@@ -10,7 +10,6 @@ defense-evasion,T1088,5,Bypass UAC using ComputerDefaults (PowerShell)
1010defense-evasion,T1088,6,Bypass UAC by Mocking Trusted Directories
1111defense-evasion,T1191,1,CMSTP Executing Remote Scriptlet
1212defense-evasion,T1191,2,CMSTP Executing UAC Bypass
13- defense-evasion,T1500,1,Compile After Delivery using csc.exe
1413defense-evasion,T1223,1,Compiled HTML Help Local Payload
1514defense-evasion,T1223,2,Compiled HTML Help Remote Payload
1615defense-evasion,T1090,2,portproxy reg key
@@ -90,7 +89,6 @@ defense-evasion,T1126,2,Remove Network Share
9089defense-evasion,T1126,3,Remove Network Share PowerShell
9190defense-evasion,T1027,2,Execute base64-encoded PowerShell
9291defense-evasion,T1027,3,Execute base64-encoded PowerShell from Windows Registry
93- defense-evasion,T1502,1,Parent PID Spoofing using PowerShell
9492defense-evasion,T1093,1,Process Hollowing using PowerShell
9593defense-evasion,T1055,1,Process Injection via mavinject.exe
9694defense-evasion,T1055,4,Process Injection via C#
@@ -147,8 +145,6 @@ privilege-escalation,T1183,1,IFEO Add Debugger
147145privilege-escalation,T1183,2,IFEO Global Flags
148146privilege-escalation,T1050,1,Service Installation CMD
149147privilege-escalation,T1050,2,Service Installation PowerShell
150- privilege-escalation,T1502,1,Parent PID Spoofing using PowerShell
151- privilege-escalation,T1504,1,Append malicious start-process cmdlet
152148privilege-escalation,T1055,1,Process Injection via mavinject.exe
153149privilege-escalation,T1055,4,Process Injection via C#
154150privilege-escalation,T1055,5,svchost writing a file to a UNC path
@@ -193,7 +189,6 @@ persistence,T1128,1,Netsh Helper DLL Registration
193189persistence,T1050,1,Service Installation CMD
194190persistence,T1050,2,Service Installation PowerShell
195191persistence,T1137,1,DDEAUTO
196- persistence,T1504,1,Append malicious start-process cmdlet
197192persistence,T1060,1,Reg Key Run
198193persistence,T1060,2,Reg Key RunOnce
199194persistence,T1060,3,PowerShell Registry RunOnce
@@ -203,7 +198,6 @@ persistence,T1053,3,Scheduled task Remote
203198persistence,T1053,4,Powershell Cmdlet Scheduled Task
204199persistence,T1180,1,Set Arbitrary Binary as Screensaver
205200persistence,T1101,1,Modify SSP configuration in registry
206- persistence,T1505,1,Install MS Exchange Transport Agent Persistence
207201persistence,T1058,1,Service Registry Permissions Weakness
208202persistence,T1023,1,Shortcut Modification
209203persistence,T1023,2,Create shortcut to cmd in startup folders
@@ -212,28 +206,13 @@ persistence,T1084,1,Persistence via WMI Event Subscription
212206persistence,T1004,1,Winlogon Shell Key Persistence - PowerShell
213207persistence,T1004,2,Winlogon Userinit Key Persistence - PowerShell
214208persistence,T1004,3,Winlogon Notify Key Logon Persistence - PowerShell
215- impact,T1485,1,Windows - Overwrite file with Sysinternals SDelete
216- impact,T1490,1,Windows - Delete Volume Shadow Copies
217- impact,T1490,2,Windows - Delete Volume Shadow Copies via WMI
218- impact,T1490,3,Windows - Delete Windows Backup Catalog
219- impact,T1490,4,Windows - Disable Windows Recovery Console Repair
220- impact,T1490,5,Windows - Delete Volume Shadow Copies via WMI with PowerShell
221- impact,T1490,6,Windows - Delete Backup Files
222- impact,T1489,1,Windows - Stop service using Service Controller
223- impact,T1489,2,Windows - Stop service using net.exe
224- impact,T1489,3,Windows - Stop service by killing process
225- impact,T1529,1,Shutdown System - Windows
226- impact,T1529,2,Restart System - Windows
227209discovery,T1087,8,Enumerate all accounts
228210discovery,T1087,9,Enumerate all accounts via PowerShell
229211discovery,T1087,10,Enumerate logged on users
230212discovery,T1087,11,Enumerate logged on users via PowerShell
231213discovery,T1010,1,List Process Main Windows - C# .NET
232214discovery,T1217,4,List Google Chrome Bookmarks on Windows with powershell
233215discovery,T1217,5,List Google Chrome Bookmarks on Windows with command prompt
234- discovery,T1482,1,Windows - Discover domain trusts with dsquery
235- discovery,T1482,2,Windows - Discover domain trusts with nltest
236- discovery,T1482,3,Powershell enumerate domains and forests
237216discovery,T1083,1,File and Directory Discovery (cmd.exe)
238217discovery,T1083,2,File and Directory Discovery (PowerShell)
239218discovery,T1135,2,Network Share Discovery command prompt
@@ -258,8 +237,6 @@ discovery,T1063,1,Security Software Discovery
258237discovery,T1063,2,Security Software Discovery - powershell
259238discovery,T1063,4,Security Software Discovery - Sysmon Service
260239discovery,T1063,5,Security Software Discovery - AV Discovery via WMI
261- discovery,T1518,1,Find and Display Internet Explorer Browser Version
262- discovery,T1518,2,Applications Installed
263240discovery,T1082,1,System Information Discovery
264241discovery,T1082,6,Hostname Discovery (Windows)
265242discovery,T1082,8,Windows MachineGUID Discovery
0 commit comments