard Location6f5822d2-d38d-4f48-9bfc-916607ff6b8cpowershell
176defense-evasionT1562.001Disable or Modify Tools10Unload Sysmon Filter Driver811b3e76-c41b-430c-ac0d-e2380bfaa164command_prompt
177defense-evasionT1562.001Disable or Modify Tools11Uninstall Sysmona316fb2e-5344-470d-91c1-23e15c374edccommand_prompt
178defense-evasionT1562.001Disable or Modify Tools12AMSI Bypass - AMSI InitFailed695eed40-e949-40e5-b306-b4031e4154bdpowershell
179defense-evasionT1562.001Disable or Modify Tools13AMSI Bypass - Remove AMSI Provider Reg Key13f09b91-c953-438e-845b-b585e51cac9bpowershell
180defense-evasionT1562.001Disable or Modify Tools14Disable Arbitrary Security Windows Servicea1230893-56ac-4c81-b644-2108e982f8f5command_prompt
181defense-evasionT1562.001Disable or Modify Tools15Tamper with Windows Defender ATP PowerShell6b8df440-51ec-4d53-bf83-899591c9b5d7powershell
182defense-evasionT1562.001Disable or Modify Tools16Tamper with Windows Defender Command Promptaa875ed4-8935-47e2-b2c5-6ec00ab220d2command_prompt
183defense-evasionT1562.001Disable or Modify Tools17Tamper with Windows Defender Registry1b3e0146-a1e5-4c5c-89fb-1bb2ffe8fc45powershell
184defense-evasionT1562.001Disable or Modify Tools18Disable Microsoft Office Security Features6f5fb61b-4e56-4a3d-a8c3-82e13686c6d7powershell
185defense-evasionT1562.001Disable or Modify Tools19Remove Windows Defender Definition Files3d47daaa-2f56-43e0-94cc-caf5d8d52a68command_prompt
186defense-evasionT1562.001Disable or Modify Tools20Stop and Remove Arbitrary Security Windows Serviceae753dda-0f15-4af6-a168-b9ba16143143powershell
187defense-evasionT1562.001Disable or Modify Tools21Uninstall Crowdstrike Falcon on Windowsb32b1ccf-f7c1-49bc-9ddd-7d7466a7b297powershell
188defense-evasionT1562.001Disable or Modify Tools22Tamper with Windows Defender Evade Scanning -Folder0b19f4ee-de90-4059-88cb-63c800c683edpowershell
189defense-evasionT1562.001Disable or Modify Tools23Tamper with Windows Defender Evade Scanning -Extension315f4be6-2240-4552-b3e1-d1047f5eeceapowershell
190defense-evasionT1562.001Disable or Modify Tools24Tamper with Windows Defender Evade Scanning -Processa123ce6a-3916-45d6-ba9c-7d4081315c27powershell
191defense-evasionT1070.004File Deletion4Delete a single file - Windows cmd861ea0b4-708a-4d17-848d-186c9c7f17e3command_prompt
192defense-evasionT1070.004File Deletion5Delete an entire folder - Windows cmdded937c4-2add-42f7-9c2c-c742b7a98698command_prompt
193defense-evasionT1070.004File Deletion6Delete a single file - Windows PowerShell9dee89bd-9a98-4c4f-9e2d-4256690b0e72powershell
194defense-evasionT1070.004File Deletion7Delete an entire folder - Windows PowerShelledd779e4-a509-4cba-8dfa-a112543dbfb1powershell
195defense-evasionT1070.004File Deletion9Delete Prefetch File36f96049-0ad7-4a5f-8418-460acaeb92fbpowershell
196defense-evasionT1070.004File Deletion10Delete TeamViewer Log Files69f50a5f-967c-4327-a5bb-e1a9a9983785powershell
197defense-evasionT1564.001Hidden Files and Directories3Create Windows System File with Attribf70974c8-c094-4574-b542-2c545af95a32command_prompt
198defense-evasionT1564.001Hidden Files and Directories4Create Windows Hidden File with Attribdadb792e-4358-4d8d-9207-b771faa0daa5command_prompt
199defense-evasionT1564.003Hidden Window1Hidden Windowf151ee37-9e2b-47e6-80e4-550b9f999b7apowershell
200defense-evasionT1564Hide Artifacts1Extract binary files via VBA6afe288a-8a8b-4d33-a629-8d03ba9dad3apowershell
201defense-evasionT1070Indicator Removal on Host1Indicator Removal using FSUtilb4115c7a-0e92-47f0-a61e-17e7218b2435command_prompt
202defense-evasionT1202Indirect Command Execution1Indirect Command Execution - pcalua.exececfea7a-5f03-4cdd-8bc8-6f7c22862440command_prompt
203defense-evasionT1202Indirect Command Execution2Indirect Command Execution - forfiles.exe8b34a448-40d9-4fc3-a8c8-4bb286faf7dccommand_prompt
204defense-evasionT1202Indirect Command Execution3Indirect Command Execution - conhost.execf3391e0-b482-4b02-87fc-ca8362269b29command_prompt
205defense-evasionT1553.004Install Root Certificate4Install root CA on Windows76f49d86-5eb1-461a-a032-a480f86652f1powershell
206defense-evasionT1553.004Install Root Certificate5Install root CA on Windows with certutil5fdb1a7a-a93c-4fbe-aa29-ddd9ef94ed1fpowershell
207defense-evasionT1218.004InstallUtil1CheckIfInstallable method callffd9c807-d402-47d2-879d-f915cf2a3a94powershell
208defense-evasionT1218.004InstallUtil2InstallHelper method calld43a5bde-ae28-4c55-a850-3f4c80573503powershell
209defense-evasionT1218.004InstallUtil3InstallUtil class constructor method call9b7a7cfc-dd2e-43f5-a885-c0a3c270dd93powershell
210defense-evasionT1218.004InstallUtil4InstallUtil Install method call9f9968a6-601a-46ca-b7b7-6d4fe0f98f0bpowershell
211defense-evasionT1218.004InstallUtil5InstallUtil Uninstall method call - /U variant34428cfa-8e38-41e5-aff4-9e1f8f3a7b4bpowershell
212defense-evasionT1218.004InstallUtil6InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant06d9deba-f732-48a8-af8e-bdd6e4d98c1dpowershell
213defense-evasionT1218.004InstallUtil7InstallUtil HelpText method call5a683850-1145-4326-a0e5-e91ced3c6022powershell
214defense-evasionT1218.004InstallUtil8InstallUtil evasive invocation559e6d06-bb42-4307-bff7-3b95a8254badpowershell
215defense-evasionT1078.003Local Accounts1Create local account with admin priviligesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
216defense-evasionT1127.001MSBuild1MSBuild Bypass Using Inline Tasks58742c0f-cb01-44cd-a60b-fb26e8871c93command_prompt
217defense-evasionT1036.004Masquerade Task or Service1Creating W32Time similar named service using schtasksf9f2fe59-96f7-4a7d-ba9f-a9783200d4c9command_prompt
218defense-evasionT1036.004Masquerade Task or Service2Creating W32Time similar named service using scb721c6ef-472c-4263-a0d9-37f1f4ecff66command_prompt
219defense-evasionT1112Modify Registry1Modify Registry of Current User Profile - cmd1324796b-d0f6-455a-b4ae-21ffee6aa6b9command_prompt
220defense-evasionT1112Modify Registry2Modify Registry of Local Machine - cmd282f929a-6bc5-42b8-bd93-960c3ba35afecommand_prompt
221defense-evasionT1112Modify Registry3Modify registry to store logon credentialsc0413fb5-33e2-40b7-9b6f-60b29f4a7a18command_prompt
222defense-evasionT1112Modify Registry4Add domain to Trusted sites Zonecf447677-5a4e-4937-a82c-e47d254afd57powershell
