txt2stix 1.1.8__py3-none-any.whl → 1.1.9__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. txt2stix/includes/extractions/ai/config.yaml +20 -0
  2. txt2stix/includes/extractions/lookup/config.yaml +33 -15
  3. txt2stix/includes/lookups/_generate_lookups.py +39 -30
  4. txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
  5. txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
  6. txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
  7. txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
  8. txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
  9. txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
  10. txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
  11. txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
  12. txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
  13. txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
  14. txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
  15. txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
  16. txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
  17. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
  18. txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
  19. txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
  20. txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
  21. txt2stix/includes/tests/test_cases.yaml +8 -0
  22. txt2stix/retriever.py +6 -0
  23. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/METADATA +1 -1
  24. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/RECORD +27 -26
  25. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
  26. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
  27. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
  28. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
  29. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
  30. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
  31. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/WHEEL +0 -0
  32. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/entry_points.txt +0 -0
  33. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/licenses/LICENSE +0 -0
@@ -0,0 +1,4295 @@
1
+ Revert Cloud Instance
2
+ Modify Cloud Resource Hierarchy
3
+ PowerShell Profile
4
+ Malvertising
5
+ Weaken Encryption
6
+ Active Setup
7
+ Transport Agent
8
+ AppleScript
9
+ Reduce Key Space
10
+ Indirect Command Execution
11
+ Backup Software Discovery
12
+ Systemctl
13
+ Implant Internal Image
14
+ Threat Intel Vendors
15
+ Rogue Domain Controller
16
+ Defacement
17
+ Unused/Unsupported Cloud Regions
18
+ DHCP Spoofing
19
+ Bind Mounts
20
+ Trap
21
+ Bandwidth Hijacking
22
+ Poisoned Pipeline Execution
23
+ Right-to-Left Override
24
+ Container Administration Command
25
+ Disable Crypto Hardware
26
+ Build Image on Host
27
+ DNS Calculation
28
+ Cloud Storage Object Discovery
29
+ Exfiltration to Code Repository
30
+ Cloud Service Hijacking
31
+ Selective Exclusion
32
+ Internal Spearphishing
33
+ Services File Permissions Weakness
34
+ Remote Access Hardware
35
+ Email Bombing
36
+ Cloud Application Integration
37
+ Python Startup Hooks
38
+ Relocate Malware
39
+ Screensaver
40
+ Hardware Additions
41
+ Exclusive Control
42
+ Email Spoofing
43
+ Space after Filename
44
+ Re-opened Applications
45
+ Serverless Execution
46
+ Create Snapshot
47
+ Firmware Corruption
48
+ Network Device Authentication
49
+ FrostyGoop Incident
50
+ ShadowRay
51
+ SPACEHOP Activity
52
+ Leviathan Australian Intrusions
53
+ Network Intrusion Prevention
54
+ Vulnerability Scanning
55
+ Limit Access to Resource Over Network
56
+ Remote Data Storage
57
+ Filter Network Traffic
58
+ Restrict Web-Based Content
59
+ Limit Software Installation
60
+ Application Developer Guidance
61
+ Limit Hardware Installation
62
+ User Training
63
+ User Account Control
64
+ Operating System Configuration
65
+ Data Backup
66
+ Execution Prevention
67
+ Credential Access Protection
68
+ Code Signing
69
+ Environment Variable Permissions
70
+ Data Loss Prevention
71
+ Privileged Process Integrity
72
+ Do Not Mitigate
73
+ Pre-compromise
74
+ SSL/TLS Inspection
75
+ Boot Integrity
76
+ Out-of-Band Communications Channel
77
+ Network Segmentation
78
+ Threat Intelligence Program
79
+ Password Policies
80
+ Behavior Prevention on Endpoint
81
+ User Account Management
82
+ Restrict File and Directory Permissions
83
+ Privileged Account Management
84
+ Restrict Registry Permissions
85
+ Antivirus/Antimalware
86
+ Multi-factor Authentication
87
+ Software Configuration
88
+ Application Isolation and Sandboxing
89
+ Audit
90
+ Exploit Protection
91
+ Active Directory Configuration
92
+ Update Software
93
+ Restrict Library Loading
94
+ Disable or Remove Feature or Program
95
+ Account Use Policies
96
+ Encrypt Sensitive Information
97
+ NEODYMIUM
98
+ GCMAN
99
+ AppleJeus
100
+ Moafee
101
+ Gallmaker
102
+ ZIRCONIUM
103
+ Rocke
104
+ Winter Vivern
105
+ Poseidon Group
106
+ RedCurl
107
+ APT-C-23
108
+ Stealth Falcon
109
+ Silent Librarian
110
+ Equation
111
+ Darkhotel
112
+ Scarlet Mimic
113
+ FIN4
114
+ BlackOasis
115
+ HDoor
116
+ TrickBot
117
+ cd00r
118
+ PowerDuke
119
+ EKANS
120
+ BLINDINGCAN
121
+ Ninja
122
+ Pikabot
123
+ Wiarp
124
+ RCSession
125
+ Spark
126
+ QuietSieve
127
+ SynAck
128
+ Bumblebee
129
+ MURKYTOP
130
+ AcidRain
131
+ GRIFFON
132
+ Exaramel for Windows
133
+ Amadey
134
+ JumbledPath
135
+ RDFSNIFFER
136
+ NICECURL
137
+ Proxysvc
138
+ Orz
139
+ Torisma
140
+ NOKKI
141
+ yty
142
+ Backdoor.Oldrea
143
+ DOGCALL
144
+ Stuxnet
145
+ Downdelph
146
+ RotaJakiro
147
+ AvosLocker
148
+ SEASHARPEE
149
+ Get2
150
+ POWRUNER
151
+ KOPILUWAK
152
+ RobbinHood
153
+ MEDUSA
154
+ VersaMem
155
+ Power Loader
156
+ TDTESS
157
+ Chinoxy
158
+ SharpStage
159
+ PAKLOG
160
+ COATHANGER
161
+ Sardonic
162
+ Smoke Loader
163
+ HALFBAKED
164
+ WindTail
165
+ Misdat
166
+ reGeorg
167
+ FLIPSIDE
168
+ Linux Rabbit
169
+ adbupd
170
+ Emissary
171
+ Exaramel for Linux
172
+ KEYMARBLE
173
+ BUBBLEWRAP
174
+ HAWKBALL
175
+ TAMECAT
176
+ PS1
177
+ Ursnif
178
+ CASTLETAP
179
+ ThreatNeedle
180
+ RansomHub
181
+ ZLib
182
+ RedLeaves
183
+ Miner-C
184
+ POWERSOURCE
185
+ LITTLELAMB.WOOLTEA
186
+ Felismus
187
+ Zeus Panda
188
+ GeminiDuke
189
+ Havoc
190
+ CARROTBAT
191
+ Matryoshka
192
+ FrameworkPOS
193
+ GravityRAT
194
+ WEBC2
195
+ Prestige
196
+ InvisibleFerret
197
+ Bankshot
198
+ SharpDisco
199
+ StrongPity
200
+ HAPPYWORK
201
+ xCaon
202
+ PLAINTEE
203
+ Pony
204
+ WinMM
205
+ Nebulae
206
+ Janicab
207
+ AuditCred
208
+ Lurid
209
+ TONESHELL
210
+ UPSTYLE
211
+ Kasidet
212
+ Hannotog
213
+ OceanSalt
214
+ Playcrypt
215
+ Brave Prince
216
+ Medusa Ransomware
217
+ RainyDay
218
+ Ecipekac
219
+ AppleSeed
220
+ BUSHWALK
221
+ macOS.OSAMiner
222
+ LOWBALL
223
+ NETWIRE
224
+ TinyTurla
225
+ PyDCrypt
226
+ J-magic
227
+ PowerExchange
228
+ BOOKWORM
229
+ HyperStack
230
+ iKitten
231
+ HAMMERTOSS
232
+ OLDBAIT
233
+ Bad Rabbit
234
+ CosmicDuke
235
+ EvilGrab
236
+ EnvyScout
237
+ SslMM
238
+ STATICPLUGIN
239
+ IMAPLoader
240
+ GreyEnergy
241
+ Gomir
242
+ Aria-body
243
+ Emotet
244
+ SNUGRIDE
245
+ Olympic Destroyer
246
+ BOLDMOVE
247
+ Crimson
248
+ Tomiris
249
+ TEARDROP
250
+ DUSTTRAP
251
+ Turian
252
+ THINCRUST
253
+ BADHATCH
254
+ Machete
255
+ PowerLess
256
+ Action RAT
257
+ Avenger
258
+ DUSTPAN
259
+ Prikormka
260
+ PUBLOAD
261
+ Gootloader
262
+ PingPull
263
+ WellMess
264
+ Dacls
265
+ DropBook
266
+ Woody RAT
267
+ Mafalda
268
+ KARAE
269
+ Squirrelwaffle
270
+ ELMER
271
+ CANONSTAGER
272
+ PolyglotDuke
273
+ HexEval Loader
274
+ Umbreon
275
+ AuTo Stealer
276
+ ShrinkLocker
277
+ Hildegard
278
+ Agent.btz
279
+ SLOWDRIFT
280
+ SHUTTERSPEED
281
+ SombRAT
282
+ ODAgent
283
+ BlackByte 2.0 Ransomware
284
+ FlawedGrace
285
+ FLASHFLOOD
286
+ FlawedAmmyy
287
+ Snip3
288
+ FYAnti
289
+ Rifdoor
290
+ SUGARUSH
291
+ LoFiSe
292
+ HOPLIGHT
293
+ Cuckoo Stealer
294
+ GuLoader
295
+ MobileOrder
296
+ WastedLocker
297
+ RegDuke
298
+ ProLock
299
+ Moneybird
300
+ InvisiMole
301
+ CLAIMLOADER
302
+ P.A.S. Webshell
303
+ QUIETEXIT
304
+ Naid
305
+ Apostle
306
+ Volgmer
307
+ WINERACK
308
+ WhisperGate
309
+ FruitFly
310
+ ZeroT
311
+ Keydnap
312
+ AcidPour
313
+ RDAT
314
+ Hacking Team UEFI Rootkit
315
+ Skidmap
316
+ Okrum
317
+ TRANSLATEXT
318
+ Regin
319
+ Bonadan
320
+ Line Dancer
321
+ SamSam
322
+ Neoichor
323
+ Conti
324
+ Raspberry Robin
325
+ Mispadu
326
+ RemoteCMD
327
+ Megazord
328
+ Diavol
329
+ REPTILE
330
+ Raindrop
331
+ Doki
332
+ TEXTMATE
333
+ Siloscape
334
+ BlackCat
335
+ Fysbis
336
+ IcedID
337
+ VERMIN
338
+ UBoatRAT
339
+ Nightdoor
340
+ MarkiRAT
341
+ PowerShower
342
+ Kazuar
343
+ NavRAT
344
+ DarkComet
345
+ NETEAGLE
346
+ POORAIM
347
+ HUI Loader
348
+ CHIMNEYSWEEP
349
+ Ragnar Locker
350
+ FatDuke
351
+ Lucifer
352
+ BlackEnergy
353
+ zwShell
354
+ Zeroaccess
355
+ GLASSTOKEN
356
+ DCSrv
357
+ DRATzarus
358
+ BOOSTWRITE
359
+ Rising Sun
360
+ ASPXSpy
361
+ NotPetya
362
+ ShimRat
363
+ Chrommme
364
+ BADFLICK
365
+ ObliqueRAT
366
+ SHOTPUT
367
+ Avaddon
368
+ Conficker
369
+ SocGholish
370
+ Flagpro
371
+ Hi-Zor
372
+ SpicyOmelette
373
+ XAgentOSX
374
+ Green Lambert
375
+ China Chopper
376
+ SnappyTCP
377
+ CALENDAR
378
+ LockerGoga
379
+ LightSpy
380
+ Chaos
381
+ ISMInjector
382
+ PUNCHBUGGY
383
+ GoldMax
384
+ HELLOKITTY
385
+ CostaBricks
386
+ Cheerscrypt
387
+ LIGHTWIRE
388
+ KeyBoy
389
+ POSHSPY
390
+ MiniDuke
391
+ HyperBro
392
+ Anchor
393
+ Line Runner
394
+ Pteranodon
395
+ DarkTortilla
396
+ BeaverTail
397
+ ROKRAT
398
+ CORESHELL
399
+ RunningRAT
400
+ VPNFilter
401
+ SplatDropper
402
+ Babuk
403
+ Exbyte
404
+ DarkWatchman
405
+ Dyre
406
+ BlackMould
407
+ Javali
408
+ PACEMAKER
409
+ LunarLoader
410
+ BBSRAT
411
+ PlugX
412
+ Reaver
413
+ Bisonal
414
+ MultiLayer Wiper
415
+ S-Type
416
+ Lumma Stealer
417
+ SeaDuke
418
+ BS2005
419
+ DustySky
420
+ Duqu
421
+ Truvasys
422
+ Remsec
423
+ Industroyer2
424
+ Sykipot
425
+ Explosive
426
+ Xbash
427
+ Rover
428
+ Epic
429
+ LightNeuron
430
+ Peppy
431
+ KEYPLUG
432
+ Cuba
433
+ DEATHRANSOM
434
+ Clambling
435
+ Akira
436
+ DarkGate
437
+ Mongall
438
+ NanHaiShu
439
+ LockBit 3.0
440
+ SVCReady
441
+ ThiefQuest
442
+ FoggyWeb
443
+ NGLite
444
+ Carbanak
445
+ XTunnel
446
+ Hydraq
447
+ SHARPSTATS
448
+ Ferocious
449
+ HOMEFRY
450
+ CreepyDrive
451
+ Caterpillar WebShell
452
+ Netwalker
453
+ Elise
454
+ USBferry
455
+ WannaCry
456
+ Gazer
457
+ TSCookie
458
+ Latrodectus
459
+ Saint Bot
460
+ Pay2Key
461
+ Chaes
462
+ Briba
463
+ CharmPower
464
+ TYPEFRAME
465
+ 3PARA RAT
466
+ Bundlore
467
+ P8RAT
468
+ VIRTUALPIE
469
+ EVILNUM
470
+ KOMPROGO
471
+ SMOKEDHAM
472
+ Mori
473
+ QUADAGENT
474
+ Sagerunex
475
+ TAINTEDSCRIBE
476
+ Sys10
477
+ pngdowner
478
+ Royal
479
+ BendyBear
480
+ Uroburos
481
+ Metamorfo
482
+ Spica
483
+ Embargo
484
+ Trojan.Karagany
485
+ Bandook
486
+ PipeMon
487
+ SYNful Knock
488
+ MagicRAT
489
+ TINYTYPHON
490
+ KONNI
491
+ T9000
492
+ Winnti for Linux
493
+ RAPIDPULSE
494
+ gh0st RAT
495
+ Shamoon
496
+ Skeleton Key
497
+ DnsSystem
498
+ MoleNet
499
+ CORALDECK
500
+ JHUHUGIT
501
+ SPACESHIP
502
+ BLUELIGHT
503
+ KGH_SPY
504
+ down_new
505
+ Ixeshe
506
+ Micropsia
507
+ Kerrdown
508
+ RARSTONE
509
+ RedLine Stealer
510
+ VBShower
511
+ BPFDoor
512
+ Black Basta
513
+ ZeroCleare
514
+ Catchamas
515
+ StoneDrill
516
+ OopsIE
517
+ 4H RAT
518
+ RogueRobin
519
+ Attor
520
+ DealersChoice
521
+ SQLRat
522
+ LitePower
523
+ MegaCortex
524
+ StreamEx
525
+ BoxCaon
526
+ NightClub
527
+ Crutch
528
+ Akira _v2
529
+ SDBbot
530
+ Mosquito
531
+ RTM
532
+ QUIETCANARY
533
+ Derusbi
534
+ BlackByte Ransomware
535
+ SodaMaster
536
+ Hikit
537
+ StrelaStealer
538
+ Grandoreiro
539
+ WellMail
540
+ LiteDuke
541
+ Starloader
542
+ Sakula
543
+ VaporRage
544
+ RawPOS
545
+ Sibot
546
+ ZxxZ
547
+ Tarrask
548
+ GoBear
549
+ WINDSHIELD
550
+ Drovorub
551
+ Shark
552
+ Bazar
553
+ PULSECHECK
554
+ Kobalos
555
+ BadPatch
556
+ MESSAGETAP
557
+ RATANKBA
558
+ SUGARDUMP
559
+ XLoader
560
+ SOUNDBITE
561
+ BADCALL
562
+ hcdLoader
563
+ Nidiran
564
+ MoonWind
565
+ CorKLOG
566
+ Ryuk
567
+ Cryptoistic
568
+ HermeticWiper
569
+ ABK
570
+ Pysa
571
+ Wiper
572
+ Final1stspy
573
+ MgBot
574
+ ccf32
575
+ Kapeka
576
+ LockBit 2.0
577
+ OilCheck
578
+ Zebrocy
579
+ Pandora
580
+ FinFisher
581
+ SpeakUp
582
+ LunarMail
583
+ WARPWIRE
584
+ CrossRAT
585
+ OwaAuth
586
+ Cadelspy
587
+ Cobalt Strike
588
+ SampleCheck5000
589
+ SUNBURST
590
+ EvilBunny
591
+ Wingbird
592
+ Cobian RAT
593
+ HotCroissant
594
+ ServHelper
595
+ JCry
596
+ Unknown Logger
597
+ REvil
598
+ RIPTIDE
599
+ Valak
600
+ Samurai
601
+ PinchDuke
602
+ Milan
603
+ USBStealer
604
+ OSX_OCEANLOTUS.D
605
+ OilBooster
606
+ CCBkdr
607
+ OnionDuke
608
+ Taidoor
609
+ SHIPSHAPE
610
+ Cherry Picker
611
+ SUPERNOVA
612
+ P2P ZeuS
613
+ Kivars
614
+ CaddyWiper
615
+ Cyclops Blink
616
+ Seasalt
617
+ NativeZone
618
+ NanoCore
619
+ TajMahal
620
+ PLEAD
621
+ Raccoon Stealer
622
+ IPsec Helper
623
+ Daserf
624
+ GoldFinder
625
+ Carbon
626
+ LoJax
627
+ Cardinal RAT
628
+ DanBot
629
+ BISCUIT
630
+ Calisto
631
+ Solar
632
+ Pisloader
633
+ GoldenSpy
634
+ Gold Dragon
635
+ RGDoor
636
+ Ramsay
637
+ Neo-reGeorg
638
+ FakeM
639
+ Carberp
640
+ FRAMESTING
641
+ HARDRAIN
642
+ NKAbuse
643
+ Pillowmint
644
+ TrailBlazer
645
+ Revenge RAT
646
+ MacMa
647
+ FunnyDream
648
+ ROADSWEEP
649
+ SUNSPOT
650
+ MOPSLED
651
+ More_eggs
652
+ SysUpdate
653
+ TinyZBot
654
+ OutSteel
655
+ BackConfig
656
+ PowGoop
657
+ Kwampirs
658
+ Nerex
659
+ BoomBox
660
+ DEADEYE
661
+ PUNCHTRACK
662
+ Proton
663
+ Trojan.Mebromi
664
+ Mango
665
+ InnaputRAT
666
+ WIREFIRE
667
+ Kessel
668
+ GrimAgent
669
+ LookBack
670
+ STEADYPULSE
671
+ Clop
672
+ NetTraveler
673
+ YAHOYAH
674
+ Lokibot
675
+ CallMe
676
+ ROCKBOOT
677
+ CloudDuke
678
+ Egregor
679
+ PoetRAT
680
+ CHOPSTICK
681
+ StealBit
682
+ FELIXROOT
683
+ ZxShell
684
+ RIFLESPINE
685
+ SLIGHTPULSE
686
+ NDiskMonitor
687
+ CoinTicker
688
+ DDKONG
689
+ Penquin
690
+ BabyShark
691
+ Cannon
692
+ CreepySnail
693
+ build_downer
694
+ Melcoz
695
+ Winnti for Windows
696
+ PowerPunch
697
+ BONDUPDATER
698
+ Troll Stealer
699
+ BLACKCOFFEE
700
+ BFG Agonizer
701
+ Ebury
702
+ Kinsing
703
+ PITSTOP
704
+ Meteor
705
+ njRAT
706
+ ZIPLINE
707
+ Maze
708
+ BOOTRASH
709
+ HIUPAN
710
+ ComRAT
711
+ TURNEDUP
712
+ ChChes
713
+ PowerStallion
714
+ ANDROMEDA
715
+ Manjusaka
716
+ IceApple
717
+ JPIN
718
+ VIRTUALPITA
719
+ metaMain
720