223defense-evasionT1112Modify Registry5Javascript in registry15f44ea9-4571-4837-be9e-802431a7bfaepowershell
224defense-evasionT1112Modify Registry6Change Powershell Execution Policy to Bypassf3a6cceb-06c9-48e5-8df8-8867a6814245powershell
225defense-evasionT1218.005Mshta1Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject1483fab9-4f52-4217-a9ce-daa9d7747caecommand_prompt
226defense-evasionT1218.005Mshta2Mshta executes VBScript to execute malicious command906865c3-e05f-4acc-85c4-fbc185455095command_prompt
227defense-evasionT1218.005Mshta3Mshta Executes Remote HTML Application (HTA)c4b97eeb-5249-4455-a607-59f95485cb45powershell
228defense-evasionT1218.005Mshta4Invoke HTML Application - Jscript Engine over Local UNC Simulating Lateral Movement007e5672-2088-4853-a562-7490ddc19447powershell
229defense-evasionT1218.005Mshta5Invoke HTML Application - Jscript Engine Simulating Double Click58a193ec-131b-404e-b1ca-b35cf0b18c33powershell
230defense-evasionT1218.005Mshta6Invoke HTML Application - Direct download from URI39ceed55-f653-48ac-bd19-aceceaf525dbpowershell
231defense-evasionT1218.005Mshta7Invoke HTML Application - JScript Engine with Rundll32 and Inline Protocol Handlere7e3a525-7612-4d68-a5d3-c4649181b8afpowershell
232defense-evasionT1218.005Mshta8Invoke HTML Application - JScript Engine with Inline Protocol Handlerd3eaaf6a-cdb1-44a9-9ede-b6c337d0d840powershell
233defense-evasionT1218.005Mshta9Invoke HTML Application - Simulate Lateral Movement over UNC Pathb8a8bdb2-7eae-490d-8251-d5e0295b2362powershell
234defense-evasionT1218.007Msiexec1Msiexec.exe - Execute Local MSI file0683e8f7-a27b-4b62-b7ab-dc7d4fed1df8command_prompt
235defense-evasionT1218.007Msiexec2Msiexec.exe - Execute Remote MSI filebde7d2fe-d049-458d-a362-abda32a7e649command_prompt
236defense-evasionT1218.007Msiexec3Msiexec.exe - Execute Arbitrary DLL66f64bd5-7c35-4c24-953a-04ca30a0a0eccommand_prompt
237defense-evasionT1564.004NTFS File Attributes1Alternate Data Streams (ADS)8822c3b0-d9f9-4daf-a043-49f4602364f4command_prompt
238defense-evasionT1564.004NTFS File Attributes2Store file in Alternate Data Stream (ADS)2ab75061-f5d5-4c1a-b666-ba2a50df5b02powershell
239defense-evasionT1564.004NTFS File Attributes3Create ADS command prompt17e7637a-ddaf-4a82-8622-377e20de8fdbcommand_prompt
240defense-evasionT1564.004NTFS File Attributes4Create ADS PowerShell0045ea16-ed3c-4d4c-a9ee-15e44d1560d1powershell
241defense-evasionT1070.005Network Share Connection Removal1Add Network Share14c38f32-6509-46d8-ab43-d53e32d2b131command_prompt
242defense-evasionT1070.005Network Share Connection Removal2Remove Network Share09210ad5-1ef2-4077-9ad3-7351e13e9222command_prompt
243defense-evasionT1070.005Network Share Connection Removal3Remove Network Share PowerShell0512d214-9512-4d22-bde7-f37e058259b3powershell
244defense-evasionT1027Obfuscated Files or Information2Execute base64-encoded PowerShella50d5a97-2531-499e-a1de-5544c74432c6powershell
245defense-evasionT1027Obfuscated Files or Information3Execute base64-encoded PowerShell from Windows Registry450e7218-7915-4be4-8b9b-464a49eafcecpowershell
246defense-evasionT1027Obfuscated Files or Information4Execution from Compressed Filef8c8a909-5f29-49ac-9244-413936ce6d1fcommand_prompt
247defense-evasionT1218.008Odbcconf1Odbcconf.exe - Execute Arbitrary DLL2430498b-06c0-4b92-a448-8ad263c388e2command_prompt
248defense-evasionT1134.004Parent PID Spoofing1Parent PID Spoofing using PowerShell069258f4-2162-46e9-9a25-c9c6c56150d2powershell
249defense-evasionT1134.004Parent PID Spoofing2Parent PID Spoofing - Spawn from Current Process14920ebd-1d61-491a-85e0-fe98efe37f25powershell
250defense-evasionT1134.004Parent PID Spoofing3Parent PID Spoofing - Spawn from Specified Processcbbff285-9051-444a-9d17-c07cd2d230ebpowershell
251defense-evasionT1134.004Parent PID Spoofing4Parent PID Spoofing - Spawn from svchost.exee9f2b777-3123-430b-805d-5cedc66ab591powershell
252defense-evasionT1134.004Parent PID Spoofing5Parent PID Spoofing - Spawn from New Process2988133e-561c-4e42-a15f-6281e6a9b2dbpowershell
253defense-evasionT1550.002Pass the Hash1Mimikatz Pass the Hashec23cef9-27d9-46e4-a68d-6f75f7b86908command_prompt
254defense-evasionT1550.002Pass the Hash2crackmapexec Pass the Hasheb05b028-16c8-4ad8-adea-6f5b219da9a9command_prompt
255defense-evasionT1550.003Pass the Ticket1Mimikatz Kerberos Ticket Attackdbf38128-7ba7-4776-bedf-cc2eed432098command_prompt
256defense-evasionT1556.002Password Filter DLL1Install and Register Password Filter DLLa7961770-beb5-4134-9674-83d7e1fa865cpowershell
257defense-evasionT1574.009Path Interception by Unquoted Path1Execution of program.exe as service with unquoted service path2770dea7-c50f-457b-84c4-c40a47460d9fcommand_prompt
258defense-evasionT1055.012Process Hollowing1Process Hollowing using PowerShell562427b4-39ef-4e8c-af88-463a78e70b9cpowershell
259defense-evasionT1055.012Process Hollowing2RunPE via VBA3ad4a037-1598-4136-837c-4027e4fa319bpowershell
260defense-evasionT1055Process Injection1Process Injection via mavinject.exe74496461-11a1-4982-b439-4d87a550d254powershell
261defense-evasionT1055Process Injection2Shellcode execution via VBA1c91e740-1729-4329-b779-feba6e71d048powershell
262defense-evasionT1216.001PubPrn1PubPrn.vbs Signed Script Bypass9dd29a1f-1e16-4862-be83-913b10a88f6ccommand_prompt
263defense-evasionT1218.009Regsvcs/Regasm1Regasm Uninstall Method Call Test71bfbfac-60b1-4fc0-ac8b-2cedbbdcb112command_prompt
264defense-evasionT1218.009Regsvcs/Regasm2Regsvcs Uninstall Method Call Testfd3c1c6a-02d2-4b72-82d9-71c527abb126powershell
265defense-evasionT1218.010Regsvr321Regsvr32 local COM scriptlet execution449aa403-6aba-47ce-8a37-247d21ef0306command_prompt
266defense-evasionT1218.010Regsvr322Regsvr32 remote COM scriptlet executionc9d0c4ef-8a96-4794-a75b-3d3a5e6f2a36command_prompt
267defense-evasionT1218.010Regsvr323Regsvr32 local DLL execution08ffca73-9a3d-471a-aeb0-68b4aa3ab37bcommand_prompt
268defense-evasionT1218.010Regsvr324Regsvr32 Registering Non DLL1ae5ea1f-0a4e-4e54-b2f5-4ac328a7f421command_prompt
269defense-evasionT1036.003Rename System Utilities1Masquerading as Windows LSASS process5ba5a3d1-cf3c-4499-968a-a93155d1f717command_prompt
270defense-evasionT1036.003Rename System Utilities3Masquerading - cscript.exe running as notepad.exe3a2a578b-0a01-46e4-92e3-62e2859b42f0command_prompt
271defense-evasionT1036.003Rename System Utilities4Masquerading - wscript.exe running as svchost.exe24136435-c91a-4ede-9da1-8b284a1c1a23command_prompt
272defense-evasionT1036.003Rename System Utilities5Masquerading - powershell.exe running as taskhostw.exeac9d0fc3-8aa8-4ab5-b11f-682cd63b40aacommand_prompt
273defense-evasionT1036.003Rename System Utilities6Masquerading - non-windows exe running as windows exebc15c13f-d121-4b1f-8c7d-28d95854d086powershell
274defense-evasionT1036.003Rename System Utilities7Masquerading - windows exe running as different windows exec3d24a39-2bfe-4c6a-b064-90cd73896cb0powershell
275defense-evasionT1036.003Rename System Utilities8Malicious process Masquerading as LSM.exe83810c46-f45e-4485-9ab6-8ed0e9e6ed7fcommand_prompt
276defense-evasionT1036.003Rename System Utilities9File Extension Masqueradingc7fa0c3b-b57f-4cba-9118-863bf4e653fccommand_prompt
277defense-evasionT1207Rogue Domain Controller1DCShadow - Mimikatz0f4c5eb0-98a0-4496-9c3d-656b4f2bc8f6manual
278defense-evasionT1014Rootkit3Windows Signed Driver Rootkit Test8e4e1985-9a19-4529-b4b8-b7a49ff87faecommand_prompt
279defense-evasionT1218.011Rundll321Rundll32 execute JavaScript Remote Payload With GetObjectcf3bdb9a-dd11-4b6c-b0d0-9e22b68a71becommand_prompt
280defense-evasionT1218.011Rundll322Rundll32 execute VBscript command638730e7-7aed-43dc-bf8c-8117f805f5bbcommand_prompt
281defense-evasionT1218.011Rundll323Rundll32 advpack.dll Executiond91cae26-7fc1-457b-a854-34c8aad48c89command_prompt
282defense-evasionT1218.011Rundll324Rundll32 ieadvpack.dll Execution5e46a58e-cbf6-45ef-a289-ed7754603df9command_prompt
283defense-evasionT1218.011Rundll325Rundll32 syssetup.dll Execution41fa324a-3946-401e-bbdd-d7991c628125command_prompt
284defense-evasionT1218.011Rundll326Rundll32 setupapi.dll Execution71d771cd-d6b3-4f34-bc76-a63d47a10b19command_prompt
285defense-evasionT1218.011Rundll327Execution of HTA and VBS Files using Rundll32 and URL.dll22cfde89-befe-4e15-9753-47306b37a6e3command_prompt
286defense-evasionT1574.011Services Registry Permissions Weakness1Service Registry Permissions Weaknessf7536d63-7fd4-466f-89da-7e48d550752apowershell
287defense-evasionT1574.011Services Registry Permissions Weakness2Service ImagePath Change with reg.exef38e9eea-e1d7-4ba6-b716-584791963827command_prompt
288defense-evasionT1218Signed Binary Proxy Execution1mavinject - Inject DLL into running processc426dacf-575d-4937-8611-a148a86a5e61command_prompt
289defense-evasionT1218Signed Binary Proxy Execution2SyncAppvPublishingServer - Execute arbitrary PowerShell coded590097e-d402-44e2-ad72-2c6aa1ce78b1command_prompt
290defense-evasionT1218Signed Binary Proxy Execution3Register-CimProvider - Execute evil dllad2c17ed-f626-4061-b21e-b9804a6f3655command_prompt
291defense-evasionT1218Signed Binary Proxy Execution4InfDefaultInstall.exe .inf Execution54ad7d5a-a1b5-472c-b6c4-f8090fb2daefcommand_prompt
292defense-evasionT1218Signed Binary Proxy Execution5ProtocolHandler.exe Downloaded a Suspicious Filedb020456-125b-4c8b-a4a7-487df8afb5a2command_prompt
293defense-evasionT1218Signed Binary Proxy Execution6Microsoft.Workflow.Compiler.exe Payload Execution7cbb0f26-a4c1-4f77-b180-a009aa05637epowershell
294defense-evasionT1218Signed Binary Proxy Execution7Renamed Microsoft.Workflow.Compiler.exe Payload Executions4cc40fd7-87b8-4b16-b2d7-57534b86b911powershell
295defense-evasionT1216Signed Script Proxy Execution1SyncAppvPublishingServer Signed Script PowerShell Command Execution275d963d-3f36-476c-8bef-a2a3960ee6ebcommand_prompt
296defense-evasionT1216Signed Script Proxy Execution2manage-bde.wsf Signed Script Command Execution2a8f2d3c-3dec-4262-99dd-150cb2a4d63acommand_prompt
297defense-evasionT1497.001System Checks2Detect Virtualization Environment (Windows)502a7dc4-9d6f-4d28-abf2-f0e84692562dpowershell
298defense-evasionT1070.006Timestomp5Windows - Modify file creation timestamp with PowerShellb3b2c408-2ff0-4a33-b89b-1cb46a9e6a9cpowershell
299defense-evasionT1070.006Timestomp6Windows - Modify file last modified timestamp with PowerShellf8f6634d-93e1-4238-8510-f8a90a20dcf2powershell
300defense-evasionT1070.006Timestomp7Windows - Modify file last access timestamp with PowerShellda627f63-b9bd-4431-b6f8-c5b44d061a62powershell
301defense-evasionT1070.006Timestomp8Windows - Timestomp a Filed7512c33-3a75-4806-9893-69abc3ccdd43powershell
302defense-evasionT1134.001Token Impersonation/Theft1Named pipe client impersonation90db9e27-8e7c-4c04-b602-a45927884966powershell
303defense-evasionT1134.001Token Impersonation/Theft2`SeDebugPrivilege` token duplication34f0a430-9d04-4d98-bcb5-1989f14719f0powershell
304defense-evasionT1222.001Windows File and Directory Permissions Modification1Take ownership using takeown utility98d34bb4-6e75-42ad-9c41-1dae7dc6a001command_prompt
305defense-evasionT1222.001Windows File and Directory Permissions Modification2cacls - Grant permission to specified user or group recursivelya8206bcc-f282-40a9-a389-05d9c0263485command_prompt
306defense-evasionT1222.001Windows File and Directory Permissions Modification3attrib - Remove read-only attributebec1e95c-83aa-492e-ab77-60c71bbd21b0command_prompt
307defense-evasionT1222.001Windows File and Directory Permissions Modification4attrib - hide file32b979da-7b68-42c9-9a99-0e39900fc36ccommand_prompt
308defense-evasionT1222.001Windows File and Directory Permissions Modification5Grant Full Access to Entire C:\ Drive for Everyone - Ryuk Ransomware Styleac7e6118-473d-41ec-9ac0-ef4f1d1ed2f6powershell
309defense-evasionT1220XSL Script Processing1MSXSL Bypass using local filesca23bfb2-023f-49c5-8802-e66997de462dcommand_prompt
310defense-evasionT1220XSL Script Processing2MSXSL Bypass using remote filesa7c3ab07-52fb-49c8-ab6d-e9c6d4a0a985command_prompt
311defense-evasionT1220XSL Script Processing3WMIC bypass using local XSL file1b237334-3e21-4a0c-8178-b8c996124988command_prompt
312defense-evasionT1220XSL Script Processing4WMIC bypass using remote XSL file7f5be499-33be-4129-a560-66021f379b9bcommand_prompt
313persistenceT1546.008Accessibility Features1Attaches Command Prompt as a Debugger to a List of Target Processes3309f53e-b22b-4eb6-8fd2-a6cf58b355a9powershell