+ SideTwist
721
+ KOCTOPUS
722
+ MechaFlounder
723
+ Psylo
724
+ Heyoka Backdoor
725
+ HTTPBrowser
726
+ Mis-Type
727
+ LunarWeb
728
+ XCSSET
729
+ Disco
730
+ Dipsind
731
+ Octopus
732
+ KillDisk
733
+ Qilin
734
+ AppleJeus
735
+ SoreFang
736
+ STARWHALE
737
+ MirageFox
738
+ Industroyer
739
+ DownPaper
740
+ Socksbot
741
+ Pcexter
742
+ HIDEDRV
743
+ CozyCar
744
+ Kevin
745
+ Agent Tesla
746
+ Pasam
747
+ httpclient
748
+ POWERSTATS
749
+ POWERTON
750
+ StarProxy
751
+ ECCENTRICBANDWAGON
752
+ BADNEWS
753
+ Linfo
754
+ Goopy
755
+ ShadowPad
756
+ Remexi
757
+ Astaroth
758
+ QakBot
759
+ SYSCON
760
+ CookieMiner
761
+ Hancitor
762
+ Gelsemium
763
+ jRAT
764
+ Helminth
765
+ Dridex
766
+ BBK
767
+ Komplex
768
+ OSX/Shlayer
769
+ Denis
770
+ INC Ransomware
771
+ DEADWOOD
772
+ GLOOXMAIL
773
+ Dok
774
+ SplatCloak
775
+ Waterbear
776
+ FIVEHANDS
777
+ Comnie
778
+ Vasport
779
+ AutoIt backdoor
780
+ JSS Loader
781
+ PHOREAL
782
+ OSInfo
783
+ MacSpy
784
+ Lizar
785
+ Dtrack
786
+ H1N1
787
+ SLOWPULSE
788
+ Seth-Locker
789
+ LoudMiner
790
+ Azorult
791
+ BitPaymer
792
+ BACKSPACE
793
+ Zox
794
+ UPPERCUT
795
+ ADVSTORESHELL
796
+ StrifeWater
797
+ Mivast
798
+ HiddenWasp
799
+ WarzoneRAT
800
+ Net Crawler
801
+ SLOTHFULMEDIA
802
+ FALLCHILL
803
+ XORIndex Loader
804
+ Small Sieve
805
+ Flame
806
+ HermeticWizard
807
+ Net
808
+ RemoteUtilities
809
+ Covenant
810
+ NPPSPY
811
+ BloodHound
812
+ certutil
813
+ at
814
+ UACMe
815
+ ShimRatReporter
816
+ Sliver
817
+ SILENTTRINITY
818
+ PowerSploit
819
+ Pacu
820
+ Windows Credential Editor
821
+ Impacket
822
+ ipconfig
823
+ AADInternals
824
+ Tasklist
825
+ Lslsass
826
+ Arp
827
+ spwebmember
828
+ Empire
829
+ ifconfig
830
+ FRP
831
+ dsquery
832
+ PcShare
833
+ RawDisk
834
+ netstat
835
+ PoshC2
836
+ Fgdump
837
+ xCmd
838
+ CSPY Downloader
839
+ Rclone
840
+ MimiPenguin
841
+ netsh
842
+ CARROTBALL
843
+ BITSAdmin
844
+ meek
845
+ AsyncRAT
846
+ ROADTools
847
+ Brute Ratel C4
848
+ Peirates
849
+ Remcos
850
+ Systeminfo
851
+ Out1
852
+ ConnectWise
853
+ attrib
854
+ Imminent Monitor
855
+ Ruler
856
+ Forfiles
857
+ Winexe
858
+ MCMD
859
+ Nltest
860
+ MailSniper
861
+ sqlmap
862
+ pwdump
863
+ Responder
864
+ Pass-The-Hash Toolkit
865
+ Donut
866
+ Mimikatz
867
+ gsecdump
868
+ IronNetInjector
869
+ nbtstat
870
+ Invoke-PSImage
871
+ NBTscan
872
+ LaZagne
873
+ Ping
874
+ cmd
875
+ route
876
+ esentutl
877
+ CrackMapExec
878
+ Koadic
879
+ schtasks
880
+ Cachedump
881
+ Expand
882
+ Pupy
883
+ Reg
884
+ ftp
885
+ Mythic
886
+ HTRAN
887
+ SDelete
888
+ QuasarRAT
889
+ cipher.exe
890
+ Rubeus
891
+ Tor
892
+ AdFind
893
+ Wevtutil
894
+ Havij
895
+ Quick Assist
896
+ PsExec
897
+ Analytic 0110
898
+ Analytic 0613
899
+ Analytic 0769
900
+ Analytic 0068
901
+ Analytic 0887
902
+ Analytic 0061
903
+ Analytic 1421
904
+ Analytic 0295
905
+ Analytic 0534
906
+ Analytic 0010
907
+ Analytic 0491
908
+ Analytic 1104
909
+ Analytic 1112
910
+ Analytic 1532
911
+ Analytic 0417
912
+ Analytic 0726
913
+ Analytic 0469
914
+ Analytic 0053
915
+ Analytic 0860
916
+ Analytic 0876
917
+ Analytic 0595
918
+ Analytic 0656
919
+ Analytic 1063
920
+ Analytic 1079
921
+ Analytic 1503
922
+ Analytic 0036
923
+ Analytic 0856
924
+ Analytic 0736
925
+ Analytic 0296
926
+ Analytic 1531
927
+ Analytic 1115
928
+ Analytic 0530
929
+ Analytic 1365
930
+ Analytic 0008
931
+ Analytic 1488
932
+ Analytic 1473
933
+ Analytic 0867
934
+ Analytic 1061
935
+ Analytic 0679
936
+ Analytic 0809
937
+ Analytic 0771
938
+ Analytic 1209
939
+ Analytic 0478
940
+ Analytic 1251
941
+ Analytic 0447
942
+ Analytic 1007
943
+ Analytic 0075
944
+ Analytic 0032
945
+ Analytic 0121
946
+ Analytic 1339
947
+ Analytic 0437
948
+ Analytic 1987
949
+ Analytic 0699
950
+ Analytic 1187
951
+ Analytic 1291
952
+ Analytic 0917
953
+ Analytic 0797
954
+ Analytic 0224
955
+ Analytic 0834
956
+ Analytic 1427
957
+ Analytic 1976
958
+ Analytic 1619
959
+ Analytic 1247
960
+ Analytic 1132
961
+ Analytic 0817
962
+ Analytic 0145
963
+ Analytic 0308
964
+ Analytic 0211
965
+ Analytic 1037
966
+ Analytic 1023
967
+ Analytic 1448
968
+ Analytic 1090
969
+ Analytic 0997
970
+ Analytic 1143
971
+ Analytic 0775
972
+ Analytic 0928
973
+ Analytic 1965
974
+ Analytic 1244
975
+ Analytic 1253
976
+ Analytic 1089
977
+ Analytic 0256
978
+ Analytic 1628
979
+ Analytic 2030
980
+ Analytic 0142
981
+ Analytic 0192
982
+ Analytic 0184
983
+ Analytic 0046
984
+ Analytic 1211
985
+ Analytic 0732
986
+ Analytic 1074
987
+ Analytic 0459
988
+ Analytic 1165
989
+ Analytic 0496
990
+ Analytic 0892
991
+ Analytic 0134
992
+ Analytic 0871
993
+ Analytic 0147
994
+ Analytic 0244
995
+ Analytic 1204
996
+ Analytic 1357
997
+ Analytic 1566
998
+ Analytic 0925
999
+ Analytic 1995
1000
+ Analytic 0872
1001
+ Analytic 0969
1002
+ Analytic 0197
1003
+ Analytic 0665
1004
+ Analytic 0239
1005
+ Analytic 1229
1006
+ Analytic 0034
1007
+ Analytic 0266
1008
+ Analytic 0467
1009
+ Analytic 1156
1010
+ Analytic 1434
1011
+ Analytic 1567
1012
+ Analytic 0023
1013
+ Analytic 1460
1014
+ Analytic 0868
1015
+ Analytic 0312
1016
+ Analytic 0791
1017
+ Analytic 1499
1018
+ Analytic 1093
1019
+ Analytic 1179
1020
+ Analytic 0027
1021
+ Analytic 0805
1022
+ Analytic 2006
1023
+ Analytic 0209
1024
+ Analytic 1207
1025
+ Analytic 1176
1026
+ Analytic 1960
1027
+ Analytic 1621
1028
+ Analytic 0884
1029
+ Analytic 0103
1030
+ Analytic 0396
1031
+ Analytic 0466
1032
+ Analytic 0904
1033
+ Analytic 0081
1034
+ Analytic 0602
1035
+ Analytic 0549
1036
+ Analytic 1119
1037
+ Analytic 0130
1038
+ Analytic 1125
1039
+ Analytic 1134
1040
+ Analytic 0975
1041
+ Analytic 0410
1042
+ Analytic 0982
1043
+ Analytic 1193
1044
+ Analytic 0203
1045
+ Analytic 0372
1046
+ Analytic 1020
1047
+ Analytic 0178
1048
+ Analytic 1085
1049
+ Analytic 0841
1050
+ Analytic 0458
1051
+ Analytic 0794
1052
+ Analytic 0959
1053
+ Analytic 0004
1054
+ Analytic 1420
1055
+ Analytic 0934
1056
+ Analytic 1525
1057
+ Analytic 0705
1058
+ Analytic 0837
1059
+ Analytic 1094
1060
+ Analytic 0164
1061
+ Analytic 0284
1062
+ Analytic 1522
1063
+ Analytic 1216
1064
+ Analytic 1017
1065
+ Analytic 0676
1066
+ Analytic 0195
1067
+ Analytic 1006
1068
+ Analytic 0367
1069
+ Analytic 0765
1070
+ Analytic 1435
1071
+ Analytic 1455
1072
+ Analytic 0045
1073
+ Analytic 1170
1074
+ Analytic 0568
1075
+ Analytic 0219
1076
+ Analytic 0394
1077
+ Analytic 2026
1078
+ Analytic 1031
1079
+ Analytic 1514
1080
+ Analytic 0329
1081
+ Analytic 1437
1082
+ Analytic 0855
1083
+ Analytic 0223
1084
+ Analytic 0782
1085
+ Analytic 0963
1086
+ Analytic 1641
1087
+ Analytic 1417
1088
+ Analytic 0731
1089
+ Analytic 0833
1090
+ Analytic 1595
1091
+ Analytic 0652
1092
+ Analytic 1940
1093
+ Analytic 1356
1094
+ Analytic 0342
1095
+ Analytic 1129
1096
+ Analytic 0236
1097
+ Analytic 0107
1098
+ Analytic 0688
1099
+ Analytic 1468
1100
+ Analytic 1215
1101
+ Analytic 1158
1102
+ Analytic 0537
1103
+ Analytic 0377
1104
+ Analytic 1623
1105
+ Analytic 1969
1106
+ Analytic 1269
1107
+ Analytic 0348
1108
+ Analytic 0057
1109
+ Analytic 1640
1110
+ Analytic 1036
1111
+ Analytic 1066
1112
+ Analytic 1629
1113
+ Analytic 1611
1114
+ Analytic 1554
1115
+ Analytic 0716
1116
+ Analytic 1526
1117
+ Analytic 1360
1118
+ Analytic 1064
1119
+ Analytic 0150
1120
+ Analytic 0596
1121
+ Analytic 0101
1122
+ Analytic 0079
1123
+ Analytic 1281
1124
+ Analytic 1008
1125
+ Analytic 1555
1126
+ Analytic 0521
1127
+ Analytic 1305
1128
+ Analytic 1971
1129
+ Analytic 0409
1130
+ Analytic 1396
1131
+ Analytic 0386
1132
+ Analytic 0605
1133
+ Analytic 0378
1134
+ Analytic 1326
1135
+ Analytic 0291
1136
+ Analytic 1478
1137
+ Analytic 0980
1138
+ Analytic 1416
1139
+ Analytic 0958
1140
+ Analytic 0941
1141
+ Analytic 1183
1142
+ Analytic 1565
1143
+ Analytic 0698
1144
+ Analytic 0795
1145
+ Analytic 0263
1146
+ Analytic 1333
1147
+ Analytic 1592
1148
+ Analytic 0842
1149
+ Analytic 0500
1150
+ Analytic 1948
1151
+ Analytic 1025
1152
+ Analytic 0557
1153
+ Analytic 1106
1154
+ Analytic 2007
1155
+ Analytic 1268
1156
+ Analytic 0968
1157
+ Analytic 1027
1158
+ Analytic 1944
1159
+ Analytic 1021
1160
+ Analytic 0838
1161
+ Analytic 0609
1162
+ Analytic 1614
1163
+ Analytic 0517
1164
+ Analytic 1963
1165
+ Analytic 1265
1166
+ Analytic 0796
1167
+ Analytic 0432
1168
+ Analytic 0879
1169
+ Analytic 1051
1170
+ Analytic 0322
1171
+ Analytic 0735
1172
+ Analytic 1418
1173
+ Analytic 1224
1174
+ Analytic 1138
1175
+ Analytic 0822
1176
+ Analytic 1154
1177
+ Analytic 0227
1178
+ Analytic 0486
1179
+ Analytic 0100
1180
+ Analytic 0727
1181
+ Analytic 0672
1182
+ Analytic 1249
1183
+ Analytic 1497
1184
+ Analytic 1058
1185
+ Analytic 1407
1186
+ Analytic 0196
1187
+ Analytic 0988
1188
+ Analytic 1048
1189
+ Analytic 1059
1190
+ Analytic 0650
1191
+ Analytic 0531
1192
+ Analytic 1245
1193
+ Analytic 0351
1194
+ Analytic 0763
1195
+ Analytic 2032
1196
+ Analytic 0190
1197
+ Analytic 1465
1198
+ Analytic 2004
1199
+ Analytic 0889
1200
+ Analytic 1556
1201
+ Analytic 1422
1202
+ Analytic 0070
1203
+ Analytic 1084
1204
+ Analytic 0913
1205
+ Analytic 1030
1206
+ Analytic 1337
1207
+ Analytic 0397
1208
+ Analytic 0632
1209
+ Analytic 1200
1210
+ Analytic 0304
1211
+ Analytic 0451
1212
+ Analytic 1385
1213
+ Analytic 0337
1214
+ Analytic 0473
1215
+ Analytic 1201
1216
+ Analytic 0540
1217
+ Analytic 1308
1218
+ Analytic 0571
1219
+ Analytic 1146
1220
+ Analytic 0999
1221
+ Analytic 0493
1222
+ Analytic 0514
1223
+ Analytic 0512
1224
+ Analytic 0433
1225
+ Analytic 0626
1226
+ Analytic 0163
1227
+ Analytic 1449
1228
+ Analytic 2005
1229
+ Analytic 1107
1230
+ Analytic 0522
1231
+ Analytic 0758
1232
+ Analytic 0851
1233
+ Analytic 1533
1234
+ Analytic 0939
1235
+ Analytic 1537
1236
+ Analytic 1312
1237
+ Analytic 0083
1238
+ Analytic 1287
1239
+ Analytic 0484
1240
+ Analytic 0545
1241
+ Analytic 0873
1242
+ Analytic 1552
1243
+ Analytic 0584
1244
+ Analytic 0877
1245
+ Analytic 1351
1246
+ Analytic 0042
1247
+ Analytic 0501
1248
+ Analytic 0112
1249
+ Analytic 0356
1250
+ Analytic 1114
1251
+ Analytic 1009
1252
+ Analytic 0314
1253
+ Analytic 1174
1254
+ Analytic 0664
1255
+ Analytic 0819
1256
+ Analytic 0202
1257
+ Analytic 0499
1258
+ Analytic 1214
1259
+ Analytic 0015
1260
+ Analytic 0330
1261
+ Analytic 0407
1262
+ Analytic 0013
1263
+ Analytic 0259
1264
+ Analytic 1399
1265
+ Analytic 0544
1266
+ Analytic 1604
1267
+ Analytic 1026
1268
+ Analytic 0814
1269
+ Analytic 0827
1270
+ Analytic 0686
1271
+ Analytic 0750
1272
+ Analytic 0518
1273
+ Analytic 0770
1274
+ Analytic 0710
1275
+ Analytic 1272
1276
+ Analytic 0149
1277
+ Analytic 0039
1278
+ Analytic 0498
1279
+ Analytic 1517
1280
+ Analytic 1485
1281
+ Analytic 0082
1282
+ Analytic 1246
1283
+ Analytic 1166
1284
+ Analytic 0090
1285
+ Analytic 0141
1286
+ Analytic 0069
1287
+ Analytic 1162
1288
+ Analytic 0956
1289
+ Analytic 0294
1290
+ Analytic 1338
1291
+ Analytic 1570
1292
+ Analytic 0439
1293
+ Analytic 1501
1294
+ Analytic 0371
1295
+ Analytic 0078
1296
+ Analytic 0966
1297
+ Analytic 1203
1298
+ Analytic 1580
1299
+ Analytic 0408
1300
+ Analytic 0049
1301
+ Analytic 1352
1302
+ Analytic 1002
1303
+ Analytic 1217
1304
+ Analytic 1319
1305
+ Analytic 0477
1306
+ Analytic 0844
1307
+ Analytic 0623
1308
+ Analytic 0547
1309
+ Analytic 1494
1310
+ Analytic 1610
1311
+ Analytic 1317
1312
+ Analytic 0170
1313
+ Analytic 0620
1314
+ Analytic 0938
1315
+ Analytic 0059
1316
+ Analytic 0132
1317
+ Analytic 1429
1318
+ Analytic 0604
1319
+ Analytic 0313
1320
+ Analytic 1937
1321
+ Analytic 1442
1322
+ Analytic 1364
1323
+ Analytic 0216
1324
+ Analytic 0067
1325
+ Analytic 0418
1326
+ Analytic 1103
1327
+ Analytic 1381
1328
+ Analytic 0824
1329
+ Analytic 1952
1330
+ Analytic 1088
1331
+ Analytic 0429
1332
+ Analytic 0362
1333
+ Analytic 0399
1334
+ Analytic 1157
1335
+ Analytic 0228
1336
+ Analytic 1500
1337
+ Analytic 1186
1338
+ Analytic 1378
1339
+ Analytic 1065
1340
+ Analytic 0030
1341
+ Analytic 0678
1342
+ Analytic 0171
1343
+ Analytic 0807
1344
+ Analytic 0003
1345
+ Analytic 1992
1346
+ Analytic 0542
1347
+ Analytic 0733
1348
+ Analytic 1300
1349
+ Analytic 0494
1350
+ Analytic 1359
1351
+ Analytic 1213
1352
+ Analytic 0395
1353
+ Analytic 0180
1354
+ Analytic 1151
1355
+ Analytic 1404
1356
+ Analytic 1457
1357
+ Analytic 1121
1358
+ Analytic 0757
1359
+ Analytic 0972
1360
+ Analytic 2012
1361
+ Analytic 0124
1362
+ Analytic 0128
1363
+ Analytic 0315
1364
+ Analytic 0567
1365
+ Analytic 1959
1366
+ Analytic 0556
1367
+ Analytic 0900
1368
+ Analytic 1042
1369
+ Analytic 1123
1370
+ Analytic 0208
1371
+ Analytic 0708
1372
+ Analytic 1052
1373
+ Analytic 0381
1374
+ Analytic 0776
1375
+ Analytic 1991
1376
+ Analytic 1410
1377
+ Analytic 0526
1378
+ Analytic 1195
1379
+ Analytic 2008
1380
+ Analytic 1966
1381
+ Analytic 1254
1382
+ Analytic 0520
1383
+ Analytic 1208
1384
+ Analytic 1289
1385
+ Analytic 0577
1386
+ Analytic 0572
1387
+ Analytic 1142
1388
+ Analytic 1636
1389
+ Analytic 1490
1390
+ Analytic 1237
1391
+ Analytic 1415
1392
+ Analytic 1344
1393
+ Analytic 0985
1394
+ Analytic 0191
1395
+ Analytic 0587
1396
+ Analytic 1256
1397
+ Analytic 1325
1398
+ Analytic 1626
1399
+ Analytic 1349
1400
+ Analytic 0155
1401
+ Analytic 0539
1402
+ Analytic 1355
1403
+ Analytic 0306
1404
+ Analytic 0553
1405
+ Analytic 1970
1406
+ Analytic 0250
1407
+ Analytic 0085
1408
+ Analytic 1450
1409
+ Analytic 0965
1410
+ Analytic 1221
1411
+ Analytic 1155
1412
+ Analytic 1583
1413
+ Analytic 1301
1414
+ Analytic 1430
1415
+ Analytic 0038
1416
+ Analytic 1113
1417
+ Analytic 1267
1418
+ Analytic 0799
1419
+ Analytic 0374
1420
+ Analytic 0444
1421
+ Analytic 1152
1422
+ Analytic 1569
1423
+ Analytic 0280
1424
+ Analytic 0440
1425
+ Analytic 1949
1426
+ Analytic 1979
1427
+ Analytic 0597
1428
+ Analytic 0364
1429
+ Analytic 1126
1430
+ Analytic 0747
1431
+ Analytic 0691
1432
+ Analytic 0878
1433
+ Analytic 0694
1434
+ Analytic 0031
1435
+ Analytic 0702
1436
+ Analytic 0911
1437
+ Analytic 0354
1438
+ Analytic 0701
1439
+ Analytic 0193
1440
+ Analytic 1014
1441
+ Analytic 1986
1442
+ Analytic 1549
1443
+ Analytic 0343
1444
+ Analytic 0636
1445
+ Analytic 1994
1446
+ Analytic 1235
1447
+ Analytic 1389
1448
+ Analytic 0787
1449
+ Analytic 0091
1450
+ Analytic 0953
1451
+ Analytic 1330
1452
+ Analytic 0749
1453
+ Analytic 1956
1454
+ Analytic 0108
1455
+ Analytic 1309
1456
+ Analytic 1292
1457
+ Analytic 1321
1458
+ Analytic 0973
1459
+ Analytic 1071
1460
+ Analytic 0457
1461
+ Analytic 0237
1462
+ Analytic 0703
1463
+ Analytic 0403
1464
+ Analytic 1572
1465
+ Analytic 0629
1466
+ Analytic 0785
1467
+ Analytic 2002
1468
+ Analytic 0324
1469
+ Analytic 1320
1470
+ Analytic 0136
1471
+ Analytic 0054
1472
+ Analytic 1538
1473
+ Analytic 0056
1474
+ Analytic 1521
1475
+ Analytic 1578
1476
+ Analytic 1083
1477
+ Analytic 1411
1478
+ Analytic 0402
1479
+ Analytic 1523
1480
+ Analytic 1431
1481
+ Analytic 1573
1482
+ Analytic 0828
1483
+ Analytic 0902
1484
+ Analytic 1548
1485
+ Analytic 0639
1486
+ Analytic 1034
1487
+ Analytic 1401
1488
+ Analytic 0680
1489
+ Analytic 0697
1490
+ Analytic 1452
1491
+ Analytic 0996
1492
+ Analytic 1000
1493
+ Analytic 0783
1494
+ Analytic 1529
1495
+ Analytic 1466
1496
+ Analytic 0272
1497
+ Analytic 0630
1498
+ Analytic 0127
1499
+ Analytic 0936
1500
+ Analytic 1510
1501
+ Analytic 0158
1502
+ Analytic 0253
1503
+ Analytic 0724
1504
+ Analytic 1322
1505
+ Analytic 0167
1506
+ Analytic 2000
1507
+ Analytic 1982
1508
+ Analytic 0508
1509
+ Analytic 1383
1510
+ Analytic 1199
1511
+ Analytic 1491
1512
+ Analytic 0829
1513
+ Analytic 1560
1514
+ Analytic 1519
1515
+ Analytic 0606
1516
+ Analytic 1953
1517
+ Analytic 0113
1518
+ Analytic 0790
1519
+ Analytic 0865
1520
+ Analytic 0647
1521
+ Analytic 1210
1522
+ Analytic 0174
1523
+ Analytic 0102
1524
+ Analytic 0096
1525
+ Analytic 1117
1526
+ Analytic 0275
1527
+ Analytic 1161
1528
+ Analytic 0214
1529
+ Analytic 1189
1530
+ Analytic 0648
1531
+ Analytic 1181
1532
+ Analytic 0515
1533
+ Analytic 0480
1534
+ Analytic 0325
1535
+ Analytic 0619
1536
+ Analytic 1484
1537
+ Analytic 0475
1538
+ Analytic 0122
1539
+ Analytic 1222
1540
+ Analytic 0213
1541
+ Analytic 0187
1542
+ Analytic 1182
1543
+ Analytic 0443
1544
+ Analytic 0820
1545
+ Analytic 1942
1546
+ Analytic 0268
1547
+ Analytic 0419
1548
+ Analytic 0793
1549
+ Analytic 1588
1550
+ Analytic 0502
1551
+ Analytic 1602
1552
+ Analytic 0254
1553
+ Analytic 0420
1554
+ Analytic 1372
1555
+ Analytic 0690
1556
+ Analytic 0286
1557
+ Analytic 1615
1558
+ Analytic 1060
1559
+ Analytic 0384
1560
+ Analytic 1467
1561
+ Analytic 0413
1562
+ Analytic 1406
1563
+ Analytic 0111
1564
+ Analytic 0151
1565
+ Analytic 1534
1566
+ Analytic 1379
1567
+ Analytic 0993
1568
+ Analytic 0188
1569
+ Analytic 1092
1570
+ Analytic 0347
1571
+ Analytic 1336
1572
+ Analytic 0981
1573
+ Analytic 1506
1574
+ Analytic 0586
1575
+ Analytic 1078
1576
+ Analytic 0874
1577
+ Analytic 0510
1578
+ Analytic 0077
1579
+ Analytic 0234
1580
+ Analytic 1001
1581
+ Analytic 1581
1582
+ Analytic 0578
1583
+ Analytic 0427
1584
+ Analytic 0983
1585
+ Analytic 1400
1586
+ Analytic 1240
1587
+ Analytic 0503
1588
+ Analytic 1520
1589
+ Analytic 0267
1590
+ Analytic 0580
1591
+ Analytic 1609
1592
+ Analytic 0185
1593
+ Analytic 1172
1594
+ Analytic 0139
1595
+ Analytic 0673
1596
+ Analytic 0095
1597
+ Analytic 0784
1598
+ Analytic 1062
1599
+ Analytic 0166
1600
+ Analytic 1019
1601
+ Analytic 0309
1602
+ Analytic 1627
1603
+ Analytic 1004
1604
+ Analytic 0905
1605
+ Analytic 0026
1606
+ Analytic 0978
1607
+ Analytic 0246
1608
+ Analytic 0780
1609
+ Analytic 1180
1610
+ Analytic 0668
1611
+ Analytic 0931
1612
+ Analytic 1472
1613
+ Analytic 1483
1614
+ Analytic 0162
1615
+ Analytic 1981
1616
+ Analytic 0779
1617
+ Analytic 0756
1618
+ Analytic 1553
1619
+ Analytic 1508
1620
+ Analytic 1316
1621
+ Analytic 1955
1622
+ Analytic 1462
1623
+ Analytic 0778
1624
+ Analytic 0210
1625
+ Analytic 0899
1626
+ Analytic 0319
1627
+ Analytic 0541
1628
+ Analytic 1108
1629
+ Analytic 1069
1630
+ Analytic 0160
1631
+ Analytic 1147
1632
+ Analytic 0349
1633
+ Analytic 1622
1634
+ Analytic 0616
1635
+ Analytic 0311
1636
+ Analytic 1574
1637
+ Analytic 1443
1638
+ Analytic 1413
1639
+ Analytic 1258
1640
+ Analytic 2024
1641
+ Analytic 0989
1642
+ Analytic 0358
1643
+ Analytic 0660
1644
+ Analytic 0198
1645
+ Analytic 1040
1646
+ Analytic 0560
1647
+ Analytic 0060
1648
+ Analytic 1477
1649
+ Analytic 1540
1650
+ Analytic 0094
1651
+ Analytic 1498
1652
+ Analytic 1219
1653
+ Analytic 0850
1654
+ Analytic 1335
1655
+ Analytic 1544
1656
+ Analytic 0199
1657
+ Analytic 0285
1658
+ Analytic 1190
1659
+ Analytic 0746
1660
+ Analytic 1033
1661
+ Analytic 1375
1662
+ Analytic 0608
1663
+ Analytic 0920
1664
+ Analytic 0916
1665
+ Analytic 1984
1666
+ Analytic 0248
1667
+ Analytic 0274
1668
+ Analytic 1487
1669
+ Analytic 1438
1670
+ Analytic 0846
1671
+ Analytic 0588
1672
+ Analytic 0400
1673
+ Analytic 1341
1674
+ Analytic 0535
1675
+ Analytic 1997
1676
+ Analytic 0897
1677
+ Analytic 0532
1678
+ Analytic 0944
1679
+ Analytic 0328
1680
+ Analytic 1424
1681
+ Analytic 1951
1682
+ Analytic 1591
1683
+ Analytic 0465
1684
+ Analytic 0225
1685
+ Analytic 1218
1686
+ Analytic 0137
1687
+ Analytic 1145
1688
+ Analytic 1277
1689
+ Analytic 0350
1690
+ Analytic 0093
1691
+ Analytic 0255
1692
+ Analytic 0086
1693
+ Analytic 0368
1694
+ Analytic 0269
1695
+ Analytic 1943
1696
+ Analytic 0554
1697
+ Analytic 0005
1698
+ Analytic 0591
1699
+ Analytic 1299
1700
+ Analytic 0825
1701
+ Analytic 0573
1702
+ Analytic 0281
1703
+ Analytic 0685
1704
+ Analytic 0200
1705
+ Analytic 0154
1706
+ Analytic 0722
1707
+ Analytic 0767
1708
+ Analytic 0316
1709
+ Analytic 2022
1710
+ Analytic 0813
1711
+ Analytic 0416
1712
+ Analytic 1559
1713
+ Analytic 1382
1714
+ Analytic 0288
1715
+ Analytic 0715
1716
+ Analytic 0812
1717
+ Analytic 1482
1718
+ Analytic 1637
1719
+ Analytic 1550
1720
+ Analytic 1290
1721
+ Analytic 0947
1722
+ Analytic 0382
1723
+ Analytic 1447
1724
+ Analytic 0635
1725
+ Analytic 0919
1726
+ Analytic 0471
1727
+ Analytic 1423
1728
+ Analytic 1252
1729
+ Analytic 0720
1730
+ Analytic 0229
1731
+ Analytic 0317
1732
+ Analytic 0411
1733
+ Analytic 0745
1734
+ Analytic 0243
1735
+ Analytic 1607
1736
+ Analytic 1118
1737
+ Analytic 0942
1738
+ Analytic 0910
1739
+ Analytic 0561
1740
+ Analytic 0144
1741
+ Analytic 1070
1742
+ Analytic 0283
1743
+ Analytic 1283
1744
+ Analytic 0682
1745
+ Analytic 1493
1746
+ Analytic 0657
1747
+ Analytic 1463
1748
+ Analytic 1471
1749
+ Analytic 0607
1750
+ Analytic 1492
1751
+ Analytic 1613
1752
+ Analytic 0479
1753
+ Analytic 0692
1754
+ Analytic 0847
1755
+ Analytic 0663
1756
+ Analytic 0485
1757
+ Analytic 1096
1758
+ Analytic 1131
1759
+ Analytic 0843
1760
+ Analytic 0373
1761
+ Analytic 1346
1762
+ Analytic 0895
1763
+ Analytic 0504
1764
+ Analytic 0040
1765
+ Analytic 0109
1766
+ Analytic 0334
1767
+ Analytic 0742
1768
+ Analytic 1255
1769
+ Analytic 0017
1770
+ Analytic 0689
1771
+ Analytic 0492
1772
+ Analytic 1160
1773
+ Analytic 0098
1774
+ Analytic 1496
1775
+ Analytic 0326
1776
+ Analytic 1177
1777
+ Analytic 1331
1778
+ Analytic 1010
1779
+ Analytic 0357
1780
+ Analytic 0428
1781
+ Analytic 0361
1782
+ Analytic 0194
1783
+ Analytic 0293
1784
+ Analytic 1486
1785
+ Analytic 0205
1786
+ Analytic 1369
1787
+ Analytic 0957
1788
+ Analytic 0857
1789
+ Analytic 1459
1790
+ Analytic 0454
1791
+ Analytic 0896
1792
+ Analytic 1551
1793
+ Analytic 0097
1794
+ Analytic 0880
1795
+ Analytic 0761
1796
+ Analytic 1585
1797
+ Analytic 0654
1798
+ Analytic 2018
1799
+ Analytic 0816
1800
+ Analytic 0182
1801
+ Analytic 0759
1802
+ Analytic 0072
1803
+ Analytic 2017
1804
+ Analytic 0687
1805
+ Analytic 0218
1806
+ Analytic 0287
1807
+ Analytic 1511
1808
+ Analytic 0548
1809
+ Analytic 0186
1810
+ Analytic 0115
1811
+ Analytic 0614
1812
+ Analytic 1968
1813
+ Analytic 1329
1814
+ Analytic 0450
1815
+ Analytic 1273
1816
+ Analytic 0627
1817
+ Analytic 0649
1818
+ Analytic 0426
1819
+ Analytic 1446
1820
+ Analytic 1297
1821
+ Analytic 0422
1822
+ Analytic 1120
1823
+ Analytic 0992
1824
+ Analytic 0412
1825
+ Analytic 0114
1826
+ Analytic 0231
1827
+ Analytic 1057
1828
+ Analytic 0265
1829
+ Analytic 0126
1830
+ Analytic 1288
1831
+ Analytic 0558
1832
+ Analytic 1476
1833
+ Analytic 1454
1834
+ Analytic 1436
1835
+ Analytic 0773
1836
+ Analytic 0006
1837
+ Analytic 1967
1838
+ Analytic 0345
1839
+ Analytic 1599
1840
+ Analytic 0552
1841
+ Analytic 0226
1842
+ Analytic 1168
1843
+ Analytic 0482
1844
+ Analytic 2013
1845
+ Analytic 0864
1846
+ Analytic 0575
1847
+ Analytic 0441
1848
+ Analytic 0063
1849
+ Analytic 1481
1850
+ Analytic 1055
1851
+ Analytic 1950
1852
+ Analytic 0393
1853
+ Analytic 1586
1854
+ Analytic 0143
1855
+ Analytic 1941
1856
+ Analytic 1635
1857
+ Analytic 0951
1858
+ Analytic 0675
1859
+ Analytic 1194
1860
+ Analytic 1386
1861
+ Analytic 0589
1862
+ Analytic 0832
1863
+ Analytic 0340
1864
+ Analytic 0389
1865
+ Analytic 1332
1866
+ Analytic 0513
1867
+ Analytic 0754
1868
+ Analytic 1512
1869
+ Analytic 1989
1870
+ Analytic 0806
1871
+ Analytic 0628
1872
+ Analytic 2003
1873
+ Analytic 0230
1874
+ Analytic 1035
1875
+ Analytic 0489
1876
+ Analytic 0264
1877
+ Analytic 1077
1878
+ Analytic 0401
1879
+ Analytic 0235
1880
+ Analytic 0962
1881
+ Analytic 0260
1882
+ Analytic 0743
1883
+ Analytic 1307
1884
+ Analytic 0601
1885
+ Analytic 0201
1886
+ Analytic 1280
1887
+ Analytic 0181
1888
+ Analytic 1271
1889
+ Analytic 0370
1890
+ Analytic 0802
1891
+ Analytic 0744
1892
+ Analytic 1479
1893
+ Analytic 1558
1894
+ Analytic 0363
1895
+ Analytic 1327
1896
+ Analytic 0599
1897
+ Analytic 0707
1898
+ Analytic 0387
1899
+ Analytic 0921
1900
+ Analytic 0051
1901
+ Analytic 1192
1902
+ Analytic 0505
1903
+ Analytic 0346
1904
+ Analytic 1225
1905
+ Analytic 0976
1906
+ Analytic 0748
1907
+ Analytic 0366
1908
+ Analytic 0908
1909
+ Analytic 0960
1910
+ Analytic 1405
1911
+ Analytic 1557
1912
+ Analytic 0468
1913
+ Analytic 2025
1914
+ Analytic 1603
1915
+ Analytic 1489
1916
+ Analytic 0594
1917
+ Analytic 0669
1918
+ Analytic 0025
1919
+ Analytic 1983
1920
+ Analytic 1148
1921
+ Analytic 0241
1922
+ Analytic 0421
1923
+ Analytic 1642
1924
+ Analytic 0024
1925
+ Analytic 1248
1926
+ Analytic 0667
1927
+ Analytic 0156
1928
+ Analytic 0979
1929
+ Analytic 1050
1930
+ Analytic 0625
1931
+ Analytic 0404
1932
+ Analytic 1263
1933
+ Analytic 0592
1934
+ Analytic 0804
1935
+ Analytic 0529
1936
+ Analytic 1475
1937
+ Analytic 0644
1938
+ Analytic 2027
1939
+ Analytic 1286
1940
+ Analytic 0998
1941
+ Analytic 0723
1942
+ Analytic 1067
1943
+ Analytic 1985
1944
+ Analytic 0543
1945
+ Analytic 1978
1946
+ Analytic 1368
1947
+ Analytic 0028
1948
+ Analytic 2010
1949
+ Analytic 1226
1950
+ Analytic 1631
1951
+ Analytic 0436
1952
+ Analytic 0945
1953
+ Analytic 0462
1954
+ Analytic 0700
1955
+ Analytic 0729
1956
+ Analytic 0658
1957
+ Analytic 0738
1958
+ Analytic 0434
1959
+ Analytic 0922
1960
+ Analytic 1408
1961
+ Analytic 1039
1962
+ Analytic 0923
1963
+ Analytic 0483
1964
+ Analytic 1575
1965
+ Analytic 1632
1966
+ Analytic 1576
1967
+ Analytic 1412
1968
+ Analytic 0138
1969
+ Analytic 0950
1970
+ Analytic 1403
1971
+ Analytic 1137
1972
+ Analytic 0859
1973
+ Analytic 1173
1974
+ Analytic 1542
1975
+ Analytic 1639
1976
+ Analytic 0940
1977
+ Analytic 0617
1978
+ Analytic 1150
1979
+ Analytic 1954
1980
+ Analytic 1605
1981
+ Analytic 0050
1982
+ Analytic 0618
1983
+ Analytic 1313
1984
+ Analytic 1432
1985
+ Analytic 0157
1986
+ Analytic 0064
1987
+ Analytic 1109
1988
+ Analytic 0022
1989
+ Analytic 1371
1990
+ Analytic 1171
1991
+ Analytic 0415
1992
+ Analytic 0633
1993
+ Analytic 2019
1994
+ Analytic 0088
1995
+ Analytic 2023
1996
+ Analytic 0021
1997
+ Analytic 0431
1998
+ Analytic 0576
1999
+ Analytic 0615
2000
+ Analytic 1303
2001
+ Analytic 0536
2002
+ Analytic 1298
2003
+ Analytic 1972
2004
+ Analytic 1425
2005
+ Analytic 1095
2006
+ Analytic 0258
2007
+ Analytic 1130
2008
+ Analytic 0551
2009
+ Analytic 0376
2010
+ Analytic 0810
2011
+ Analytic 0474
2012
+ Analytic 1279
2013
+ Analytic 1102
2014
+ Analytic 0435
2015
+ Analytic 1414
2016
+ Analytic 1212
2017
+ Analytic 1260
2018
+ Analytic 0380
2019
+ Analytic 0273
2020
+ Analytic 0751
2021
+ Analytic 0298
2022
+ Analytic 1005
2023
+ Analytic 1387
2024
+ Analytic 1296
2025
+ Analytic 1072
2026
+ Analytic 0220
2027
+ Analytic 1377
2028
+ Analytic 0772
2029
+ Analytic 0058
2030
+ Analytic 0222
2031
+ Analytic 1220
2032
+ Analytic 0257
2033
+ Analytic 1028
2034
+ Analytic 1388
2035
+ Analytic 0318
2036
+ Analytic 2016
2037
+ Analytic 0153
2038
+ Analytic 0881
2039
+ Analytic 1164
2040
+ Analytic 1024
2041
+ Analytic 1480
2042
+ Analytic 1315
2043
+ Analytic 1571
2044
+ Analytic 0331
2045
+ Analytic 0801
2046
+ Analytic 0741
2047
+ Analytic 1233
2048
+ Analytic 0894
2049
+ Analytic 0645
2050
+ Analytic 0948
2051
+ Analytic 0971
2052
+ Analytic 1285
2053
+ Analytic 0481
2054
+ Analytic 0335
2055
+ Analytic 0970
2056
+ Analytic 0176
2057
+ Analytic 1353
2058
+ Analytic 0538
2059
+ Analytic 1939
2060
+ Analytic 1099
2061
+ Analytic 0764
2062
+ Analytic 1546
2063
+ Analytic 1015
2064
+ Analytic 1433
2065
+ Analytic 1231
2066
+ Analytic 1587
2067
+ Analytic 1043
2068
+ Analytic 0161
2069
+ Analytic 1111
2070
+ Analytic 0177
2071
+ Analytic 1993
2072
+ Analytic 0967
2073
+ Analytic 1029
2074
+ Analytic 1239
2075
+ Analytic 1505
2076
+ Analytic 1998
2077
+ Analytic 0891
2078
+ Analytic 1451
2079
+ Analytic 0344
2080
+ Analytic 2031
2081
+ Analytic 0964
2082
+ Analytic 0424
2083
+ Analytic 0336
2084
+ Analytic 1167
2085
+ Analytic 0984
2086
+ Analytic 1105
2087
+ Analytic 0932
2088
+ Analytic 1958
2089
+ Analytic 1311
2090
+ Analytic 0455
2091
+ Analytic 1358
2092
+ Analytic 0379
2093
+ Analytic 0734
2094
+ Analytic 0339
2095
+ Analytic 0674
2096
+ Analytic 1380
2097
+ Analytic 1625
2098
+ Analytic 0175
2099
+ Analytic 1191
2100
+ Analytic 1419
2101
+ Analytic 0661
2102
+ Analytic 0084
2103
+ Analytic 1946
2104
+ Analytic 0129
2105
+ Analytic 0300
2106
+ Analytic 0961
2107
+ Analytic 0392
2108
+ Analytic 0011
2109
+ Analytic 0721
2110
+ Analytic 0603
2111
+ Analytic 1470
2112
+ Analytic 1278
2113
+ Analytic 0247
2114
+ Analytic 0875
2115
+ Analytic 0670
2116
+ Analytic 0798
2117
+ Analytic 0360
2118
+ Analytic 0523
2119
+ Analytic 0278
2120
+ Analytic 1495
2121
+ Analytic 0566
2122
+ Analytic 1439
2123
+ Analytic 0125
2124
+ Analytic 1041
2125
+ Analytic 0974
2126
+ Analytic 1596
2127
+ Analytic 0883
2128
+ Analytic 1964
2129
+ Analytic 1350
2130
+ Analytic 0148
2131
+ Analytic 0643
2132
+ Analytic 0425
2133
+ Analytic 1568
2134
+ Analytic 0800
2135
+ Analytic 0863
2136
+ Analytic 1579
2137
+ Analytic 2029
2138
+ Analytic 1324
2139
+ Analytic 1238
2140
+ Analytic 0585
2141
+ Analytic 0391
2142
+ Analytic 1561
2143
+ Analytic 0506
2144
+ Analytic 0087
2145
+ Analytic 0927
2146
+ Analytic 1242
2147
+ Analytic 0762
2148
+ Analytic 1230
2149