314persistenceT1546.008Accessibility Features2Replace binary of sticky keys934e90cf-29ca-48b3-863c-411737ad44e3command_prompt
315persistenceT1098Account Manipulation1Admin Account Manipulate5598f7cb-cf43-455e-883a-f6008c5d46afpowershell
316persistenceT1098Account Manipulation2Domain Account and Group Manipulatea55a22e9-a3d3-42ce-bd48-2653adb8f7a9powershell
317persistenceT1546.010AppInit DLLs1Install AppInit Shima58d9386-3080-4242-ab5f-454c16503d18command_prompt
318persistenceT1546.011Application Shimming1Application Shim Installation9ab27e22-ee62-4211-962b-d36d9a0e6a18command_prompt
319persistenceT1546.011Application Shimming2New shim database files created in the default shim database directoryaefd6866-d753-431f-a7a4-215ca7e3f13dpowershell
320persistenceT1546.011Application Shimming3Registry key creation and/or modification events for SDB9b6a06f9-ab5e-4e8d-8289-1df4289db02fpowershell
321persistenceT1053.002At (Windows)1At.exe Scheduled task4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8command_prompt
322persistenceT1197BITS Jobs1Bitsadmin Download (cmd)3c73d728-75fb-4180-a12f-6712864d7421command_prompt
323persistenceT1197BITS Jobs2Bitsadmin Download (PowerShell)f63b8bc4-07e5-4112-acba-56f646f3f0bcpowershell
324persistenceT1197BITS Jobs3Persist, Download, & Execute62a06ec5-5754-47d2-bcfc-123d8314c6aecommand_prompt
325persistenceT1197BITS Jobs4Bits download using destktopimgdownldr.exe (cmd)afb5e09e-e385-4dee-9a94-6ee60979d114command_prompt
326persistenceT1176Browser Extensions1Chrome (Developer Mode)3ecd790d-2617-4abf-9a8c-4e8d47da9ee1manual
327persistenceT1176Browser Extensions2Chrome (Chrome Web Store)4c83940d-8ca5-4bb2-8100-f46dc914bc3fmanual
328persistenceT1176Browser Extensions3Firefoxcb790029-17e6-4c43-b96f-002ce5f10938manual
329persistenceT1176Browser Extensions4Edge Chromium Addon - VPN3d456e2b-a7db-4af8-b5b3-720e7c4d9da5manual
330persistenceT1574.012COR_PROFILER1User scope COR_PROFILER9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5apowershell
331persistenceT1574.012COR_PROFILER2System Scope COR_PROFILERf373b482-48c8-4ce4-85ed-d40c8b3f7310powershell
332persistenceT1574.012COR_PROFILER3Registry-free process scope COR_PROFILER79d57242-bbef-41db-b301-9d01d9f6e817powershell
333persistenceT1546.001Change Default File Association1Change Default File Association10a08978-2045-4d62-8c42-1957bbbea102command_prompt
334persistenceT1574.001DLL Search Order Hijacking1DLL Search Order Hijacking - amsi.dll8549ad4b-b5df-4a2d-a3d7-2aee9e7052a3command_prompt
335persistenceT1574.002DLL Side-Loading1DLL Side-Loading using the Notepad++ GUP.exe binary65526037-7079-44a9-bda1-2cb624838040command_prompt
336persistenceT1078.001Default Accounts1Enable Guest account with RDP capability and admin priviliges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
337persistenceT1136.002Domain Account1Create a new Windows domain admin userfcec2963-9951-4173-9bfa-98d8b7834e62command_prompt
338persistenceT1136.002Domain Account2Create a new account similar to ANONYMOUS LOGONdc7726d2-8ccb-4cc6-af22-0d5afb53a548command_prompt
339persistenceT1133External Remote Services1Running Chrome VPN Extensions via the Registry 2 vpn extension4c8db261-a58b-42a6-a866-0a294deedde4powershell
340persistenceT1546.012Image File Execution Options Injection1IFEO Add Debuggerfdda2626-5234-4c90-b163-60849a24c0b8command_prompt
341persistenceT1546.012Image File Execution Options Injection2IFEO Global Flags46b1f278-c8ee-4aa5-acce-65e77b11f3c1command_prompt
342persistenceT1136.001Local Account3Create a new user in a command prompt6657864e-0323-4206-9344-ac9cd7265a4fcommand_prompt
343persistenceT1136.001Local Account4Create a new user in PowerShellbc8be0ac-475c-4fbf-9b1d-9fffd77afbdepowershell
344persistenceT1136.001Local Account6Create a new Windows admin userfda74566-a604-4581-a4cc-fbbe21d66559command_prompt
345persistenceT1078.003Local Accounts1Create local account with admin priviligesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
346persistenceT1037.001Logon Script (Windows)1Logon Scriptsd6042746-07d4-4c92-9ad8-e644c114a231command_prompt
347persistenceT1546.007Netsh Helper DLL1Netsh Helper DLL Registration3244697d-5a3a-4dfc-941c-550f69f91a4dcommand_prompt
348persistenceT1137.002Office Test1Office Apllication Startup Test Persistencec3e35b58-fe1c-480b-b540-7600fb612563command_prompt
349persistenceT1574.009Path Interception by Unquoted Path1Execution of program.exe as service with unquoted service path2770dea7-c50f-457b-84c4-c40a47460d9fcommand_prompt
350persistenceT1546.013PowerShell Profile1Append malicious start-process cmdlet090e5aa5-32b6-473b-a49b-21e843a56896powershell
351persistenceT1547.001Registry Run Keys / Startup Folder1Reg Key Rune55be3fd-3521-4610-9d1a-e210e42dcf05command_prompt
352persistenceT1547.001Registry Run Keys / Startup Folder2Reg Key RunOnce554cbd88-cde1-4b56-8168-0be552eed9ebcommand_prompt
353persistenceT1547.001Registry Run Keys / Startup Folder3PowerShell Registry RunOnceeb44f842-0457-4ddc-9b92-c4caa144ac42powershell
354persistenceT1547.001Registry Run Keys / Startup Folder4Suspicious vbs file run from startup Folder2cb98256-625e-4da9-9d44-f2e5f90b8bd5powershell
355persistenceT1547.001Registry Run Keys / Startup Folder5Suspicious jse file run from startup Folderdade9447-791e-4c8f-b04b-3a35855dfa06powershell
356persistenceT1547.001Registry Run Keys / Startup Folder6Suspicious bat file run from startup Folder5b6768e4-44d2-44f0-89da-a01d1430fd5epowershell
357persistenceT1547.001Registry Run Keys / Startup Folder7Add Executable Shortcut Link to User Startup Folder24e55612-85f6-4bd6-ae74-a73d02e3441dpowershell
358persistenceT1053.005Scheduled Task1Scheduled Task Startup Scriptfec27f65-db86-4c2d-b66c-61945aee87c2command_prompt
359persistenceT1053.005Scheduled Task2Scheduled task Local42f53695-ad4a-4546-abb6-7d837f644a71command_prompt
360persistenceT1053.005Scheduled Task3Scheduled task Remote2e5eac3e-327b-4a88-a0c0-c4057039a8ddcommand_prompt
361persistenceT1053.005Scheduled Task4Powershell Cmdlet Scheduled Taskaf9fd58f-c4ac-4bf2-a9ba-224b71ff25fdpowershell
362persistenceT1053.005Scheduled Task5Task Scheduler via VBAecd3fa21-7792-41a2-8726-2c5c673414d3powershell
363persistenceT1546.002Screensaver1Set Arbitrary Binary as Screensaver281201e7-de41-4dc9-b73d-f288938cbb64command_prompt