+ Analytic 1022
2150
+ Analytic 0681
2151
+ Analytic 0943
2152
+ Analytic 1366
2153
+ Analytic 1310
2154
+ Analytic 0994
2155
+ Analytic 0338
2156
+ Analytic 1980
2157
+ Analytic 1159
2158
+ Analytic 0310
2159
+ Analytic 0495
2160
+ Analytic 0826
2161
+ Analytic 0249
2162
+ Analytic 0696
2163
+ Analytic 0290
2164
+ Analytic 0624
2165
+ Analytic 0009
2166
+ Analytic 0179
2167
+ Analytic 1302
2168
+ Analytic 0926
2169
+ Analytic 1391
2170
+ Analytic 0173
2171
+ Analytic 1076
2172
+ Analytic 1638
2173
+ Analytic 1294
2174
+ Analytic 0456
2175
+ Analytic 0430
2176
+ Analytic 0666
2177
+ Analytic 0014
2178
+ Analytic 1370
2179
+ Analytic 1016
2180
+ Analytic 0929
2181
+ Analytic 0574
2182
+ Analytic 1594
2183
+ Analytic 0848
2184
+ Analytic 1044
2185
+ Analytic 1620
2186
+ Analytic 1169
2187
+ Analytic 0818
2188
+ Analytic 0152
2189
+ Analytic 1293
2190
+ Analytic 0089
2191
+ Analytic 1241
2192
+ Analytic 1202
2193
+ Analytic 1962
2194
+ Analytic 0232
2195
+ Analytic 0390
2196
+ Analytic 0383
2197
+ Analytic 1474
2198
+ Analytic 1097
2199
+ Analytic 1445
2200
+ Analytic 1100
2201
+ Analytic 1444
2202
+ Analytic 1056
2203
+ Analytic 1101
2204
+ Analytic 0525
2205
+ Analytic 0823
2206
+ Analytic 0463
2207
+ Analytic 0207
2208
+ Analytic 1243
2209
+ Analytic 0341
2210
+ Analytic 0037
2211
+ Analytic 1306
2212
+ Analytic 1227
2213
+ Analytic 0693
2214
+ Analytic 1340
2215
+ Analytic 1398
2216
+ Analytic 0016
2217
+ Analytic 0092
2218
+ Analytic 0131
2219
+ Analytic 0671
2220
+ Analytic 1197
2221
+ Analytic 0768
2222
+ Analytic 1617
2223
+ Analytic 1343
2224
+ Analytic 0786
2225
+ Analytic 0105
2226
+ Analytic 1441
2227
+ Analytic 1228
2228
+ Analytic 0684
2229
+ Analytic 1348
2230
+ Analytic 0369
2231
+ Analytic 1630
2232
+ Analytic 1081
2233
+ Analytic 0725
2234
+ Analytic 0189
2235
+ Analytic 0206
2236
+ Analytic 0907
2237
+ Analytic 1562
2238
+ Analytic 0080
2239
+ Analytic 0116
2240
+ Analytic 0414
2241
+ Analytic 0712
2242
+ Analytic 1149
2243
+ Analytic 1988
2244
+ Analytic 1961
2245
+ Analytic 0271
2246
+ Analytic 0590
2247
+ Analytic 0490
2248
+ Analytic 1047
2249
+ Analytic 0307
2250
+ Analytic 1284
2251
+ Analytic 0320
2252
+ Analytic 1259
2253
+ Analytic 0019
2254
+ Analytic 0918
2255
+ Analytic 0808
2256
+ Analytic 1354
2257
+ Analytic 0183
2258
+ Analytic 0169
2259
+ Analytic 1590
2260
+ Analytic 0472
2261
+ Analytic 1598
2262
+ Analytic 1624
2263
+ Analytic 0986
2264
+ Analytic 0861
2265
+ Analytic 2001
2266
+ Analytic 0204
2267
+ Analytic 0497
2268
+ Analytic 0683
2269
+ Analytic 1003
2270
+ Analytic 1395
2271
+ Analytic 1257
2272
+ Analytic 1616
2273
+ Analytic 0305
2274
+ Analytic 0562
2275
+ Analytic 0076
2276
+ Analytic 1276
2277
+ Analytic 0052
2278
+ Analytic 1122
2279
+ Analytic 2011
2280
+ Analytic 0739
2281
+ Analytic 0119
2282
+ Analytic 0924
2283
+ Analytic 0641
2284
+ Analytic 1323
2285
+ Analytic 0516
2286
+ Analytic 1282
2287
+ Analytic 1363
2288
+ Analytic 0251
2289
+ Analytic 0276
2290
+ Analytic 1012
2291
+ Analytic 0212
2292
+ Analytic 1938
2293
+ Analytic 2009
2294
+ Analytic 0789
2295
+ Analytic 0301
2296
+ Analytic 0839
2297
+ Analytic 1266
2298
+ Analytic 1342
2299
+ Analytic 0135
2300
+ Analytic 0662
2301
+ Analytic 0120
2302
+ Analytic 1545
2303
+ Analytic 1541
2304
+ Analytic 0546
2305
+ Analytic 0048
2306
+ Analytic 0885
2307
+ Analytic 0598
2308
+ Analytic 0507
2309
+ Analytic 0987
2310
+ Analytic 0470
2311
+ Analytic 0882
2312
+ Analytic 1144
2313
+ Analytic 1038
2314
+ Analytic 0718
2315
+ Analytic 1582
2316
+ Analytic 0869
2317
+ Analytic 0527
2318
+ Analytic 0261
2319
+ Analytic 0423
2320
+ Analytic 0890
2321
+ Analytic 1295
2322
+ Analytic 1530
2323
+ Analytic 0292
2324
+ Analytic 0849
2325
+ Analytic 0303
2326
+ Analytic 0033
2327
+ Analytic 0811
2328
+ Analytic 0583
2329
+ Analytic 1011
2330
+ Analytic 0906
2331
+ Analytic 0385
2332
+ Analytic 1513
2333
+ Analytic 1601
2334
+ Analytic 1223
2335
+ Analytic 2015
2336
+ Analytic 1509
2337
+ Analytic 1196
2338
+ Analytic 0104
2339
+ Analytic 1045
2340
+ Analytic 0352
2341
+ Analytic 1234
2342
+ Analytic 1139
2343
+ Analytic 1456
2344
+ Analytic 0912
2345
+ Analytic 0488
2346
+ Analytic 1608
2347
+ Analytic 0460
2348
+ Analytic 0133
2349
+ Analytic 1392
2350
+ Analytic 1153
2351
+ Analytic 0903
2352
+ Analytic 0323
2353
+ Analytic 1518
2354
+ Analytic 0438
2355
+ Analytic 0297
2356
+ Analytic 1618
2357
+ Analytic 0677
2358
+ Analytic 1390
2359
+ Analytic 0977
2360
+ Analytic 1232
2361
+ Analytic 1502
2362
+ Analytic 0029
2363
+ Analytic 0252
2364
+ Analytic 1367
2365
+ Analytic 0461
2366
+ Analytic 1393
2367
+ Analytic 0830
2368
+ Analytic 1328
2369
+ Analytic 0579
2370
+ Analytic 1250
2371
+ Analytic 0870
2372
+ Analytic 1597
2373
+ Analytic 2014
2374
+ Analytic 0245
2375
+ Analytic 1426
2376
+ Analytic 0704
2377
+ Analytic 0840
2378
+ Analytic 1593
2379
+ Analytic 2020
2380
+ Analytic 0570
2381
+ Analytic 0123
2382
+ Analytic 1275
2383
+ Analytic 1990
2384
+ Analytic 0655
2385
+ Analytic 0600
2386
+ Analytic 0634
2387
+ Analytic 1206
2388
+ Analytic 0240
2389
+ Analytic 1547
2390
+ Analytic 0071
2391
+ Analytic 0159
2392
+ Analytic 1091
2393
+ Analytic 0550
2394
+ Analytic 1973
2395
+ Analytic 0893
2396
+ Analytic 0146
2397
+ Analytic 1049
2398
+ Analytic 1314
2399
+ Analytic 1402
2400
+ Analytic 0788
2401
+ Analytic 0282
2402
+ Analytic 0221
2403
+ Analytic 1606
2404
+ Analytic 0737
2405
+ Analytic 0946
2406
+ Analytic 1643
2407
+ Analytic 1270
2408
+ Analytic 1198
2409
+ Analytic 1304
2410
+ Analytic 0711
2411
+ Analytic 0781
2412
+ Analytic 1977
2413
+ Analytic 1564
2414
+ Analytic 0990
2415
+ Analytic 0933
2416
+ Analytic 0406
2417
+ Analytic 0858
2418
+ Analytic 0476
2419
+ Analytic 0753
2420
+ Analytic 0528
2421
+ Analytic 1073
2422
+ Analytic 0740
2423
+ Analytic 1384
2424
+ Analytic 0565
2425
+ Analytic 0299
2426
+ Analytic 0555
2427
+ Analytic 0642
2428
+ Analytic 0821
2429
+ Analytic 0815
2430
+ Analytic 0106
2431
+ Analytic 1075
2432
+ Analytic 0898
2433
+ Analytic 1345
2434
+ Analytic 0446
2435
+ Analytic 2021
2436
+ Analytic 0610
2437
+ Analytic 0442
2438
+ Analytic 1535
2439
+ Analytic 0752
2440
+ Analytic 0835
2441
+ Analytic 0774
2442
+ Analytic 1128
2443
+ Analytic 1098
2444
+ Analytic 0949
2445
+ Analytic 1264
2446
+ Analytic 0935
2447
+ Analytic 0713
2448
+ Analytic 0375
2449
+ Analytic 0452
2450
+ Analytic 1184
2451
+ Analytic 1175
2452
+ Analytic 0242
2453
+ Analytic 0355
2454
+ Analytic 0862
2455
+ Analytic 1262
2456
+ Analytic 0792
2457
+ Analytic 0803
2458
+ Analytic 1947
2459
+ Analytic 1046
2460
+ Analytic 1974
2461
+ Analytic 0233
2462
+ Analytic 0937
2463
+ Analytic 0930
2464
+ Analytic 1374
2465
+ Analytic 0836
2466
+ Analytic 1612
2467
+ Analytic 0044
2468
+ Analytic 1110
2469
+ Analytic 0262
2470
+ Analytic 0353
2471
+ Analytic 1633
2472
+ Analytic 0564
2473
+ Analytic 0638
2474
+ Analytic 1397
2475
+ Analytic 0901
2476
+ Analytic 0995
2477
+ Analytic 0043
2478
+ Analytic 1116
2479
+ Analytic 0777
2480
+ Analytic 2028
2481
+ Analytic 0066
2482
+ Analytic 0852
2483
+ Analytic 0464
2484
+ Analytic 1394
2485
+ Analytic 0622
2486
+ Analytic 1318
2487
+ Analytic 0659
2488
+ Analytic 1464
2489
+ Analytic 1205
2490
+ Analytic 0055
2491
+ Analytic 0651
2492
+ Analytic 0954
2493
+ Analytic 0563
2494
+ Analytic 1600
2495
+ Analytic 1133
2496
+ Analytic 0007
2497
+ Analytic 1032
2498
+ Analytic 1536
2499
+ Analytic 0640
2500
+ Analytic 0611
2501
+ Analytic 1469
2502
+ Analytic 0730
2503
+ Analytic 0453
2504
+ Analytic 1975
2505
+ Analytic 0631
2506
+ Analytic 0238
2507
+ Analytic 0041
2508
+ Analytic 0118
2509
+ Analytic 1440
2510
+ Analytic 1507
2511
+ Analytic 0062
2512
+ Analytic 1163
2513
+ Analytic 1086
2514
+ Analytic 1458
2515
+ Analytic 1274
2516
+ Analytic 0766
2517
+ Analytic 0270
2518
+ Analytic 0333
2519
+ Analytic 1516
2520
+ Analytic 0653
2521
+ Analytic 1141
2522
+ Analytic 1082
2523
+ Analytic 0831
2524
+ Analytic 0012
2525
+ Analytic 0854
2526
+ Analytic 1453
2527
+ Analytic 0018
2528
+ Analytic 1053
2529
+ Analytic 1634
2530
+ Analytic 0559
2531
+ Analytic 1236
2532
+ Analytic 0289
2533
+ Analytic 0706
2534
+ Analytic 0002
2535
+ Analytic 1178
2536
+ Analytic 1188
2537
+ Analytic 0321
2538
+ Analytic 0695
2539
+ Analytic 0365
2540
+ Analytic 1018
2541
+ Analytic 0509
2542
+ Analytic 1362
2543
+ Analytic 0760
2544
+ Analytic 1347
2545
+ Analytic 0277
2546
+ Analytic 0637
2547
+ Analytic 1539
2548
+ Analytic 0853
2549
+ Analytic 1957
2550
+ Analytic 1068
2551
+ Analytic 1515
2552
+ Analytic 0065
2553
+ Analytic 0165
2554
+ Analytic 0646
2555
+ Analytic 0445
2556
+ Analytic 1361
2557
+ Analytic 0582
2558
+ Analytic 0073
2559
+ Analytic 1999
2560
+ Analytic 0581
2561
+ Analytic 1577
2562
+ Analytic 0388
2563
+ Analytic 0172
2564
+ Analytic 1135
2565
+ Analytic 0569
2566
+ Analytic 0359
2567
+ Analytic 0755
2568
+ Analytic 1373
2569
+ Analytic 0728
2570
+ Analytic 0001
2571
+ Analytic 0449
2572
+ Analytic 1524
2573
+ Analytic 1261
2574
+ Analytic 1136
2575
+ Analytic 0709
2576
+ Analytic 0914
2577
+ Analytic 0099
2578
+ Analytic 0533
2579
+ Analytic 0117
2580
+ Analytic 1087
2581
+ Analytic 1584
2582
+ Analytic 0621
2583
+ Analytic 0047
2584
+ Analytic 1054
2585
+ Analytic 0332
2586
+ Analytic 0519
2587
+ Analytic 0991
2588
+ Analytic 0487
2589
+ Analytic 0327
2590
+ Analytic 0279
2591
+ Analytic 1528
2592
+ Analytic 0593
2593
+ Analytic 0909
2594
+ Analytic 1334
2595
+ Analytic 0302
2596
+ Analytic 0524
2597
+ Analytic 1543
2598
+ Analytic 0035
2599
+ Analytic 0511
2600
+ Analytic 0952
2601
+ Analytic 0168
2602
+ Analytic 0020
2603
+ Analytic 1461
2604
+ Analytic 0888
2605
+ Analytic 1080
2606
+ Analytic 0215
2607
+ Analytic 0217
2608
+ Analytic 0398
2609
+ Analytic 0955
2610
+ Analytic 0448
2611
+ Analytic 1504
2612
+ Analytic 0612
2613
+ Analytic 0717
2614
+ Analytic 1376
2615
+ Analytic 0915
2616
+ Analytic 0405
2617
+ Analytic 1996
2618
+ Analytic 0140
2619
+ Analytic 1013
2620
+ Analytic 1140
2621
+ Analytic 1409
2622
+ Analytic 0714
2623
+ Analytic 1589
2624
+ Analytic 1124
2625
+ Analytic 0845
2626
+ Analytic 1127
2627
+ Analytic 0886
2628
+ Analytic 1945
2629
+ Analytic 1185
2630
+ Analytic 1428
2631
+ Analytic 0719
2632
+ Analytic 0866
2633
+ Analytic 1527
2634
+ Analytic 1563
2635
+ Analytic 0074
2636
+ Active Directory Credential Request
2637
+ WMI Creation
2638
+ Group Modification
2639
+ Image Modification
2640
+ Pod Enumeration
2641
+ Response Content
2642
+ Volume Metadata
2643
+ Response Metadata
2644
+ Windows Registry Key Deletion
2645
+ Instance Stop
2646
+ Malware Content
2647
+ Snapshot Deletion
2648
+ Network Connection Creation
2649
+ Process Access
2650
+ Active Directory Object Creation
2651
+ Certificate Registration
2652
+ File Access
2653
+ Kernel Module Load
2654
+ Instance Enumeration
2655
+ File Creation
2656
+ Active DNS
2657
+ Driver Load
2658
+ Network Traffic Content
2659
+ Logon Session Metadata
2660
+ Volume Deletion
2661
+ Process Creation
2662
+ Drive Creation
2663
+ Snapshot Creation
2664
+ Cloud Storage Modification
2665
+ Instance Modification
2666
+ Instance Metadata
2667
+ Cloud Storage Deletion
2668
+ Drive Modification
2669
+ Pod Creation
2670
+ Service Creation
2671
+ Cloud Storage Access
2672
+ Cloud Storage Creation
2673
+ Active Directory Object Modification
2674
+ Active Directory Object Access
2675
+ Web Credential Creation
2676
+ Container Start
2677
+ Process Termination
2678
+ File Metadata
2679
+ Service Modification
2680
+ Pod Modification
2681
+ Command Execution
2682
+ Drive Access
2683
+ Firewall Metadata
2684
+ Service Metadata
2685
+ Instance Deletion
2686
+ Scheduled Job Metadata
2687
+ Windows Registry Key Creation
2688
+ File Modification
2689
+ Host Status
2690
+ Image Deletion
2691
+ Snapshot Metadata
2692
+ Cloud Service Enumeration
2693
+ Group Metadata
2694
+ Group Enumeration
2695
+ Social Media
2696
+ Active Directory Object Deletion
2697
+ Container Enumeration
2698
+ Malware Metadata
2699
+ OS API Execution
2700
+ Application Log Content
2701
+ Logon Session Creation
2702
+ Script Execution
2703
+ Container Creation
2704
+ Network Traffic Flow
2705
+ User Account Authentication
2706
+ Image Creation
2707
+ Cloud Service Metadata
2708
+ Image Metadata
2709
+ Instance Creation
2710
+ User Account Metadata
2711
+ Named Pipe Metadata
2712
+ Firmware Modification
2713
+ Firewall Enumeration
2714
+ Module Load
2715
+ Firewall Disable
2716
+ Passive DNS
2717
+ User Account Modification
2718
+ Firewall Rule Modification
2719
+ Volume Modification
2720
+ Process Modification
2721
+ User Account Deletion
2722
+ Windows Registry Key Modification
2723
+ Volume Creation
2724
+ User Account Creation
2725
+ Cloud Storage Metadata
2726
+ Cloud Service Modification
2727
+ File Deletion
2728
+ Cloud Service Disable
2729
+ Volume Enumeration
2730
+ Windows Registry Key Access
2731
+ Process Metadata
2732
+ Snapshot Modification
2733
+ Scheduled Job Creation
2734
+ Network Share Access
2735
+ Driver Metadata
2736
+ Instance Start
2737
+ Scheduled Job Modification
2738
+ Cloud Storage Enumeration
2739
+ Web Credential Usage
2740
+ Domain Registration
2741
+ Snapshot Enumeration
2742
+ Behavioral Detection of Network Share Connection Removal via CLI and SMB Disconnects
2743
+ Detect Abuse of vSphere Installation Bundles (VIBs) for Persistent Access
2744
+ Detection of Kernel/User-Level Rootkit Behavior Across Platforms
2745
+ Detect Remote Email Collection via Abnormal Login and Programmatic Access
2746
+ Detection of Malicious Control Panel Item Execution via control.exe or Rundll32
2747
+ Detect Suspicious or Malicious Code Signing Abuse
2748
+ Detection of Link Target
2749
+ Detection of Botnet
2750
+ Detect Archiving and Encryption of Collected Data (T1560)
2751
+ Multi-Event Detection for SMB Admin Share Lateral Movement
2752
+ Detection Strategy for T1546.016 - Event Triggered Execution via Installer Packages
2753
+ Detection of Malware
2754
+ Behavioral Detection of User Discovery via Local and Remote Enumeration
2755
+ Detection Strategy for Plist File Modification (T1647)
2756
+ Detection Strategy for Impair Defenses Indicator Blocking
2757
+ Detection Strategy for Accessibility Feature Hijacking via Binary Replacement or Registry Modification
2758
+ Detection of Msiexec Abuse for Local, Network, and DLL Execution
2759
+ Detection Strategy for Dynamic API Resolution via Hash-Based Function Lookups
2760
+ Detection Strategy for Hijack Execution Flow across OS platforms.