364persistenceT1547.005Security Support Provider1Modify SSP configuration in registryafdfd7e3-8a0b-409f-85f7-886fdf249c9epowershell
365persistenceT1574.011Services Registry Permissions Weakness1Service Registry Permissions Weaknessf7536d63-7fd4-466f-89da-7e48d550752apowershell
366persistenceT1574.011Services Registry Permissions Weakness2Service ImagePath Change with reg.exef38e9eea-e1d7-4ba6-b716-584791963827command_prompt
367persistenceT1547.009Shortcut Modification1Shortcut Modificationce4fc678-364f-4282-af16-2fb4c78005cecommand_prompt
368persistenceT1547.009Shortcut Modification2Create shortcut to cmd in startup folderscfdc954d-4bb0-4027-875b-a1893ce406f2powershell
369persistenceT1505.002Transport Agent1Install MS Exchange Transport Agent Persistence43e92449-ff60-46e9-83a3-1a38089df94dpowershell
370persistenceT1505.003Web Shell1Web Shell Written to Disk0a2ce662-1efa-496f-a472-2fe7b080db16command_prompt
371persistenceT1546.003Windows Management Instrumentation Event Subscription1Persistence via WMI Event Subscription3c64f177-28e2-49eb-a799-d767b24dd1e0powershell
372persistenceT1543.003Windows Service1Modify Fax service to run PowerShelled366cde-7d12-49df-a833-671904770b9fcommand_prompt
373persistenceT1543.003Windows Service2Service Installation CMD981e2942-e433-44e9-afc1-8c957a1496b6command_prompt
374persistenceT1543.003Windows Service3Service Installation PowerShell491a4af6-a521-4b74-b23b-f7b3f1ee9e77powershell
375persistenceT1547.004Winlogon Helper DLL1Winlogon Shell Key Persistence - PowerShellbf9f9d65-ee4d-4c3e-a843-777d04f19c38powershell
376persistenceT1547.004Winlogon Helper DLL2Winlogon Userinit Key Persistence - PowerShellfb32c935-ee2e-454b-8fa3-1c46b42e8dfbpowershell
377persistenceT1547.004Winlogon Helper DLL3Winlogon Notify Key Logon Persistence - PowerShelld40da266-e073-4e5a-bb8b-2b385023e5f9powershell
378impactT1531Account Access Removal1Change User Password - Windows1b99ef28-f83c-4ec5-8a08-1a56263a5bb2command_prompt
379impactT1531Account Access Removal2Delete User - Windowsf21a1d7d-a62f-442a-8c3a-2440d43b19e5command_prompt
380impactT1531Account Access Removal3Remove Account From Domain Admin Group43f71395-6c37-498e-ab17-897d814a0947powershell
381impactT1485Data Destruction1Windows - Overwrite file with Sysinternals SDelete476419b5-aebf-4366-a131-ae3e8dae5fc2powershell
382impactT1490Inhibit System Recovery1Windows - Delete Volume Shadow Copies43819286-91a9-4369-90ed-d31fb4da2c01command_prompt
383impactT1490Inhibit System Recovery2Windows - Delete Volume Shadow Copies via WMI6a3ff8dd-f49c-4272-a658-11c2fe58bd88command_prompt
384impactT1490Inhibit System Recovery3Windows - Delete Windows Backup Catalog263ba6cb-ea2b-41c9-9d4e-b652dadd002ccommand_prompt
385impactT1490Inhibit System Recovery4Windows - Disable Windows Recovery Console Repaircf21060a-80b3-4238-a595-22525de4ab81command_prompt
386impactT1490Inhibit System Recovery5Windows - Delete Volume Shadow Copies via WMI with PowerShell39a295ca-7059-4a88-86f6-09556c1211e7powershell
387impactT1490Inhibit System Recovery6Windows - Delete Backup Files6b1dbaf6-cc8a-4ea6-891f-6058569653bfcommand_prompt
388impactT1489Service Stop1Windows - Stop service using Service Controller21dfb440-830d-4c86-a3e5-2a491d5a8d04command_prompt
389impactT1489Service Stop2Windows - Stop service using net.exe41274289-ec9c-4213-bea4-e43c4aa57954command_prompt
390impactT1489Service Stop3Windows - Stop service by killing processf3191b84-c38b-400b-867e-3a217a27795fcommand_prompt
391impactT1529System Shutdown/Reboot1Shutdown System - Windowsad254fa8-45c0-403b-8c77-e00b3d3e7a64command_prompt
392impactT1529System Shutdown/Reboot2Restart System - Windowsf4648f0d-bf78-483c-bafc-3ec99cd1c302command_prompt
393discoveryT1010Application Window Discovery1List Process Main Windows - C# .NETfe94a1c3-3e22-4dc9-9fdf-3a8bdbc10dc4command_prompt
394discoveryT1217Browser Bookmark Discovery4List Google Chrome Bookmarks on Windows with powershellfaab755e-4299-48ec-8202-fc7885eb6545powershell
395discoveryT1217Browser Bookmark Discovery5List Google Chrome / Edge Chromium Bookmarks on Windows with command prompt76f71e2f-480e-4bed-b61e-398fe17499d5command_prompt
396discoveryT1217Browser Bookmark Discovery6List Mozilla Firefox bookmarks on Windows with command prompt4312cdbc-79fc-4a9c-becc-53d49c734bc5command_prompt
397discoveryT1217Browser Bookmark Discovery7List Internet Explorer Bookmarks using the command prompt727dbcdb-e495-4ab1-a6c4-80c7f77aef85command_prompt
398discoveryT1087.002Domain Account1Enumerate all accounts (Domain)6fbc9e68-5ad7-444a-bd11-8bf3136c477ecommand_prompt
399discoveryT1087.002Domain Account2Enumerate all accounts via PowerShell (Domain)8b8a6449-be98-4f42-afd2-dedddc7453b2powershell
400discoveryT1087.002Domain Account3Enumerate logged on users via CMD (Domain)161dcd85-d014-4f5e-900c-d3eaae82a0f7command_prompt
401discoveryT1087.002Domain Account4Automated AD Recon (ADRecon)95018438-454a-468c-a0fa-59c800149b59powershell
402discoveryT1087.002Domain Account5Adfind -Listing password policy736b4f53-f400-4c22-855d-1a6b5a551600command_prompt
403discoveryT1087.002Domain Account6Adfind - Enumerate Active Directory Adminsb95fd967-4e62-4109-b48d-265edfd28c3acommand_prompt
404discoveryT1087.002Domain Account7Adfind - Enumerate Active Directory User Objectse1ec8d20-509a-4b9a-b820-06c9b2da8eb7command_prompt
405discoveryT1087.002Domain Account8Adfind - Enumerate Active Directory Exchange AD Objects5e2938fb-f919-47b6-8b29-2f6a1f718e99command_prompt
406discoveryT1087.002Domain Account9Enumerate Default Domain Admin Details (Domain)c70ab9fd-19e2-4e02-a83c-9cfa8eaa8fefcommand_prompt
407discoveryT1069.002Domain Groups1Basic Permission Groups Discovery Windows (Domain)dd66d77d-8998-48c0-8024-df263dc2ce5dcommand_prompt
408discoveryT1069.002Domain Groups2Permission Groups Discovery PowerShell (Domain)6d5d8c96-3d2a-4da9-9d6d-9a9d341899a7powershell
409discoveryT1069.002Domain Groups3Elevated group enumeration using net group (Domain)0afb5163-8181-432e-9405-4322710c0c37command_prompt
410discoveryT1069.002Domain Groups4Find machines where user has local admin access (PowerView)a2d71eee-a353-4232-9f86-54f4288dd8c1powershell
411discoveryT1069.002Domain Groups5Find local admins on all machines in domain (PowerView)a5f0d9f8-d3c9-46c0-8378-846ddd6b1cbdpowershell
412discoveryT1069.002Domain Groups6Find Local Admins via Group Policy (PowerView)64fdb43b-5259-467a-b000-1b02c00e510apowershell
413discoveryT1069.002Domain Groups7Enumerate Users Not Requiring Pre Auth (ASRepRoast)870ba71e-6858-4f6d-895c-bb6237f6121bpowershell
414discoveryT1069.002Domain Groups8Adfind - Query Active Directory Groups48ddc687-82af-40b7-8472-ff1e742e8274command_prompt
415discoveryT1482Domain Trust Discovery1Windows - Discover domain trusts with dsquery4700a710-c821-4e17-a3ec-9e4c81d6845fcommand_prompt
416discoveryT1482Domain Trust Discovery2Windows - Discover domain trusts with nltest2e22641d-0498-48d2-b9ff-c71e496ccdbecommand_prompt
417discoveryT1482Domain Trust Discovery3Powershell enumerate domains and forestsc58fbc62-8a62-489e-8f2d-3565d7d96f30powershell
418discoveryT1482Domain Trust Discovery4Adfind - Enumerate Active Directory OUsd1c73b96-ab87-4031-bad8-0e1b3b8bf3eccommand_prompt
419discoveryT1482Domain Trust Discovery5Adfind - Enumerate Active Directory Trusts15fe436d-e771-4ff3-b655-2dca9ba52834command_prompt
420discoveryT1083File and Directory Discovery1File and Directory Discovery (cmd.exe)0e36303b-6762-4500-b003-127743b80ba6command_prompt
421discoveryT1083File and Directory Discovery2File and Directory Discovery (PowerShell)2158908e-b7ef-4c21-8a83-3ce4dd05a924powershell
422discoveryT1087.001Local Account8Enumerate all accounts on Windows (Local)80887bec-5a9b-4efc-a81d-f83eb2eb32abcommand_prompt
423discoveryT1087.001Local Account9Enumerate all accounts via PowerShell (Local)ae4b6361-b5f8-46cb-a3f9-9cf108ccfe7bpowershell
424discoveryT1087.001Local Account10Enumerate logged on users via CMD (Local)a138085e-bfe5-46ba-a242-74a6fb884af3command_prompt
425discoveryT1087.001Local Account11Enumerate logged on users via PowerShell2bdc42c7-8907-40c2-9c2b-42919a00fe03powershell
426discoveryT1069.001Local Groups2Basic Permission Groups Discovery Windows (Local)1f454dd6-e134-44df-bebb-67de70fb6cd8command_prompt
427discoveryT1069.001Local Groups3Permission Groups Discovery PowerShell (Local)a580462d-2c19-4bc7-8b9a-57a41b7d3ba4powershell
428discoveryT1046Network Service Scanning3Port Scan NMap for Windowsd696a3cb-d7a8-4976-8eb5-5af4abf2e3dfpowershell
429discoveryT1135Network Share Discovery2Network Share Discovery command prompt20f1097d-81c1-405c-8380-32174d493bbbcommand_prompt
430discoveryT1135Network Share Discovery3Network Share Discovery PowerShell1b0814d1-bb24-402d-9615-1b20c50733fbpowershell
431discoveryT1135Network Share Discovery4View available share drivesab39a04f-0c93-4540-9ff2-83f862c385aecommand_prompt
432discoveryT1135Network Share Discovery5Share Discovery with PowerViewb1636f0a-ba82-435c-b699-0d78794d8bfdpowershell
433discoveryT1040Network Sniffing3Packet Capture Windows Command Prompta5b2f6a0-24b4-493e-9590-c699f75723cacommand_prompt
434discoveryT1040Network Sniffing4Windows Internal Packet Captureb5656f67-d67f-4de8-8e62-b5581630f528command_prompt
435discoveryT1201Password Policy Discovery5Examine local password policy - Windows4588d243-f24e-4549-b2e3-e627acc089f6command_prompt
436discoveryT1201Password Policy Discovery6Examine domain password policy - Windows46c2c362-2679-4ef5-aec9-0e958e135be4command_prompt
437discoveryT1057Process Discovery2Process Discovery - tasklistc5806a4f-62b8-4900-980b-c7ec004e9908command_prompt
438discoveryT1012Query Registry1Query Registry8f7578c4-9863-4d83-875c-a565573bbdf0command_prompt
439discoveryT1018Remote System Discovery1Remote System Discovery - net85321a9c-897f-4a60-9f20-29788e50bccdcommand_prompt
440discoveryT1018Remote System Discovery2Remote System Discovery - net group Domain Computersf1bf6c8f-9016-4edf-aff9-80b65f5d711fcommand_prompt
441discoveryT1018Remote System Discovery3Remote System Discovery - nltest52ab5108-3f6f-42fb-8ba3-73bc054f22c8command_prompt
442discoveryT1018Remote System Discovery4Remote System Discovery - ping sweep6db1f57f-d1d5-4223-8a66-55c9c65a9592command_prompt
443discoveryT1018Remote System Discovery5Remote System Discovery - arp2d5a61f5-0447-4be4-944a-1f8530ed6574command_prompt
444discoveryT1018Remote System Discovery8Remote System Discovery - nslookupbaa01aaa-5e13-45ec-8a0d-e46c93c9760fpowershell
445discoveryT1018Remote System Discovery9Remote System Discovery - adidnsdump95e19466-469e-4316-86d2-1dc401b5a959command_prompt
446discoveryT1018Remote System Discovery10Adfind - Enumerate Active Directory Computer Objectsa889f5be-2d54-4050-bd05-884578748bb4command_prompt
447discoveryT1018Remote System Discovery11Adfind - Enumerate Active Directory Domain Controller Objects5838c31e-a0e2-4b9f-b60a-d79d2cb7995ecommand_prompt
448discoveryT1518.001Security Software Discovery1Security Software Discoveryf92a380f-ced9-491f-b338-95a991418ce2command_prompt
449discoveryT1518.001Security Software Discovery2Security Software Discovery - powershell7f566051-f033-49fb-89de-b6bacab730f0powershell
450discoveryT1518.001Security Software Discovery4Security Software Discovery - Sysmon Servicefe613cf3-8009-4446-9a0f-bc78a15b66c9command_prompt
451discoveryT1518.001Security Software Discovery5Security Software Discovery - AV Discovery via WMI1553252f-14ea-4d3b-8a08-d7a4211aa945command_prompt
452discoveryT1518Software Discovery1Find and Display Internet Explorer Browser Version68981660-6670-47ee-a5fa-7e74806420a4command_prompt
453discoveryT1518Software Discovery2Applications Installedc49978f6-bd6e-4221-ad2c-9e3e30cc1e3bpowershell
454discoveryT1497.001System Checks2Detect Virtualization Environment (Windows)502a7dc4-9d6f-4d28-abf2-f0e84692562dpowershell
455discoveryT1082System Information Discovery1System Information Discovery66703791-c902-4560-8770-42b8a91f7667command_prompt
456discoveryT1082System Information Discovery6Hostname Discovery (Windows)85cfbf23-4a1e-4342-8792-007e004b975fcommand_prompt
457discoveryT1082System Information Discovery8Windows MachineGUID Discovery224b4daf-db44-404e-b6b2-f4d1f0126ef8command_prompt
458discoveryT1082System Information Discovery9Griffon Recon69bd4abe-8759-49a6-8d21-0f15822d6370powershell
459discoveryT1016System Network Configuration Discovery1System Network Configuration Discovery on Windows970ab6a1-0157-4f3f-9a73-ec4166754b23command_prompt
460discoveryT1016System Network Configuration Discovery2List Windows Firewall Rules038263cb-00f4-4b0a-98ae-0696c67e1752command_prompt