2761
+ Detection Strategy for Hijack Execution Flow using Executable Installer File Permissions Weakness
2762
+ Detection Strategy for Event Triggered Execution via Trap (T1546.005)
2763
+ Behavioral Detection of Mailbox Data and Log Deletion for Anti-Forensics
2764
+ Detection Strategy for Encrypted Channel across OS Platforms
2765
+ Detection Strategy for NTFS File Attribute Abuse (ADS/EAs)
2766
+ Detection of Establish Accounts
2767
+ User-Initiated Malicious Library Installation via Package Manager (T1204.005)
2768
+ Detection Strategy for System Binary Proxy Execution: Regsvr32
2769
+ Detecting Steganographic Command and Control via File + Network Correlation
2770
+ Behavior-chain detection for T1134.001 Access Token Manipulation: Token Impersonation/Theft on Windows
2771
+ User Execution – Malicious Copy & Paste (browser/email → shell with obfuscated one-liner) – T1204.004
2772
+ Detect Adversary-in-the-Middle via Network and Configuration Anomalies
2773
+ Detection Strategy for Resource Forking on macOS
2774
+ Detection of Botnet
2775
+ Detection Strategy for SQL Stored Procedures Abuse via T1505.001
2776
+ Detecting Malicious Browser Extensions Across Platforms
2777
+ Detection of Registry Query for Environmental Discovery
2778
+ Detect Compromise of Host Software Binaries
2779
+ Detection Strategy for Hidden Windows
2780
+ Multi-Platform Cloud Storage Exfiltration Behavior Chain
2781
+ Detect Suspicious Access to Windows Credential Manager
2782
+ Detection of Data Staging Prior to Exfiltration
2783
+ Detection Strategy for Disable or Modify Cloud Firewall
2784
+ Detection of Network Topology
2785
+ Suspicious Addition to Local or Domain Groups
2786
+ Detection Strategy for Exploitation for Credential Access
2787
+ Credential Dumping from SAM via Registry Dump and Local File Access
2788
+ Brute Force Authentication Failures with Multi-Platform Log Correlation
2789
+ Detect LSA Authentication Package Persistence via Registry and LSASS DLL Load
2790
+ Detection of Command and Control Over Application Layer Protocols
2791
+ Detection Strategy for Lateral Tool Transfer across OS platforms
2792
+ Detection of Digital Certificates
2793
+ Detection Strategy for Modify Cloud Compute Infrastructure: Create Snapshot
2794
+ Masquerading via Space After Filename - Behavioral Detection Strategy
2795
+ Behavioral Detection of Publish/Subscribe Protocol Misuse for C2
2796
+ Detection of Spearphishing Service
2797
+ Detection Strategy for Log Enumeration
2798
+ Detection of Social Media Accounts
2799
+ Behavioral Detection of System Network Configuration Discovery
2800
+ Detection Strategy for Exfiltration Over Web Service
2801
+ Detection Strategy for ListPlanting Injection on Windows
2802
+ Detection Strategy of Transmitted Data Manipulation
2803
+ Credential Access via /etc/passwd and /etc/shadow Parsing
2804
+ Behavioral Detection of Windows Command Shell Execution
2805
+ Exploitation for Client Execution – cross-platform behavior chain (browser/Office/3rd-party apps)
2806
+ Behavioral detection for Supply Chain Compromise (package/update tamper → install → first-run)
2807
+ Suspicious Database Access and Dump Activity Across Environments (T1213.006)
2808
+ Cross-Platform Behavioral Detection of Python Execution
2809
+ Detect Credentials Access from Password Stores
2810
+ Detection Strategy for Endpoint DoS via Service Exhaustion Flood
2811
+ Detection Strategy for Extra Window Memory (EWM) Injection on Windows
2812
+ Detection Strategy for T1218.012 Verclsid Abuse
2813
+ Detection Strategy for Disable or Modify Linux Audit System
2814
+ Detection Strategy for Exclusive Control
2815
+ Detection Strategy for Disk Structure Wipe via Boot/Partition Overwrite
2816
+ Detection Strategy for Impersonation
2817
+ Traffic Signaling (Port-knock / magic-packet → firewall or service activation) – T1205
2818
+ Detection of Code Signing Certificates
2819
+ Behavior-chain detection for T1132.001 Data Encoding: Standard Encoding (Base64/Hex/MIME) across Windows, Linux, macOS, ESXi
2820
+ Detection of Cloud Accounts
2821
+ Detection of File Transfer Protocol-Based C2 (FTP, FTPS, SMB, TFTP)
2822
+ Detection Strategy for Junk Code Obfuscation with Suspicious Execution Patterns
2823
+ Behavioral Detection of Log File Clearing on Linux and macOS
2824
+ Detection of Remote Data Staging Prior to Exfiltration
2825
+ Detection Strategy for Reflection Amplification DoS (T1498.002)
2826
+ Detection Strategy for Temporary Elevated Cloud Access Abuse (T1548.005)
2827
+ Detection Strategy for Network Address Translation Traversal
2828
+ Local Account Enumeration Across Host Platforms
2829
+ Detection Strategy for Cloud Infrastructure Discovery
2830
+ T1136.001 Detection Strategy - Local Account Creation Across Platforms
2831
+ Cross-Platform Detection of Data Transfer to Cloud Account
2832
+ Detection Strategy for Debugger Evasion (T1622)
2833
+ Detection Strategy for Application Shimming via sdbinst.exe and Registry Artifacts (Windows)
2834
+ Email Collection via Local Email Access and Auto-Forwarding Behavior
2835
+ Behavioral Detection of Internet Connection Discovery
2836
+ Endpoint Resource Saturation and Crash Pattern Detection Across Platforms
2837
+ Detect Mark-of-the-Web (MOTW) Bypass via Container and Disk Image Files
2838
+ Detection Strategy for Dynamic Resolution using Domain Generation Algorithms.
2839
+ Detection Strategy for Role Addition to Cloud Accounts
2840
+ Container CLI and API Abuse via Docker/Kubernetes (T1059.013)
2841
+ Detection of Bluetooth-Based Data Exfiltration
2842
+ Detection Strategy for Hijack Execution Flow through Path Interception by Unquoted Path
2843
+ Detection of Web Session Cookie Theft via File, Memory, and Network Artifacts
2844
+ Detection fo Remote Service Session Hijacking for RDP.
2845
+ Detection Strategy for Process Argument Spoofing on Windows
2846
+ Detection Strategy for T1505 - Server Software Component
2847
+ Internal Proxy Behavior via Lateral Host-to-Host C2 Relay
2848
+ Detection Strategy for Endpoint DoS via Application or System Exploitation
2849
+ Detection Strategy for Ignore Process Interrupts
2850
+ Detection of Phishing for Information
2851
+ Multi-Platform Shutdown or Reboot Detection via Execution and Host Status Events
2852
+ Behavioral Detection Strategy for Use Alternate Authentication Material (T1550)
2853
+ Detection of Non-Application Layer Protocols for C2
2854
+ Cross-host C2 via Removable Media Relay
2855
+ Defacement via File and Web Content Modification Across Platforms
2856
+ Detect LLMNR/NBT-NS Poisoning and SMB Relay on Windows
2857
+ Detection Strategy for SNMP (MIB Dump) on Network Devices
2858
+ macOS AuthorizationExecuteWithPrivileges Elevation Prompt Detection
2859
+ Detection of Digital Certificates
2860
+ Detect Network Logon Script Abuse via Multi-Event Correlation on Windows
2861
+ Detection Strategy for Container and Resource Discovery
2862
+ Detect abuse of Trusted Relationships (third-party and delegated admin access)
2863
+ Detection Strategy for Weaken Encryption: Disable Crypto Hardware on Network Devices
2864
+ Detection Strategy for T1547.009 – Shortcut Modification (Windows)
2865
+ Detection of DNS
2866
+ Detection of Adversarial Process Discovery Behavior
2867
+ Behavioral Detection Strategy for Abuse of Sudo and Sudo Caching
2868
+ Detection of Network Devices
2869
+ Unix-like File Permission Manipulation Behavioral Chain Detection Strategy
2870
+ Detection of Employee Names
2871
+ Detection Strategy for T1505.004 - Malicious IIS Components
2872
+ Detection Strategy for Encrypted Channel via Symmetric Cryptography across OS Platforms
2873
+ Detection of Email Addresses
2874
+ Recursive Enumeration of Files and Directories Across Privilege Contexts
2875
+ Behavioral Detection of External Website Defacement across Platforms
2876
+ Detection of Domain Trust Discovery via API, Script, and CLI Enumeration
2877
+ Detecting Suspicious Access to CRM Data in SaaS Environments
2878
+ Detection of Domains
2879
+ Detect Kerberos Ticket Theft or Forgery (T1558)
2880
+ Behavioral Detection of Native API Invocation via Unusual DLL Loads and Direct Syscalls
2881
+ Detection of Local Data Collection Prior to Exfiltration
2882
+ Detection of Unauthorized DCSync Operations via Replication API Abuse
2883
+ Detection Strategy for Polymorphic Code Mutation and Execution
2884
+ Detection Strategy for System Services across OS platforms.
2885
+ Detection Strategy for Hijack Execution Flow through the AppDomainManager on Windows.
2886
+ Detection of Business Relationships
2887
+ Detection Strategy for Disk Content Wipe via Direct Access and Overwrite
2888
+ Unauthorized Network Firewall Rule Modification (T1562.013)
2889
+ Detect Domain Controller Authentication Process Modification (Skeleton Key)
2890
+ Detection of Search Open Websites/Domains
2891
+ Detection of Systemd Service Creation or Modification on Linux
2892
+ Detection of SEO Poisoning
2893
+ Programmatic and Excessive Access to Confluence Documentation
2894
+ Detection Strategy for AppCert DLLs Persistence via Registry Injection
2895
+ Detection of Local Browser Artifact Access for Reconnaissance
2896
+ Detection of Drive-by Target
2897
+ Detection of Domain or Tenant Policy Modifications via AD and Identity Provider
2898
+ Detection Strategy for Scheduled Transfer and Recurrent Exfiltration Patterns
2899
+ IDE Tunneling Detection via Process, File, and Network Behaviors
2900
+ Detect Logon Script Modifications and Execution
2901
+ Detect Abuse of Dynamic Data Exchange (T1559.002)
2902
+ Detection of Search Closed Sources
2903
+ Detection Strategy for Hidden Files and Directories
2904
+ Detection of Malware Relocation via Suspicious File Movement
2905
+ Detection Strategy for Power Settings Abuse
2906
+ Multi-hop Proxy Behavior via Relay Node Chaining, Onion Routing, and Network Tunneling
2907
+ Behavioral Detection of Masquerading Across Platforms via Metadata and Execution Discrepancy
2908
+ Detection Strategy for T1546.017 - Udev Rules (Linux)
2909
+ Detection of Malvertising
2910
+ Detection Strategy for Runtime Data Manipulation.
2911
+ Detection of Serverless
2912
+ Application Exhaustion Flood Detection Across Platforms
2913
+ Detect malicious IDE extension install/usage and IDE tunneling
2914
+ Detection of Firmware
2915
+ Resource Hijacking Detection Strategy
2916
+ Detection Strategy for Forged Web Credentials
2917
+ Detection Strategy for /proc Memory Injection on Linux
2918
+ Behavioral Detection of Asynchronous Procedure Call (APC) Injection via Remote Thread Queuing
2919
+ Detection Strategy for Dynamic Resolution using Fast Flux DNS
2920
+ Detection of Masqueraded Tasks or Services with Suspicious Naming and Execution
2921
+ Behavioral Detection of Network History and Configuration Tampering
2922
+ Clipboard Data Access with Anomalous Context
2923
+ Behavioral Detection of Thread Execution Hijacking via Thread Suspension and Context Switching
2924
+ Template Injection Detection - Windows
2925
+ Detection Strategy for Compile After Delivery - Source Code to Executable Transformation
2926
+ Abuse of Information Repositories for Data Collection
2927
+ Detection Strategy for Network Sniffing Across Platforms
2928
+ Detect XSL Script Abuse via msxsl and wmic
2929
+ Detect Remote Access via USB Hardware (TinyPilot, PiKVM)
2930
+ Behavioral Detection of Visual Basic Execution (VBS/VBA/VBScript)
2931
+ Behavioral Detection of Unix Shell Execution
2932
+ Detection Strategy for Hijack Execution Flow using Path Interception by PATH Environment Variable.
2933
+ Detection of Acquire Access
2934
+ Detection of Exploits
2935
+ Detection of Email Accounts
2936
+ Detection of Digital Certificates
2937
+ Detect Conditional Access Policy Modification in Identity and Cloud Platforms
2938
+ Detection of Purchase Technical Data
2939
+ Detection of Launch Agent Creation or Modification on macOS
2940
+ Hardware Supply Chain Compromise Detection via Host Status & Boot Integrity Checks
2941
+ Detecting Remote Script Proxy Execution via PubPrn.vbs
2942
+ Detection of Obtain Capabilities
2943
+ Detection Strategy for LC_LOAD_DYLIB Modification in Mach-O Binaries on macOS
2944
+ Detection of Credentials
2945
+ Domain Account Enumeration Across Platforms
2946
+ Detection Strategy for Dynamic Resolution through DNS Calculation
2947
+ Detection Strategy for Downgrade System Image on Network Devices
2948
+ Detection of Search Victim-Owned Websites
2949
+ Detection Strategy for ESXi Hypervisor CLI Abuse
2950
+ Detect Persistence via Malicious Office Add-ins
2951
+ Behavioral Detection of Remote SSH Logins Followed by Post-Login Execution
2952
+ Detection Strategy for Modify System Image on Network Devices
2953
+ Detection Strategy for Subvert Trust Controls using SIP and Trust Provider Hijacking.
2954
+ Detect User Activity Based Sandbox Evasion via Input & Artifact Probing
2955
+ Detection Strategy for Email Hiding Rules
2956
+ Detect Network Provider DLL Registration and Credential Capture
2957
+ Detection Strategy for T1136 - Create Account across platforms
2958
+ Detection Strategy for Hidden Virtual Instance Execution
2959
+ Detection of IP Addresses
2960
+ Behavioral Detection of Cloud Group Enumeration via API and CLI Access
2961
+ Detection of Acquire Infrastructure
2962
+ Detection Strategy for T1550.002 - Pass the Hash (Windows)
2963
+ Detecting Bulk or Anomalous Access to Private Code Repositories via SaaS Platforms
2964
+ Detection of Vulnerability Scanning
2965
+ Detection Strategy for T1528 - Steal Application Access Token
2966
+ Detection of Determine Physical Locations
2967
+ Detection of Stage Capabilities
2968
+ Detect persistence via reopened application plist modification (macOS)
2969
+ Detect Adversary Deobfuscation or Decoding of Files and Payloads
2970
+ Detection of Identify Roles
2971
+ Virtualization/Sandbox Evasion via System Checks across Windows, Linux, macOS
2972
+ Detection of Malware
2973
+ Detect Kerberos Ccache File Theft or Abuse (T1558.005)
2974
+ Detection of Proxy Infrastructure Setup and Traffic Bridging
2975
+ Detection of Remote Service Session Hijacking
2976
+ Behavioral Detection Strategy for Exfiltration Over Symmetric Encrypted Non-C2 Protocol
2977
+ Detection Strategy for Multi-Factor Authentication Request Generation (T1621)
2978
+ Automated File and API Collection Detection Across Platforms
2979
+ Detection Strategy for T1550.003 - Pass the Ticket (Windows)
2980
+ Behavior-chain detection strategy for T1127.001 Trusted Developer Utilities Proxy Execution: MSBuild (Windows)
2981
+ Detection of Social Media Accounts
2982
+ Linux Python Startup Hook Persistence via .pth and Customize Files (T1546.018)
2983
+ Detect Default File Association Hijack via Registry & Execution Correlation on Windows
2984
+ Detect Access to Cloud Instance Metadata API (IaaS)
2985
+ Detecting Code Injection via mavinject.exe (App-V Injector)
2986
+ Detection Strategy for Build Image on Host
2987
+ Detect Gatekeeper Bypass via Quarantine Flag and Trust Control Manipulation
2988
+ Credential Stuffing Detection via Reused Breached Credentials Across Services
2989
+ Detect Winlogon Helper DLL Abuse via Registry and Process Artifacts on Windows
2990
+ Detect Multi-Stage Command and Control Channels
2991
+ Detecting Downgrade Attacks
2992
+ Detection Strategy for Exploitation for Privilege Escalation
2993
+ Detect Access and Parsing of .bash_history Files for Credential Harvesting
2994
+ Account Access Removal via Multi-Platform Audit Correlation
2995
+ Behavioral Detection of PE Injection via Remote Memory Mapping
2996
+ Detect Ingress Tool Transfers via Behavioral Chain
2997
+ Detection Strategy for Addition of Email Delegate Permissions
2998
+ Behavior-chain detection strategy for T1127.003 Trusted Developer Utilities Proxy Execution: JamPlus (Windows)
2999
+ Multi-Platform File and Directory Permissions Modification Detection Strategy
3000
+ Behavioral Detection of Permission Groups Discovery
3001
+ Port-knock → rule/daemon change → first successful connect (T1205.001)
3002
+ Boot or Logon Initialization Scripts Detection Strategy
3003
+ Detect Access and Decryption of Group Policy Preference (GPP) Credentials in SYSVOL
3004
+ Detection Strategy for Traffic Duplication via Mirroring in IaaS and Network Devices
3005
+ Behavioral Detection of Domain Group Discovery
3006
+ Detection of DNS Server
3007
+ Detection Strategy for Login Hook Persistence on macOS
3008
+ Detection Strategy for Indicator Removal from Tools - Post-AV Evasion Modification
3009
+ Detection Strategy for Exfiltration to Text Storage Sites
3010
+ Detection of Search Threat Vendor Data
3011
+ Registry and LSASS Monitoring for Security Support Provider Abuse
3012
+ Detect Hybrid Identity Authentication Process Modification
3013
+ Cross-Platform Detection of Cron Job Abuse for Persistence and Execution
3014
+ Detection of Server
3015
+ Detection Strategy for SVG Smuggling with Script Execution and Delivery Behavior
3016
+ Detect Credential Discovery via Windows Registry Enumeration
3017
+ Detection Strategy for VBA Stomping
3018
+ Cross-Platform Detection of JavaScript Execution Abuse
3019
+ Detection Strategy for Email Spoofing
3020
+ Detection Strategy for MFA Interception via Input Capture and Smart Card Proxying
3021
+ Direct Network Flood Detection across IaaS, Linux, Windows, and macOS
3022
+ Detection of Virtual Private Server
3023
+ Detection Strategy for Event Triggered Execution: AppInit DLLs (Windows)
3024
+ Detection Strategy for Web Service: Dead Drop Resolver
3025
+ User Execution – multi-surface behavior chain (documents/links → helper/unpacker → LOLBIN/child → egress)
3026
+ Detect Office Startup-Based Persistence via Macros, Forms, and Registry Hooks
3027
+ Detection of Web Services
3028
+ Behavioral Detection of Indicator Removal Across Platforms
3029
+ Multi-event Detection Strategy for RDP-Based Remote Logins and Post-Access Activity
3030
+ Password Policy Discovery – cross-platform behavior-chain analytics
3031
+ Abuse of PowerShell for Arbitrary Execution
3032
+ Detection Strategy for Command Obfuscation
3033
+ Detect Subversion of Trust Controls via Certificate, Registry, and Attribute Manipulation
3034
+ Detection Strategy for File Creation or Modification of Boot Files
3035
+ System Discovery via Native and Remote Utilities
3036
+ Detect Persistence via Outlook Custom Forms Triggered by Malicious Email
3037
+ Behavioral Detection of Systemd Timer Abuse for Scheduled Execution
3038
+ Detect browser session hijacking via privilege, handle access, and remote thread into browsers
3039
+ Suspicious Use of Web Services for C2
3040
+ Detection Strategy for System Services: Launchctl
3041
+ Behavior-chain detection for T1134 Access Token Manipulation on Windows
3042
+ Detecting Protocol or Service Impersonation via Anomalous TLS, HTTP Header, and Port Mismatch Correlation
3043
+ Compromised software/update chain (installer/write → first-run/child → egress/signature anomaly)
3044
+ Detect Forged Kerberos Silver Tickets (T1558.002)
3045
+ Windows COM Hijacking Detection via Registry and DLL Load Correlation
3046
+ Behavior-chain detection for T1134.002 Create Process with Token (Windows)
3047
+ Detection of Credential Dumping from LSASS Memory via Access and Dump Sequence
3048
+ Detection Strategy for Data from Network Shared Drive
3049
+ Detection Strategy for Content Injection
3050
+ Obfuscated Binary Unpacking Detection via Behavioral Patterns
3051
+ Detection Strategy for Serverless Execution (T1648)
3052
+ Detection of Group Policy Modifications via AD Object Changes and File Activity
3053
+ Detection of Data Exfiltration via Removable Media
3054
+ Detection Strategy for T1136.003 - Cloud Account Creation across IaaS, IdP, SaaS, Office
3055
+ Detection of Develop Capabilities
3056
+ Detection Strategy for Steal or Forge Authentication Certificates
3057
+ Detection of Active Scanning
3058
+ Detection of Selective Exclusion
3059
+ Suspicious RoleBinding or ClusterRoleBinding Assignment in Kubernetes
3060
+ Detection of System Network Connections Discovery Across Platforms
3061
+ Detection Strategy for Hijack Execution Flow through Services File Permissions Weakness.
3062
+ Detect Modification of macOS Startup Items
3063
+ Detection Strategy for Phishing across platforms.
3064
+ Detection Strategy for Hijack Execution Flow through the KernelCallbackTable on Windows.
3065
+ Detection of Compromise Infrastructure
3066
+ Detection Strategy for T1497 Virtualization/Sandbox Evasion
3067
+ Detection of Malicious Code Execution via InstallUtil.exe
3068
+ Behavioral Detection of WinRM-Based Remote Access
3069
+ Detection of Vulnerabilities
3070
+ Detection of Upload Tool
3071
+ Detection of Persistence Artifact Removal Across Host Platforms
3072
+ Behavioral Detection of T1498 – Network Denial of Service Across Platforms
3073
+ Detect persistent or elevated container services via container runtime or cluster manipulation
3074
+ Removable Media Execution Chain Detection via File and Process Activity
3075
+ Detection Strategy for Hijack Execution Flow using the Windows COR_PROFILER.
3076
+ Detection Strategy for Hidden File System Abuse
3077
+ Behavioral Detection Strategy for Network Service Discovery Across Platforms
3078
+ Remote Desktop Software Execution and Beaconing Detection
3079
+ Detection Strategy for Process Doppelgänging on Windows
3080
+ Behavioral Detection Strategy for WMI Execution Abuse on Windows
3081
+ Detect Persistence via Malicious Outlook Rules
3082
+ Detect Suspicious Access to Private Key Files and Export Attempts Across Platforms
3083
+ Distributed Password Spraying via Authentication Failures Across Multiple Accounts
3084
+ Detection Strategy for Impair Defenses via Impair Command History Logging across OS platforms.
3085
+ Behavioral Detection of Command and Scripting Interpreter Abuse
3086
+ Detection Strategy for Virtual Machine Discovery
3087
+ Detection Strategy for Escape to Host
3088
+ Detection of Client Configurations
3089
+ Cloud Account Enumeration via API, CLI, and Scripting Interfaces
3090
+ Detection Strategy for System Services: Systemctl
3091
+ Detect Modification of Network Device Authentication via Patched System Images
3092
+ Detection of Script-Based Proxy Execution via Signed Microsoft Utilities
3093
+ Detection of Credential Harvesting via Web Portal Modification
3094
+ Credential Dumping via Sensitive Memory and Registry Access Correlation
3095
+ Detection Strategy for Cloud Application Integration
3096
+ Behavior-chain detection for T1132.002 Data Encoding: Non-Standard Encoding across Windows, Linux, macOS, ESXi
3097
+ Local Storage Discovery via Drive Enumeration and Filesystem Probing
3098
+ Detection Strategy for Safe Mode Boot Abuse
3099
+ Detect Abuse of Container APIs for Credential Access
3100
+ Detecting Mshta-based Proxy Execution via Suspicious HTA or Script Invocation
3101
+ Detect Use of Stolen Web Session Cookies Across Platforms
3102
+ Detection Strategy for Netsh Helper DLL Persistence via Registry and Child Process Monitoring (Windows)
3103
+ Detection Strategy for Spearphishing Attachment across OS Platforms
3104
+ Detection Strategy for Process Hollowing on Windows
3105
+ Detection Strategy for Overwritten Process Arguments Masquerading
3106
+ Detection Strategy for T1542.005 Pre-OS Boot: TFTP Boot
3107
+ Detect Local Email Collection via Outlook Data File Access and Command Line Tooling
3108
+ Detect Registry and Startup Folder Persistence (Windows)
3109
+ Detect Suspicious Access to Browser Credential Stores
3110
+ Detection of Gather Victim Network Information
3111
+ Detection Strategy for Hijack Execution Flow using Path Interception by Search Order Hijacking
3112
+ Behavioral Detection of Spoofed GUI Credential Prompts
3113
+ Detection of Cached Domain Credential Dumping via Local Hash Cache Access
3114
+ Detect Time-Based Evasion via Sleep, Timer Loops, and Delayed Execution
3115
+ Detection Strategy for T1505.002 - Transport Agent Abuse (Windows/Linux)
3116
+ Domain Fronting Behavior via Mismatched TLS SNI and HTTP Host Headers
3117
+ Detection of Exfiltration Over Alternate Network Interfaces
3118
+ Behavior-chain, platform-aware detection strategy for T1129 Shared Modules
3119
+ Detection of WHOIS
3120
+ Detection Strategy for Double File Extension Masquerading
3121
+ Detecting Odbcconf Proxy Execution of Malicious DLLs
3122
+ Detection of Wordlist Scanning
3123
+ Detecting Abnormal SharePoint Data Mining by Privileged or Rare Users
3124
+ Detection Strategy for Abuse Elevation Control Mechanism (T1548)
3125
+ Detection of Software
3126
+ Detection of Serverless
3127
+ Detect Abuse of Component Object Model (T1559.001)
3128
+ Behavioral Detection of Process Injection Across Platforms
3129
+ Behavior-chain, platform-aware detection strategy for T1124 System Time Discovery
3130
+ Detection Strategy for Dynamic Resolution across OS Platforms
3131
+ Detection Strategy for Embedded Payloads
3132
+ Behavior-chain detection for T1610 Deploy Container across Docker & Kubernetes control/node planes
3133
+ Detect ARP Cache Poisoning Across Linux, Windows, and macOS
3134
+ Multi-Platform Execution Guardrails Environmental Validation Detection Strategy
3135
+ Detect WMI Event Subscription for Persistence via WmiPrvSE Process and MOF Compilation
3136
+ Detection Strategy for Email Bombing
3137
+ Detect Malicious Modification of Pluggable Authentication Modules (PAM)
3138
+ Detecting .NET COM Registration Abuse via Regsvcs/Regasm
3139
+ Detection Strategy for Obfuscated Files or Information: Binary Padding
3140
+ Detection Strategy for Resource Hijacking: SMS Pumping via SaaS Application Logs
3141
+ Detect Abuse of Windows Time Providers for Persistence
3142
+ Detection Strategy for System Language Discovery
3143
+ Detection Strategy for System Location Discovery
3144
+ Detection of Trust Relationship Modifications in Domain or Tenant Policies
3145
+ Detection Strategy for Remote System Enumeration Behavior
3146
+ Detect DHCP Spoofing Across Linux, Windows, and macOS
3147
+ Detection of Code Repositories
3148
+ Drive-by Compromise — Behavior-based, Multi-platform Detection Strategy (T1189)
3149
+ Detection Strategy for TLS Callback Injection via PE Memory Modification and Hollowing
3150
+ Detection of DNS Server
3151
+ Detection of Abused or Compromised Cloud Accounts for Access and Persistence
3152
+ Windows DACL Manipulation Behavioral Chain Detection Strategy
3153
+ Detection of Compromise Accounts
3154
+ Detection of Malicious Kubernetes CronJob Scheduling
3155
+ Detection of Impair Defenses through Disabled or Modified Tools across OS Platforms.
3156
+ Backup Software Discovery via CLI, Registry, and Process Inspection (T1518.002)
3157
+ Detect Archiving via Library (T1560.002)
3158
+ Detection Strategy for Hijack Execution Flow through Service Registry Premission Weakness.
3159
+ Detection Strategy for T1218.011 Rundll32 Abuse
3160
+ Detection Strategy for T1542.002 Pre-OS Boot: Component Firmware
3161
+ Detect Unauthorized Access to Password Managers
3162
+ Detection Strategy for Steganographic Abuse in File & Script Execution
3163
+ Detection of Data Access and Collection from Removable Media
3164
+ Environmental Keying Discovery-to-Decryption Behavioral Chain Detection Strategy
3165
+ Detection of Valid Account Abuse Across Platforms
3166
+ Detection Strategy for T1547.010 – Port Monitor DLL Persistence via spoolsv.exe (Windows)
3167
+ Detection of Exfiltration Over Unencrypted Non-C2 Protocol
3168
+ Detection Strategy for HTML Smuggling via JavaScript Blob + Dynamic File Drop
3169
+ Detect Abuse of XPC Services (T1559.003)
3170
+ Detection Strategy for Cloud Service Discovery
3171
+ Detection Strategy for AutoHotKey & AutoIT Abuse
3172
+ Boot or Logon Autostart Execution Detection Strategy
3173
+ Detection of NTDS.dit Credential Dumping from Domain Controllers
3174
+ Detect Unsecured Credentials Shared in Chat Messages
3175
+ Detect Screen Capture via Commands and API Calls
3176
+ T1136.002 Detection Strategy - Domain Account Creation Across Platforms
3177
+ Firmware Modification via Flash Tool or Corrupted Firmware Upload
3178
+ Web Shell Detection via Server Behavior and File Execution Chains
3179
+ Detection Strategy for T1542 Pre-OS Boot
3180
+ Detection Strategy for Exfiltration to Code Repository
3181
+ Detection of Disabled or Modified System Firewalls across OS Platforms.
3182
+ Internal Spearphishing via Trusted Accounts
3183
+ Detection of Spoofed User-Agent
3184
+ Detection of Install Digital Certificate
3185
+ Behavioral Detection for Service Stop across Platforms
3186
+ Detection Strategy for LNK Icon Smuggling
3187
+ Detection Strategy for Fileless Storage via Registry, WMI, and Shared Memory
3188
+ Detection Strategy for Modify Cloud Compute Infrastructure
3189
+ Detection of AppleScript-Based Execution on macOS
3190
+ Behavioral Detection Strategy for Use Alternate Authentication Material: Application Access Token (T1550.001)
3191
+ Detection of Local Account Abuse for Initial Access and Persistence
3192
+ Behavioral Detection for T1490 - Inhibit System Recovery
3193
+ Detection of Gather Victim Host Information
3194
+ Detect Access to Unsecured Credential Files Across Platforms
3195
+ Detect Evil Twin Wi-Fi Access Points on Network Devices
3196
+ Detect Abuse of Inter-Process Communication (T1559)
3197
+ Password Guessing via Multi-Source Authentication Failure Correlation
3198
+ Detect Forced SMB/WebDAV Authentication via lure files and outbound NTLM
3199
+ Socket-filter trigger → on-host raw-socket activity → reverse connection (T1205.002)
3200
+ Detection Strategy for VDSO Hijacking on Linux
3201
+ Detection of Gather Victim Identity Information
3202
+ Windows Detection Strategy for T1547.012 - Print Processor DLL Persistence
3203
+ Detection Strategy for Masquerading via Legitimate Resource Name or Location
3204
+ Detection Strategy for Forged SAML Tokens
3205
+ Detection Strategy for Bind Mounts on Linux
3206
+ Detect Modification of Authentication Process via Reversible Encryption
3207
+ Behavioral Detection of Malicious File Deletion
3208
+ User Execution – Malicious Link (click → suspicious egress → download/write → follow-on activity)
3209
+ Detection Strategy for Hide Infrastructure
3210
+ Detecting PowerShell Execution via SyncAppvPublishingServer.vbs Proxy Abuse
3211
+ Abuse of Domain Accounts
3212
+ Detect Active Setup Persistence via StubPath Execution
3213
+ Behavioral Detection of Wi-Fi Discovery Activity
3214
+ Detecting Junk Data in C2 Channels via Behavioral Analysis
3215
+ Behavioral Detection of Unauthorized VNC Remote Control Sessions
3216
+ Suspicious Device Registration via Entra ID or MFA Platform
3217
+ Setuid/Setgid Privilege Abuse Detection (Linux/macOS)
3218
+ Detection of Mail Protocol-Based C2 Activity (SMTP, IMAP, POP3)
3219
+ Detection of Domain Properties
3220
+ Detection Strategy for Weaken Encryption: Reduce Key Space on Network Devices
3221
+ Detection Strategy for Modify Cloud Compute Infrastructure: Create Cloud Instance
3222
+ Detection Strategy for Hidden Artifacts Across Platforms
3223
+ Detection Strategy for Hijack Execution Flow for DLLs
3224
+ Detection Strategy for SSH Session Hijacking
3225
+ Endpoint DoS via OS Exhaustion Flood Detection Strategy
3226
+ Multi-Platform Behavioral Detection for Compute Hijacking
3227
+ Detection Strategy for Boot or Logon Initialization Scripts: RC Scripts
3228
+ Detection Strategy for Lua Scripting Abuse
3229
+ Detection Strategy for Exfiltration Over C2 Channel
3230
+ External Proxy Behavior via Outbound Relay to Intermediate Infrastructure
3231
+ Detection Strategy for T1525 – Implant Internal Image
3232
+ Detect Excessive or Unauthorized Bandwidth Usage for Botnet, Proxyjacking, or Scanning Purposes
3233
+ Detection Strategy for ESXi Administration Command
3234
+ Detection of Malicious Profile Installation via CMSTP.exe
3235
+ Renamed Legitimate Utility Execution with Metadata Mismatch and Suspicious Path
3236
+ Linux Detection Strategy for T1547.013 - XDG Autostart Entries
3237
+ Behavioral Detection of DNS Tunneling and Application Layer Abuse
3238
+ Detection Strategy for Ptrace-Based Process Injection on Linux
3239
+ Detection of LSA Secrets Dumping via Registry and Memory Extraction
3240
+ Detection of Exploits
3241
+ Detection of Server
3242
+ Detection Strategy for T1542.004 Pre-OS Boot: ROMMONkit
3243
+ Right-to-Left Override Masquerading Detection via Filename and Execution Context
3244
+ Detection Strategy for Hidden User Accounts
3245
+ Detection Strategy for Cloud Storage Object Discovery
3246
+ Detection of Data Destruction Across Platforms via Mass Overwrite and Deletion Patterns
3247
+ Behavioral Detection of Event Triggered Execution Across Platforms
3248
+ Detecting Unauthorized Collection from Messaging Applications in SaaS and Office Environments
3249
+ Behavioral Detection Strategy for T1123 Audio Capture Across Windows, Linux, macOS
3250
+ Detection of Suspicious Scheduled Task Creation and Execution on Windows
3251
+ Detection of Windows Service Creation or Modification
3252
+ Detection Strategy for Exfiltration to Cloud Storage
3253
+ Detection of Code Signing Certificates
3254
+ Internal Website and System Content Defacement via UI or Messaging Modifications
3255
+ Behavioral Detection of Input Capture Across Platforms
3256
+ Detection of Spearphishing Link
3257
+ Detection Strategy for Patch System Image on Network Devices
3258
+ Cross-Platform Detection of Scheduled Task/Job Abuse via `at` Utility
3259
+ Behavioral Detection of CLI Abuse on Network Devices
3260
+ Detection of Scanning IP Blocks
3261
+ Detection Strategy for Poisoned Pipeline Execution via SaaS CI/CD Workflows
3262
+ Detect Persistence via Office Test Registry DLL Injection
3263
+ Detection of Tool
3264
+ Detect Forged Kerberos Golden Tickets (T1558.001)
3265
+ Detect Access to macOS Keychain for Credential Theft
3266
+ Detection Strategy for Non-Standard Ports
3267
+ Detection Strategy for Data Manipulation
3268
+ Detection Strategy for Additional Cloud Credentials in IaaS/IdP/SaaS
3269
+ Detection of Gather Victim Org Information
3270
+ Detection of Tainted Content Written to Shared Storage
3271
+ Detection of Proxy Execution via Trusted Signed Binaries Across Platforms
3272
+ Detection of Spearphishing Voice
3273
+ Detection Strategy for Modify Cloud Compute Infrastructure: Delete Cloud Instance
3274
+ Detection of Search Engines
3275
+ Detection Strategy for SSH Key Injection in Authorized Keys
3276
+ Behavior-Based Registry Modification Detection on Windows
3277
+ Detection of Virtual Private Server
3278
+ Detection of Lifecycle Policy Modifications for Triggered Deletion in IaaS Cloud Storage
3279
+ Detect disabled Windows event logging
3280
+ Detection of Default Account Abuse Across Platforms
3281
+ Detection of Multi-Platform File Encryption for Impact
3282
+ Detection of Social Media
3283
+ Detection of Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
3284
+ Detect Access or Search for Unsecured Credentials Across Platforms
3285
+ Detection of Mutex-Based Execution Guardrails Across Platforms
3286
+ Detection of Application Window Enumeration via API or Scripting
3287
+ Behavior-chain detection for T1134.005 Access Token Manipulation: SID-History Injection (Windows)
3288
+ Behavioral Detection Strategy for Remote Service Logins and Post-Access Activity
3289
+ Detection of Event Log Clearing on Windows via Behavioral Chain
3290
+ Detect Screensaver-Based Persistence via Registry and Execution Chains
3291
+ Detecting Electron Application Abuse for Proxy Execution
3292
+ Detection Strategy for Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations
3293
+ Detection of Network Trust Dependencies
3294
+ Detection of Email Accounts
3295
+ Detect Modification of Authentication Processes Across Platforms
3296
+ Detection Strategy for IFEO Injection on Windows
3297
+ Detection Strategy for T1548.002 – Bypass User Account Control (UAC)
3298
+ Detection of Artificial Intelligence
3299
+ Account Manipulation Behavior Chain Detection
3300
+ Detection of Hardware
3301
+ Encrypted or Encoded File Payload Detection Strategy
3302
+ Detection Strategy for Data Encoding in C2 Channels
3303
+ Detect AS-REP Roasting Attempts (T1558.004)
3304
+ Detection of System Service Discovery Commands Across OS Platforms
3305
+ Detection Strategy for T1505.005 – Terminal Services DLL Modification (Windows)
3306
+ Detection of Credential Harvesting via API Hooking
3307
+ Detection Strategy for Data Transfer Size Limits and Chunked Exfiltration
3308
+ Behavior‑chain detection for T1134.003 Make and Impersonate Token (Windows)
3309
+ Detection Strategy for Subvert Trust Controls via Install Root Certificate.