461discoveryT1016System Network Configuration Discovery4System Network Configuration Discovery (TrickBot Style)dafaf052-5508-402d-bf77-51e0700c02e2command_prompt
462discoveryT1016System Network Configuration Discovery5List Open Egress Ports4b467538-f102-491d-ace7-ed487b853bf5powershell
463discoveryT1016System Network Configuration Discovery6Adfind - Enumerate Active Directory Subnet Objects9bb45dd7-c466-4f93-83a1-be30e56033eecommand_prompt
464discoveryT1016System Network Configuration Discovery7Qakbot Recon121de5c6-5818-4868-b8a7-8fd07c455c1bcommand_prompt
465discoveryT1049System Network Connections Discovery1System Network Connections Discovery0940a971-809a-48f1-9c4d-b1d785e96ee5command_prompt
466discoveryT1049System Network Connections Discovery2System Network Connections Discovery with PowerShellf069f0f1-baad-4831-aa2b-eddac4baac4apowershell
467discoveryT1033System Owner/User Discovery1System Owner/User Discovery4c4959bf-addf-4b4a-be86-8d09cc1857aacommand_prompt
468discoveryT1033System Owner/User Discovery3Find computers where user has session - Stealth mode (PowerView)29857f27-a36f-4f7e-8084-4557cd6207capowershell
469discoveryT1007System Service Discovery1System Service Discovery89676ba1-b1f8-47ee-b940-2e1a113ebc71command_prompt
470discoveryT1007System Service Discovery2System Service Discovery - net.exe5f864a3f-8ce9-45c0-812c-bdf7d8aeacc3command_prompt
471discoveryT1124System Time Discovery1System Time Discovery20aba24b-e61f-4b26-b4ce-4784f763ca20command_prompt
472discoveryT1124System Time Discovery2System Time Discovery - PowerShell1d5711d6-655c-4a47-ae9c-6503c74fa877powershell
473command-and-controlT1071.004DNS1DNS Large Query Volume1700f5d6-5a44-487b-84de-bc66f507b0a6powershell
474command-and-controlT1071.004DNS2DNS Regular Beaconing3efc144e-1af8-46bb-8ca2-1376bb6db8b6powershell
475command-and-controlT1071.004DNS3DNS Long Domain Queryfef31710-223a-40ee-8462-a396d6b66978powershell
476command-and-controlT1071.004DNS4DNS C2e7bf9802-2e78-4db9-93b5-181b7bcd37d7powershell
477command-and-controlT1573Encrypted Channel1OpenSSL C221caf58e-87ad-440c-a6b8-3ac259964003powershell
478command-and-controlT1105Ingress Tool Transfer7certutil download (urlcache)dd3b61dd-7bbc-48cd-ab51-49ad1a776df0command_prompt
479command-and-controlT1105Ingress Tool Transfer8certutil download (verifyctl)ffd492e3-0455-4518-9fb1-46527c9f241bpowershell
480command-and-controlT1105Ingress Tool Transfer9Windows - BITSAdmin BITS Downloada1921cd3-9a2d-47d5-a891-f1d0f2a7a31bcommand_prompt
481command-and-controlT1105Ingress Tool Transfer10Windows - PowerShell Download42dc4460-9aa6-45d3-b1a6-3955d34e1fe8powershell
482command-and-controlT1105Ingress Tool Transfer11OSTAP Worming Activity2ca61766-b456-4fcf-a35a-1233685e1cadcommand_prompt
483command-and-controlT1105Ingress Tool Transfer12svchost writing a file to a UNC pathfa5a2759-41d7-4e13-a19c-e8f28a53566fcommand_prompt
484command-and-controlT1105Ingress Tool Transfer13Download a File with Windows Defender MpCmdRun.exe815bef8b-bf91-4b67-be4c-abe4c2a94ccccommand_prompt
485command-and-controlT1090.001Internal Proxy3portproxy reg keyb8223ea9-4be2-44a6-b50a-9657a3d4e72apowershell
486command-and-controlT1095Non-Application Layer Protocol1ICMP C20268e63c-e244-42db-bef7-72a9e59fc1fcpowershell
487command-and-controlT1095Non-Application Layer Protocol2Netcat C2bcf0d1c1-3f6a-4847-b1c9-7ed4ea321f37powershell
488command-and-controlT1095Non-Application Layer Protocol3Powercat C23e0e0e7f-6aa2-4a61-b61d-526c2cc9330epowershell
489command-and-controlT1571Non-Standard Port1Testing usage of uncommonly used port with PowerShell21fe622f-8e53-4b31-ba83-6d333c2583f4powershell
490command-and-controlT1219Remote Access Software1TeamViewer Files Detected Test on Windows8ca3b96d-8983-4a7f-b125-fc98cc0a2aa0powershell
491command-and-controlT1219Remote Access Software2AnyDesk Files Detected Test on Windows6b8b7391-5c0a-4f8c-baee-78d8ce0ce330powershell
492command-and-controlT1219Remote Access Software3LogMeIn Files Detected Test on Windowsd03683ec-aae0-42f9-9b4c-534780e0f8e1powershell
493command-and-controlT1071.001Web Protocols1Malicious User Agents - Powershell81c13829-f6c9-45b8-85a6-053366d55297powershell
494command-and-controlT1071.001Web Protocols2Malicious User Agents - CMDdc3488b0-08c7-4fea-b585-905c83b48180command_prompt
495executionT1053.002At (Windows)1At.exe Scheduled task4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8command_prompt
496executionT1559.002Dynamic Data Exchange1Execute Commandsf592ba2a-e9e8-4d62-a459-ef63abd819fdmanual
497executionT1559.002Dynamic Data Exchange2Execute PowerShell script via Word DDE47c21fb6-085e-4b0d-b4d2-26d72c3830b3command_prompt
498executionT1559.002Dynamic Data Exchange3DDEAUTOcf91174c-4e74-414e-bec0-8d60a104d181manual
499executionT1204.002Malicious File1OSTap Style Macro Execution8bebc690-18c7-4549-bc98-210f7019efffpowershell
500executionT1204.002Malicious File2OSTap Payload Download3f3af983-118a-4fa1-85d3-ba4daa739d80command_prompt
501executionT1204.002Malicious File3Maldoc choice flags command execution0330a5d2-a45a-4272-a9ee-e364411c4b18powershell
502executionT1204.002Malicious File4OSTAP JS versionadd560ef-20d6-4011-a937-2c340f930911powershell
503executionT1204.002Malicious File5Office launching .bat file from AppData9215ea92-1ded-41b7-9cd6-79f9a78397aapowershell
504executionT1204.002Malicious File6Excel 4 Macro4ea1fc97-8a46-4b4e-ba48-af43d2a98052powershell
505executionT1106Native API1Execution through API - CreateProcess99be2089-c52d-4a4a-b5c3-261ee42c8b62command_prompt
506executionT1059.001PowerShell1Mimikatzf3132740-55bc-48c4-bcc0-758a459cd027command_prompt
507executionT1059.001PowerShell2Run BloodHound from local diska21bb23e-e677-4ee7-af90-6931b57b6350powershell
508executionT1059.001PowerShell3Run Bloodhound from Memory using Download Cradlebf8c1441-4674-4dab-8e4e-39d93d08f9b7powershell
509executionT1059.001PowerShell4Obfuscation Tests4297c41a-8168-4138-972d-01f3ee92c804powershell
510executionT1059.001PowerShell5Mimikatz - Cradlecraft PsSendKeysaf1800cf-9f9d-4fd1-a709-14b1e6de020dpowershell
511executionT1059.001PowerShell6Invoke-AppPathBypass06a220b6-7e29-4bd8-9d07-5b4d86742372command_prompt
512executionT1059.001PowerShell7Powershell MsXml COM object - with prompt388a7340-dbc1-4c9d-8e59-b75ad8c6d5dacommand_prompt
513executionT1059.001PowerShell8Powershell XML requests4396927f-e503-427b-b023-31049b9b09a6command_prompt
514executionT1059.001PowerShell9Powershell invoke mshta.exe download8a2ad40b-12c7-4b25-8521-2737b0a415afcommand_prompt
515executionT1059.001PowerShell10Powershell Invoke-DownloadCradlecc50fa2a-a4be-42af-a88f-e347ba0bf4d7manual
516executionT1059.001PowerShell11PowerShell Fileless Script Executionfa050f5e-bc75-4230-af73-b6fd7852cd73powershell
517executionT1059.001PowerShell12PowerShell Downgrade Attack9148e7c4-9356-420e-a416-e896e9c0f73epowershell
518executionT1059.001PowerShell13NTFS Alternate Data Stream Access8e5c5532-1181-4c1d-bb79-b3a9f5dbd680powershell
519executionT1059.001PowerShell14PowerShell Session Creation and Use7c1acec2-78fa-4305-a3e0-db2a54cddecdpowershell
520executionT1059.001PowerShell15ATHPowerShellCommandLineParameter -Command parameter variations686a9785-f99b-41d4-90df-66ed515f81d7powershell
521executionT1059.001PowerShell16ATHPowerShellCommandLineParameter -Command parameter variations with encoded arguments1c0a870f-dc74-49cf-9afc-eccc45e58790powershell
522executionT1059.001PowerShell17ATHPowerShellCommandLineParameter -EncodedCommand parameter variations86a43bad-12e3-4e85-b97c-4d5cf25b95c3powershell
523executionT1059.001PowerShell18ATHPowerShellCommandLineParameter -EncodedCommand parameter variations with encoded arguments0d181431-ddf3-4826-8055-2dbf63ae848bpowershell
524executionT1053.005Scheduled Task1Scheduled Task Startup Scriptfec27f65-db86-4c2d-b66c-61945aee87c2command_prompt
525executionT1053.005Scheduled Task2Scheduled task Local42f53695-ad4a-4546-abb6-7d837f644a71command_prompt
526executionT1053.005Scheduled Task3Scheduled task Remote2e5eac3e-327b-4a88-a0c0-c4057039a8ddcommand_prompt
527executionT1053.005Scheduled Task4Powershell Cmdlet Scheduled Taskaf9fd58f-c4ac-4bf2-a9ba-224b71ff25fdpowershell
528executionT1053.005Scheduled Task5Task Scheduler via VBAecd3fa21-7792-41a2-8726-2c5c673414d3powershell
529executionT1569.002Service Execution1Execute a Command as a Service2382dee2-a75f-49aa-9378-f52df6ed3fb1command_prompt
530executionT1569.002Service Execution2Use PsExec to execute a command on a remote host873106b7-cfed-454b-8680-fa9f6400431ccommand_prompt
531executionT1059.005Visual Basic1Visual Basic script execution to gather local computer information1620de42-160a-4fe5-bbaf-d3fef0181ce9powershell
532executionT1059.005Visual Basic2Encoded VBS code executione8209d5f-e42d-45e6-9c2f-633ac4f1eefapowershell
533executionT1059.005Visual Basic3Extract Memory via VBA8faff437-a114-4547-9a60-749652a03df6powershell
534executionT1059.003Windows Command Shell1Create and Execute Batch Script9e8894c0-50bd-4525-a96c-d4ac78ece388powershell
535executionT1047Windows Management Instrumentation1WMI Reconnaissance Usersc107778c-dcf5-47c5-af2e-1d058a3df3eacommand_prompt
536executionT1047Windows Management Instrumentation2WMI Reconnaissance Processes5750aa16-0e59-4410-8b9a-8a47ca2788e2command_prompt
537executionT1047Windows Management Instrumentation3WMI Reconnaissance Software718aebaa-d0e0-471a-8241-c5afa69c7414command_prompt
538executionT1047Windows Management Instrumentation4WMI Reconnaissance List Remote Services0fd48ef7-d890-4e93-a533-f7dedd5191d3command_prompt
539executionT1047Windows Management Instrumentation5WMI Execute Local Processb3bdfc91-b33e-4c6d-a5c8-d64bee0276b3command_prompt
540executionT1047Windows Management Instrumentation6WMI Execute Remote Process9c8ef159-c666-472f-9874-90c8d60d136bcommand_prompt
541exfiltrationT1020Automated Exfiltration1IcedID Botnet HTTP PUT9c780d3d-3a14-4278-8ee5-faaeb2ccfbe0powershell
542exfiltrationT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol2Exfiltration Over Alternative Protocol - ICMPdd4b4421-2e25-4593-90ae-7021947ad12epowershell
543lateral-movementT1021.003Distributed Component Object Model1PowerShell Lateral Movement using MMC206dc74eb1-c9d6-4c53-b3b5-6f50ae339673powershell
544lateral-movementT1550.002Pass the Hash1Mimikatz Pass the Hashec23cef9-27d9-46e4-a68d-6f75f7b86908command_prompt
545lateral-movementT1550.002Pass the Hash2crackmapexec Pass the Hasheb05b028-16c8-4ad8-adea-6f5b219da9a9command_prompt
546lateral-movementT1550.003Pass the Ticket1Mimikatz Kerberos Ticket Attackdbf38128-7ba7-4776-bedf-cc2eed432098command_prompt
547lateral-movementT1563.002RDP Hijacking1RDP hijackinga37ac520-b911-458e-8aed-c5f1576d9f46command_prompt
548lateral-movementT1021.001Remote Desktop Protocol1RDP to DomainController355d4632-8cb9-449d-91ce-b566d0253d3epowershell
549lateral-movementT1021.001Remote Desktop Protocol2RDP to Server7382a43e-f19c-46be-8f09-5c63af7d3e2bpowershell
550lateral-movementT1021.002SMB/Windows Admin Shares1Map admin share3386975b-367a-4fbb-9d77-4dcf3639ffd3command_prompt
551lateral-movementT1021.002SMB/Windows Admin Shares2Map Admin Share PowerShell514e9cd7-9207-4882-98b1-c8f791bae3c5powershell
552lateral-movementT1021.002SMB/Windows Admin Shares3Copy and Execute File with PsExec0eb03d41-79e4-4393-8e57-6344856be1cfcommand_prompt
553lateral-movementT1021.002SMB/Windows Admin Shares4Execute command writing output to local Admin Shared41aaab5-bdfe-431d-a3d5-c29e9136ff46command_prompt
554lateral-movementT1021.006Windows Remote Management1Enable Windows Remote Management9059e8de-3d7d-4954-a322-46161880b9cfpowershell
555lateral-movementT1021.006Windows Remote Management2Invoke-Command5295bd61-bd7e-4744-9d52-85962a4cf2d6powershell
556lateral-movementT1021.006Windows Remote Management3WinRM Access with Evil-WinRMefe86d95-44c4-4509-ae42-7bfd9d1f5b3dpowershell
557initial-accessT1078.001Default Accounts1Enable Guest account with RDP capability and admin priviliges99747561-ed8d-47f2-9c91-1e5fde1ed6e0command_prompt
558initial-accessT1133External Remote Services1Running Chrome VPN Extensions via the Registry 2 vpn extension4c8db261-a58b-42a6-a866-0a294deedde4powershell
559initial-accessT1078.003Local Accounts1Create local account with admin priviligesa524ce99-86de-4db6-b4f9-e08f35a47a15command_prompt
560initial-accessT1566.001Spearphishing Attachment1Download Phishing Attachment - VBScript114ccff9-ae6d-4547-9ead-4cd69f687306powershell
561initial-accessT1566.001Spearphishing Attachment2Word spawned a command shell and used an IP address in the command linecbb6799a-425c-4f83-9194-5447a909d67fpowershell