3310
+ Detection Strategy for Disk Wipe via Direct Disk Access and Destructive Commands
3311
+ Detection Strategy for Exploitation for Defense Evasion
3312
+ Detection Strategy for Hijack Execution Flow: Dynamic Linker Hijacking
3313
+ Automated Exfiltration Detection Strategy
3314
+ Detection of System Process Creation or Modification Across Platforms
3315
+ Multi-Event Behavioral Detection for DCOM-Based Remote Code Execution
3316
+ Detecting OS Credential Dumping via /proc Filesystem Access on Linux
3317
+ Detection Strategy for Reflective Code Loading
3318
+ Detection of Search Open Technical Databases
3319
+ Detection Strategy for Launch Daemon Creation or Modification (macOS)
3320
+ Detection Strategy for Exfiltration Over Webhook
3321
+ Behavioral Detection of Command History Clearing
3322
+ Detection of Domains
3323
+ Detect Bidirectional Web Service C2 Channels via Process & Network Correlation
3324
+ Detection Strategy for Spearphishing via a Service across OS Platforms
3325
+ Exploit Public-Facing Application – multi-signal correlation (request → error → post-exploit process/egress)
3326
+ Behavioral Detection of Local Group Enumeration Across OS Platforms
3327
+ Detection Strategy for Weaken Encryption on Network Devices
3328
+ Detect abuse of Windows BITS Jobs for download, execution and persistence
3329
+ Detection of Threat Intel Vendors
3330
+ Cross-Platform Behavioral Detection of Scheduled Task/Job Abuse
3331
+ Detection Strategy for Kernel Modules and Extensions Autostart Execution
3332
+ Detection of Cloud Accounts
3333
+ Detect Persistence via Office Template Macro Injection or Registry Hijack
3334
+ Detect Obfuscated C2 via Network Traffic Analysis
3335
+ Detection Strategy for Forged Web Cookies
3336
+ User Execution – Malicious File via download/open → spawn chain (T1204.002)
3337
+ Security Software Discovery Across Platforms
3338
+ Detection of Cloud Service Dashboard Usage via GUI-Based Cloud Access
3339
+ Detection Strategy for Masquerading via File Type Modification
3340
+ Enumeration of Global Address Lists via Email Account Discovery
3341
+ Detection Strategy for Extended Attributes Abuse
3342
+ Detect One-Way Web Service Command Channels
3343
+ Behavioral Detection of Obfuscated Files or Information
3344
+ Detection Strategy for Stored Data Manipulation across OS Platforms.
3345
+ Detection Strategy for Stripped Payloads Across Platforms
3346
+ Detection Strategy for Encrypted Channel via Asymmetric Cryptography across OS Platforms
3347
+ Detect Persistence via Outlook Home Page Exploitation
3348
+ Detection strategy for Group Policy Discovery on Windows
3349
+ Detection of Spearphishing Attachment
3350
+ Detection of Web Protocol-Based C2 Over HTTP, HTTPS, or WebSockets
3351
+ Detection Strategy for Financial Theft
3352
+ Detection Strategy for Cloud Service Hijacking via SaaS Abuse
3353
+ Behavior-chain detection for T1135 Network Share Discovery across Windows, Linux, and macOS
3354
+ Detection of DNS/Passive DNS
3355
+ Behavioral Detection of Malicious Cloud API Scripting
3356
+ Detect Archiving via Utility (T1560.001)
3357
+ Detect unauthorized or suspicious Hardware Additions (USB/Thunderbolt/Network)
3358
+ Detection Strategy for Impair Defenses Across Platforms
3359
+ Detection Strategy for T1542.001 Pre-OS Boot: System Firmware
3360
+ Detection of Local Data Staging Prior to Exfiltration
3361
+ Behavior-chain detection for T1133 External Remote Services across Windows, Linux, macOS, Containers
3362
+ Multi-Platform Detection Strategy for T1678 - Delay Execution
3363
+ Detection Strategy for Container Administration Command Abuse
3364
+ Behavioral Detection of DLL Injection via Windows API
3365
+ Behavior-chain, platform-aware detection strategy for T1125 Video Capture
3366
+ Detection of Adversary Abuse of Software Deployment Tools
3367
+ Detection of Malicious or Unauthorized Software Extensions
3368
+ Behavior-chain detection for T1134.004 Access Token Manipulation: Parent PID Spoofing (Windows)
3369
+ Detection Strategy for Spearphishing Voice across OS platforms
3370
+ Detection of Adversary Use of Unused or Unsupported Cloud Regions (IaaS)
3371
+ Behavior-Chain Detection for Remote Access Tools (Tool-Agnostic)
3372
+ Behavior-chain detection strategy for T1127.002 Trusted Developer Utilities Proxy Execution: ClickOnce (Windows)
3373
+ Supply-chain tamper in dependencies/dev-tools (manager→write/install→first-run→egress)
3374
+ Detection Strategy for Hijack Execution Flow: Dylib Hijacking
3375
+ Detect MFA Modification or Disabling Across Platforms
3376
+ Detection Strategy for Masquerading via Breaking Process Trees
3377
+ Detection Strategy for Spearphishing Links
3378
+ Behavioral Detection Strategy for Exfiltration Over Alternative Protocol
3379
+ Detection of CDNs
3380
+ Detect Archiving via Custom Method (T1560.003)
3381
+ Post-Credential Dump Password Cracking Detection via Suspicious File Access and Hash Analysis Tools
3382
+ Behavioral Detection of Fallback or Alternate C2 Channels
3383
+ Detection of Direct Volume Access for File System Evasion
3384
+ Exploitation of Remote Services – multi-platform lateral movement detection
3385
+ User Execution – Malicious Image (containers & IaaS) – pull/run → start → anomalous behavior (T1204.003)
3386
+ Detect Code Signing Policy Modification (Windows & macOS)
3387
+ Detection Strategy for System Services Service Execution
3388
+ Detection Strategy for Rogue Domain Controller (DCShadow) Registration and Replication Abuse
3389
+ Detection Strategy for Disable or Modify Cloud Logs
3390
+ Detect Suspicious Access to securityd Memory for Credential Extraction
3391
+ Detect Shell Configuration Modification for Persistence via Event-Triggered Execution
3392
+ Detection Strategy for Event Triggered Execution via emond on macOS
3393
+ Detection Strategy for Network Boundary Bridging
3394
+ Multi-Platform Software Discovery Behavior Chain
3395
+ Detection Strategy for Masquerading via Account Name Similarity
3396
+ TCC Database Manipulation via Launchctl and Unprotected SIP
3397
+ Detect Kerberoasting Attempts (T1558.003)
3398
+ Peripheral Device Enumeration via System Utilities and API Calls
3399
+ Detection Strategy for PowerShell Profile Persistence via profile.ps1 Modification
3400
+ Detection of Web Services
3401
+ Detection Strategy for Network Device Configuration Dump via Config Repositories
3402
+ Indirect Command Execution – Windows utility abuse behavior chain
3403
+ Detection Strategy for T1547.015 – Login Items on macOS
3404
+ Detection Strategy for Compressed Payload Creation and Execution
3405
+ Detection of Direct VM Console Access via Cloud-Native Methods
3406
+ Detecting MMC (.msc) Proxy Execution and Malicious COM Activation
3407
+ Behavior-chain, platform-aware detection strategy for T1127 Trusted Developer Utilities Proxy Execution (Windows)
3408
+ Detection Strategy for Input Injection
3409
+ Detection of Identify Business Tempo
3410
+ Detection Strategy for Modify Cloud Compute Infrastructure: Revert Cloud Instance
3411
+ Email Forwarding Rule Abuse Detection Across Platforms
3412
+ Detect Unauthorized Access to Cloud Secrets Management Stores
3413
+ Detection of USB-Based Data Exfiltration
3414
+ Behavioral Detection of Remote Cloud Logins via Valid Accounts
3415
+ Detect Malicious Password Filter DLL Registration
3416
+ Detection Strategy for File/Path Exclusions
3417
+ Detection Strategy for Wi-Fi Networks
3418
+ Cross-Platform Behavioral Detection of File Timestomping via Metadata Tampering
3419
+ Detection of Scan Databases
3420
+ Detection of Upload Malware
3421
+ Detection of Suspicious Compiled HTML File Execution via hh.exe
3422
+ Detection of Network Security Appliances
3423
+ Detect unauthorized LSASS driver persistence via LSA plugin abuse (Windows)
3424
+ Invalid Code Signature Execution Detection via Metadata and Behavioral Context
3425
+ Detection Strategy for Cloud Administration Command
3426
+ Detection Strategy for Modify Cloud Resource Hierarchy
3427
+ Enumeration of User or Account Information Across Platforms
3428
+ Behavioral Detection of Keylogging Activity Across Platforms
3429
+ Detection for Spoofing Security Alerting across OS Platforms
3430
+ Detection Strategy for Device Driver Discovery
3431
+ Detection Strategy for Data from Configuration Repository on Network Devices
3432
+ Detection Strategy for Protocol Tunneling accross OS platforms.
3433
+ Credential Access
3434
+ Execution
3435
+ Impact
3436
+ Persistence
3437
+ Privilege Escalation
3438
+ Lateral Movement
3439
+ Defense Evasion
3440
+ Exfiltration
3441
+ Discovery
3442
+ Collection
3443
+ Resource Development
3444
+ Reconnaissance
3445
+ Command and Control
3446
+ Initial Access
3447
+ Extra Window Memory Injection
3448
+ Scheduled Task
3449
+ Socket Filters
3450
+ Archive via Utility
3451
+ VNC
3452
+ Windows Management Instrumentation
3453
+ Screen Capture
3454
+ Fileless Storage
3455
+ Boot or Logon Initialization Scripts
3456
+ Adversary-in-the-Middle
3457
+ System Owner/User Discovery
3458
+ Acquire Infrastructure
3459
+ Rundll32
3460
+ Container and Resource Discovery
3461
+ Serverless
3462
+ Standard Encoding
3463
+ Embedded Payloads
3464
+ Pluggable Authentication Modules
3465
+ Gather Victim Host Information
3466
+ Digital Certificates
3467
+ Keylogging
3468
+ File/Path Exclusions
3469
+ Linux and Mac File and Directory Permissions Modification
3470
+ Password Guessing
3471
+ PubPrn
3472
+ Purchase Technical Data
3473
+ OS Credential Dumping
3474
+ Shared Modules
3475
+ Data from Configuration Repository
3476
+ Disk Structure Wipe
3477
+ Direct Network Flood
3478
+ Path Interception by PATH Environment Variable
3479
+ Sharepoint
3480
+ Direct Volume Access
3481
+ Artificial Intelligence
3482
+ Email Hiding Rules
3483
+ External Defacement
3484
+ Encrypted/Encoded File
3485
+ IP Addresses
3486
+ OS Exhaustion Flood
3487
+ Rootkit
3488
+ JavaScript
3489
+ DNS
3490
+ Lifecycle-Triggered Deletion
3491
+ Audio Capture
3492
+ Create or Modify System Process
3493
+ External Remote Services
3494
+ LC_LOAD_DYLIB Addition
3495
+ Steal Web Session Cookie
3496
+ Container Orchestration Job
3497
+ Domain Generation Algorithms
3498
+ Double File Extension
3499
+ Bypass User Account Control
3500
+ SMS Pumping
3501
+ Internet Connection Discovery
3502
+ Sudo and Sudo Caching
3503
+ Archive via Custom Method
3504
+ Modify Cloud Compute Infrastructure
3505
+ Network Devices
3506
+ Permission Groups Discovery
3507
+ Email Collection
3508
+ Security Account Manager
3509
+ WHOIS
3510
+ System Firmware
3511
+ Search Victim-Owned Websites
3512
+ Cloud Groups
3513
+ Services Registry Permissions Weakness
3514
+ DNS/Passive DNS
3515
+ Application Exhaustion Flood
3516
+ Compromise Software Dependencies and Development Tools
3517
+ Digital Certificates
3518
+ DNS Server
3519
+ Disk Wipe
3520
+ DNS
3521
+ Cloud Instance Metadata API
3522
+ Securityd Memory
3523
+ Group Policy Discovery
3524
+ Bootkit
3525
+ Data from Removable Media
3526
+ Mavinject
3527
+ Local Data Staging
3528
+ Match Legitimate Resource Name or Location
3529
+ Digital Certificates
3530
+ Stored Data Manipulation
3531
+ Password Cracking
3532
+ Local Email Collection
3533
+ Keychain
3534
+ Boot or Logon Autostart Execution
3535
+ LSA Secrets
3536
+ SAML Tokens
3537
+ Masquerade File Type
3538
+ Service Stop
3539
+ Malware
3540
+ Device Driver Discovery
3541
+ Domain Account
3542
+ Hide Artifacts
3543
+ Dynamic Data Exchange
3544
+ Malicious File
3545
+ Identify Business Tempo
3546
+ Publish/Subscribe Protocols
3547
+ Hardware
3548
+ Taint Shared Content
3549
+ Trust Modification
3550
+ Databases
3551
+ Symmetric Cryptography
3552
+ Local Account
3553
+ Social Media Accounts
3554
+ Browser Extensions
3555
+ Safe Mode Boot
3556
+ TFTP Boot
3557
+ Windows Service
3558
+ Fast Flux DNS
3559
+ System Checks
3560
+ Cron
3561
+ Domain Groups
3562
+ Vulnerabilities
3563
+ Spearphishing Link
3564
+ Clear Linux or Mac System Logs
3565
+ Application or System Exploitation
3566
+ Office Application Startup
3567
+ InstallUtil
3568
+ Spearphishing Link
3569
+ SSH
3570
+ Additional Cloud Roles
3571
+ Print Processors
3572
+ Spearphishing Attachment
3573
+ Stripped Payloads
3574
+ Component Object Model
3575
+ DLL
3576
+ Automated Collection
3577
+ Clipboard Data
3578
+ Proc Filesystem
3579
+ Botnet
3580
+ Password Managers
3581
+ Gatekeeper Bypass
3582
+ ESXi Administration Command
3583
+ Drive-by Target
3584
+ System Service Discovery
3585
+ Network Sniffing
3586
+ Code Signing
3587
+ Data from Cloud Storage
3588
+ Runtime Data Manipulation
3589
+ Credentials in Registry
3590
+ Network Share Discovery
3591
+ Peripheral Device Discovery
3592
+ Break Process Trees
3593
+ Network Topology
3594
+ Code Signing Certificates
3595
+ Windows File and Directory Permissions Modification
3596
+ Add-ins
3597
+ System Information Discovery
3598
+ Application Layer Protocol
3599
+ AppDomainManager
3600
+ Remote Data Staging
3601
+ Additional Container Cluster Roles
3602
+ Scheduled Task/Job
3603
+ Msiexec
3604
+ Network Trust Dependencies
3605
+ Reflection Amplification
3606
+ Password Filter DLL
3607
+ Terminal Services DLL
3608
+ Software Extensions
3609
+ Service Exhaustion Flood
3610
+ Compromise Hardware Supply Chain
3611
+ Native API
3612
+ Ccache Files
3613
+ Clear Network Connection History and Configurations
3614
+ AS-REP Roasting
3615
+ Virtual Private Server
3616
+ AutoHotKey & AutoIT
3617
+ Clear Command History
3618
+ Replication Through Removable Media
3619
+ Data from Local System
3620
+ Deobfuscate/Decode Files or Information
3621
+ Outlook Rules
3622
+ Impair Defenses
3623
+ Cloud Accounts
3624
+ Email Accounts
3625
+ Additional Local or Domain Groups
3626
+ Upload Malware
3627
+ Supply Chain Compromise
3628
+ Exploit Public-Facing Application
3629
+ Steal or Forge Kerberos Tickets
3630
+ Credentials from Password Stores
3631
+ Exfiltration Over Web Service
3632
+ Remote Access Tools
3633
+ Domains
3634
+ Archive via Library
3635
+ Thread Execution Hijacking
3636
+ Masquerading
3637
+ Application Shimming
3638
+ Unsecured Credentials
3639
+ Port Monitors
3640
+ Clear Mailbox Data
3641
+ Login Hook
3642
+ Content Injection
3643
+ Process Injection
3644
+ Exfiltration Over Webhook
3645
+ Traffic Signaling
3646
+ Direct Cloud VM Connections
3647
+ System Binary Proxy Execution
3648
+ Timestomp
3649
+ Evil Twin
3650
+ Reflective Code Loading
3651
+ Wi-Fi Discovery
3652
+ Mutual Exclusion
3653
+ Ignore Process Interrupts
3654
+ Escape to Host
3655
+ Shortcut Modification
3656
+ Application Window Discovery
3657
+ Email Account
3658
+ Time Based Checks
3659
+ CMSTP
3660
+ SSH Hijacking
3661
+ Disable Windows Event Logging
3662
+ Scheduled Transfer
3663
+ SMB/Windows Admin Shares
3664
+ Protocol Tunneling
3665
+ Control Panel
3666
+ Network Address Translation Traversal
3667
+ Upload Tool
3668
+ Security Support Provider
3669
+ Overwrite Process Arguments
3670
+ Use Alternate Authentication Material
3671
+ Exfiltration Over Other Network Medium
3672
+ Network Device Configuration Dump
3673
+ Gather Victim Identity Information
3674
+ Disable or Modify System Firewall
3675
+ Archive Collected Data
3676
+ SIP and Trust Provider Hijacking
3677
+ Browser Session Hijacking
3678
+ Remote Services
3679
+ Mail Protocols
3680
+ Hybrid Identity
3681
+ Vulnerability Scanning
3682
+ Cloud API
3683
+ Search Open Technical Databases
3684
+ Electron Applications
3685
+ Disable or Modify Linux Audit System
3686
+ Code Signing Policy Modification
3687
+ Deploy Container
3688
+ Modify Registry
3689
+ Launch Daemon
3690
+ Cloud Infrastructure Discovery
3691
+ Credentials from Web Browsers
3692
+ Path Interception by Search Order Hijacking
3693
+ Remote Service Session Hijacking
3694
+ Binary Padding
3695
+ Web Shell
3696
+ Group Policy Modification
3697
+ Browser Information Discovery
3698
+ Private Keys
3699
+ Server
3700
+ Windows Remote Management
3701
+ Exfiltration Over Bluetooth
3702
+ Default Accounts
3703
+ Time Providers
3704
+ Dynamic Linker Hijacking
3705
+ Local Account
3706
+ Search Threat Vendor Data
3707
+ Input Injection
3708
+ Communication Through Removable Media
3709
+ Clear Windows Event Logs
3710
+ Email Accounts
3711
+ LLMNR/NBT-NS Poisoning and SMB Relay
3712
+ File and Directory Permissions Modification
3713
+ LSASS Memory
3714
+ IDE Extensions
3715
+ Active Scanning
3716
+ Junk Code Insertion
3717
+ Abuse Elevation Control Mechanism
3718
+ Create Process with Token
3719
+ Setuid and Setgid
3720
+ Winlogon Helper DLL
3721
+ Distributed Component Object Model
3722
+ Password Spraying
3723
+ External Proxy
3724
+ Web Portal Capture
3725
+ Email Addresses
3726
+ Spearphishing Voice
3727
+ Cached Domain Credentials
3728
+ SSH Authorized Keys
3729
+ Virtual Machine Discovery
3730
+ Network Security Appliances
3731
+ Image File Execution Options Injection
3732
+ Odbcconf
3733
+ Search Engines
3734
+ Business Relationships
3735
+ Temporary Elevated Cloud Access
3736
+ Video Capture
3737
+ Process Doppelgänging
3738
+ System Network Configuration Discovery
3739
+ Delete Cloud Instance
3740
+ Code Repositories
3741
+ Executable Installer File Permissions Weakness
3742
+ Accessibility Features
3743
+ Account Discovery
3744
+ Proxy
3745
+ Command and Scripting Interpreter
3746
+ Malicious Library
3747
+ Indicator Blocking
3748
+ Domain Account
3749
+ Extended Attributes
3750
+ Employee Names
3751
+ Domain Trust Discovery
3752
+ Golden Ticket
3753
+ Automated Exfiltration
3754
+ Client Configurations
3755
+ Disable or Modify Cloud Firewall
3756
+ IDE Tunneling
3757
+ Malware
3758
+ SVG Smuggling
3759
+ Component Firmware
3760
+ Indicator Removal
3761
+ Exfiltration Over Symmetric Encrypted Non-C2 Protocol
3762
+ Office Template Macros
3763
+ Virtual Private Server
3764
+ Confluence
3765
+ Pass the Ticket
3766
+ File and Directory Discovery
3767
+ Dynamic Resolution
3768
+ Masquerade Task or Service
3769
+ Asynchronous Procedure Call
3770
+ Traffic Duplication
3771
+ Plist File Modification
3772
+ JamPlus
3773
+ AppCert DLLs
3774
+ Email Forwarding Rule
3775
+ Data Staged
3776
+ Steal or Forge Authentication Certificates
3777
+ Device Registration
3778
+ System Network Connections Discovery
3779
+ Compromise Infrastructure
3780
+ Mark-of-the-Web Bypass
3781
+ Pre-OS Boot
3782
+ Portable Executable Injection
3783
+ Verclsid
3784
+ Compromise Accounts
3785
+ Launchctl
3786
+ Botnet
3787
+ Network Device CLI
3788
+ Shell History
3789
+ Downgrade Attack
3790
+ XPC Services
3791
+ Virtualization/Sandbox Evasion
3792
+ Web Service
3793
+ Credentials In Files
3794
+ Mshta
3795
+ Login Items
3796
+ Stage Capabilities
3797
+ Link Target
3798
+ Multi-Stage Channels
3799
+ Financial Theft
3800
+ Execution Guardrails
3801
+ Web Cookies
3802
+ Log Enumeration
3803
+ Token Impersonation/Theft
3804
+ Cloud Services
3805
+ Port Knocking
3806
+ LNK Icon Smuggling
3807
+ Web Services
3808
+ Steal Application Access Token
3809
+ Spearphishing Attachment
3810
+ Additional Cloud Credentials
3811
+ User Execution
3812
+ Internal Defacement
3813
+ Hidden Users
3814
+ Make and Impersonate Token
3815
+ Group Policy Preferences
3816
+ Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
3817
+ Cloud Account
3818
+ Process Discovery
3819
+ Impair Command History Logging
3820
+ Network Provider DLL
3821
+ Windows Management Instrumentation Event Subscription
3822
+ CDNs
3823
+ User Activity Based Checks
3824
+ Cloud Accounts
3825
+ Software Deployment Tools
3826
+ Exfiltration Over C2 Channel
3827
+ Parent PID Spoofing
3828
+ Gather Victim Org Information
3829
+ Forge Web Credentials
3830
+ Multi-Factor Authentication Request Generation
3831
+ Compromise Host Software Binary
3832
+ Chat Messages
3833
+ PowerShell
3834
+ Change Default File Association
3835
+ VDSO Hijacking
3836
+ File Transfer Protocols
3837
+ Exploitation for Credential Access
3838
+ Emond
3839
+ One-Way Communication
3840
+ Gather Victim Network Information
3841
+ Exploitation of Remote Services
3842
+ Registry Run Keys / Startup Folder
3843
+ Trusted Relationship
3844
+ Cloud Account
3845
+ Local Groups
3846
+ Search Open Websites/Domains
3847
+ Disable or Modify Network Device Firewall
3848
+ Account Manipulation
3849
+ Exfiltration Over Alternative Protocol
3850
+ Kernel Modules and Extensions
3851
+ Delay Execution
3852
+ GUI Input Capture
3853
+ Tool
3854
+ Exfiltration over USB
3855
+ KernelCallbackTable
3856
+ Search Closed Sources
3857
+ Systemd Timers
3858
+ Phishing
3859
+ ROMMONkit
3860
+ Compiled HTML File
3861
+ Compute Hijacking
3862
+ Network Share Connection Removal
3863
+ Multi-hop Proxy
3864
+ Brute Force
3865
+ Unix Shell
3866
+ Outlook Forms
3867
+ Disable or Modify Tools
3868
+ Data Manipulation
3869
+ Inter-Process Communication
3870
+ Data Obfuscation
3871
+ Data from Network Shared Drive
3872
+ Web Services
3873
+ Modify System Image
3874
+ Hijack Execution Flow
3875
+ Browser Fingerprint
3876
+ Lua
3877
+ Indicator Removal from Tools
3878
+ Malicious Image
3879
+ Container Service
3880
+ Valid Accounts
3881
+ Non-Standard Port
3882
+ Social Media Accounts
3883
+ Process Hollowing
3884
+ Exploitation for Privilege Escalation
3885
+ Resource Forking
3886
+ Account Access Removal
3887
+ Credential Stuffing
3888
+ Obfuscated Files or Information
3889
+ Multi-Factor Authentication
3890
+ Remote Email Collection
3891
+ IIS Components
3892
+ Invalid Code Signature
3893
+ Run Virtual Instance
3894
+ Polymorphic Code
3895
+ Password Policy Discovery
3896
+ Event Triggered Execution
3897
+ Unix Shell Configuration Modification
3898
+ Forced Authentication
3899
+ SID-History Injection
3900
+ Network Boundary Bridging
3901
+ Data Encrypted for Impact
3902
+ Subvert Trust Controls
3903
+ Elevated Execution with Prompt
3904
+ Firmware
3905
+ Encrypted Channel
3906
+ Authentication Package
3907
+ Regsvr32
3908
+ Exfiltration to Text Storage Sites
3909
+ Software
3910
+ Input Capture
3911
+ Spearphishing Voice
3912
+ Exploits
3913
+ Social Media
3914
+ Customer Relationship Management Software
3915
+ Component Object Model Hijacking
3916
+ Credentials
3917
+ Compromise Software Supply Chain
3918
+ Rename Legitimate Utilities
3919
+ Bidirectional Communication
3920
+ Exploitation for Client Execution
3921
+ Wordlist Scanning
3922
+ Spoof Security Alerting
3923
+ Outlook Home Page
3924
+ Asymmetric Cryptography
3925
+ Exfiltration to Cloud Storage
3926
+ Lateral Tool Transfer
3927
+ Path Interception by Unquoted Path
3928
+ Install Digital Certificate
3929
+ Startup Items
3930
+ System Language Discovery
3931
+ Non-Application Layer Protocol
3932
+ Container CLI/API
3933
+ Steganography
3934
+ DNS Server
3935
+ Protocol or Service Impersonation
3936
+ Query Registry
3937
+ Data Transfer Size Limits
3938
+ Web Session Cookie
3939
+ Domain Accounts
3940
+ Regsvcs/Regasm
3941
+ Install Root Certificate
3942
+ Network Logon Script
3943
+ Endpoint Denial of Service
3944
+ Compile After Delivery
3945
+ System Location Discovery
3946
+ VBA Stomping
3947
+ BITS Jobs
3948
+ MSBuild
3949
+ Impersonation
3950
+ Modify Cloud Compute Configurations
3951
+ Domain Fronting
3952
+ ARP Cache Poisoning
3953
+ Disable or Modify Cloud Logs
3954
+ Security Software Discovery
3955
+ Hidden Window
3956
+ ClickOnce
3957
+ Python
3958
+ Identify Roles
3959
+ Data Encoding
3960
+ AppInit DLLs
3961
+ Phishing for Information
3962
+ Resource Hijacking
3963
+ Establish Accounts
3964
+ Obtain Capabilities
3965
+ Conditional Access Policies
3966
+ Create Cloud Instance
3967
+ Cloud Secrets Management Stores
3968
+ Code Repositories
3969
+ Transmitted Data Manipulation
3970
+ /etc/passwd and /etc/shadow
3971
+ Launch Agent
3972
+ System Services
3973
+ Windows Command Shell
3974
+ Proc Memory
3975
+ Acquire Access
3976
+ Patch System Image
3977
+ Silver Ticket
3978
+ Data from Information Repositories
3979
+ Clear Persistence
3980
+ Hypervisor CLI
3981
+ Windows Credential Manager
3982
+ Masquerade Account Name
3983
+ Remote Desktop Software
3984
+ Server Software Component
3985
+ Data Destruction
3986
+ Non-Standard Encoding
3987
+ Domain Controller Authentication
3988
+ Transfer Data to Cloud Account
3989
+ HTML Smuggling
3990
+ Reversible Encryption
3991
+ Command Obfuscation
3992
+ File Deletion
3993
+ Drive-by Compromise
3994
+ Network Denial of Service
3995
+ Cloud Administration Command
3996
+ Installer Packages
3997
+ Scanning IP Blocks
3998
+ Template Injection
3999
+ RC Scripts
4000
+ Access Token Manipulation
4001
+ Multi-Factor Authentication Interception
4002
+ Software Packing
4003
+ Serverless
4004
+ Web Protocols
4005
+ Visual Basic
4006
+ Hidden File System
4007
+ Systemd Service
4008
+ RDP Hijacking
4009
+ Create Account
4010
+ XDG Autostart Entries
4011
+ Server
4012
+ Cloud Service Discovery
4013
+ Malicious Copy and Paste
4014
+ Remote System Discovery
4015
+ Network Service Discovery
4016
+ Domain Properties
4017
+ Software Discovery
4018
+ Cloud Service Dashboard
4019
+ Thread Local Storage
4020
+ Debugger Evasion
4021
+ SEO Poisoning
4022
+ Pass the Hash
4023
+ Exfiltration Over Physical Medium
4024
+ Ingress Tool Transfer
4025
+ SyncAppvPublishingServer
4026
+ Additional Email Delegate Permissions
4027
+ Code Signing Certificates
4028
+ TCC Manipulation
4029
+ Ptrace System Calls
4030
+ Power Settings
4031
+ Dynamic API Resolution
4032
+ Remote Desktop Protocol
4033
+ Logon Script (Windows)
4034
+ ListPlanting
4035
+ Hide Infrastructure
4036
+ Domain or Tenant Policy Modification
4037
+ XSL Script Processing
4038
+ Scan Databases
4039
+ Hidden Files and Directories
4040
+ Determine Physical Locations
4041
+ Office Test
4042
+ Develop Capabilities
4043
+ NTDS
4044
+ SNMP (MIB Dump)
4045
+ Steganography
4046
+ Malicious Link
4047
+ Application Access Token
4048
+ LSASS Driver
4049
+ Service Execution
4050
+ Cloud Accounts
4051
+ Environmental Keying
4052
+ Fallback Channels
4053
+ Local Storage Discovery
4054
+ NTFS File Attributes
4055
+ Kerberoasting
4056
+ DCSync
4057
+ System Time Discovery
4058
+ At
4059
+ Dynamic-link Library Injection
4060
+ Exploits
4061
+ Modify Authentication Process
4062
+ Udev Rules
4063
+ Credential API Hooking
4064
+ Inhibit System Recovery
4065
+ Netsh Helper DLL
4066
+ Spearphishing via Service
4067
+ Internal Proxy
4068
+ System Script Proxy Execution
4069
+ Dead Drop Resolver
4070
+ Junk Data
4071
+ Spearphishing Service
4072
+ vSphere Installation Bundles
4073
+ Container API
4074
+ Domains
4075
+ SQL Stored Procedures
4076
+ Disk Content Wipe
4077
+ Messaging Applications
4078
+ Exfiltration Over Unencrypted Non-C2 Protocol
4079
+ Compression
4080
+ Dylib Hijacking
4081
+ Downgrade System Image
4082
+ Local Accounts
4083
+ Wi-Fi Networks
4084
+ Exploitation for Defense Evasion
4085
+ Trusted Developer Utilities Proxy Execution
4086
+ System Shutdown/Reboot
4087
+ MMC
4088
+ Process Argument Spoofing
4089
+ COR_PROFILER
4090
+ Operation Dream Job
4091
+ KV Botnet Activity
4092
+ SharePoint ToolShell Exploitation
4093
+ Frankenstein
4094
+ RedDelta Modified PlugX Infection Chain Operations
4095
+ RedPenguin
4096
+ Operation Sharpshooter
4097
+ Operation Honeybee
4098
+ Operation MidnightEclipse
4099
+ Triton Safety Instrumented System Attack
4100
+ Operation Dust Storm
4101
+ 2015 Ukraine Electric Power Attack
4102
+ Indian Critical Infrastructure Intrusions
4103
+ Operation Spalax
4104
+ 3CX Supply Chain Attack
4105
+ Cutting Edge
4106
+ C0018
4107
+ Water Curupira Pikabot Distribution
4108
+ J-magic Campaign
4109
+ C0021
4110
+ C0015
4111
+ Operation Ghost
4112
+ Juicy Mix
4113
+ HomeLand Justice
4114
+ C0032
4115
+ SolarWinds Compromise
4116
+ Pikabot Distribution February 2024
4117
+ FunnyDream
4118
+ Operation CuckooBees
4119
+ Salesforce Data Exfiltration
4120
+ APT28 Nearest Neighbor Campaign
4121
+ Outer Space
4122
+ ArcaneDoor
4123
+ C0033
4124
+ 2016 Ukraine Electric Power Attack
4125
+ C0010
4126
+ APT41 DUST
4127
+ Night Dragon
4128
+ Versa Director Zero Day Exploitation
4129
+ Operation Wocao
4130
+ C0011
4131
+ C0017
4132
+ C0026
4133
+ C0027
4134
+ 2022 Ukraine Electric Power Attack
4135
+ Quad7 Activity
4136
+ FLORAHOX Activity
4137
+ CostaRicto
4138
+ The MITRE Corporation
4139
+ APT38
4140
+ Indrik Spider
4141
+ BlackByte
4142
+ Elderwood
4143
+ SideCopy
4144
+ GALLIUM
4145
+ APT17
4146
+ APT3
4147
+ Mustard Tempest
4148
+ Kimsuky
4149
+ EXOTIC LILY
4150
+ TA577
4151
+ admin@338
4152
+ Volt Typhoon
4153
+ Patchwork
4154
+ APT41
4155
+ Salt Typhoon
4156
+ Dragonfly
4157
+ Evilnum
4158
+ Gorgon Group
4159
+ menuPass
4160
+ APT32
4161
+ HAFNIUM
4162
+ MuddyWater
4163
+ Strider
4164
+ Naikon
4165
+ FIN6
4166
+ RedEcho
4167
+ Gamaredon Group
4168
+ Storm-1811
4169
+ Leafminer
4170
+ TeamTNT
4171
+ FIN7
4172
+ Sandworm Team
4173
+ Machete
4174
+ APT18
4175
+ Andariel
4176
+ CURIUM
4177
+ Sidewinder
4178
+ Mustang Panda
4179
+ Scattered Spider
4180
+ APT39
4181
+ UNC3886
4182
+ Contagious Interview
4183
+ TA2541
4184
+ Akira
4185
+ APT37
4186
+ Moses Staff
4187
+ OilRig
4188
+ Windigo
4189
+ Higaisa
4190
+ Carbanak
4191
+ Tropic Trooper
4192
+ Orangeworm
4193
+ Sea Turtle
4194
+ Suckfly
4195
+ Putter Panda
4196
+ POLONIUM
4197
+ TA459
4198
+ Aquatic Panda
4199
+ Aoqin Dragon
4200
+ Ferocious Kitten
4201
+ The White Company
4202
+ Ke3chang
4203
+ Saint Bear
4204
+ APT1
4205
+ DarkHydrus
4206
+ Confucius
4207
+ BlackTech
4208
+ Leviathan
4209
+ MoustachedBouncer
4210
+ Group5
4211
+ Blue Mockingbird
4212
+ SilverTerrier
4213
+ Turla
4214
+ Storm-0501
4215
+ TA505
4216
+ BITTER
4217
+ DarkVishnya
4218
+ FIN5
4219
+ Mofang
4220
+ Lotus Blossom
4221
+ APT29
4222
+ Dark Caracal
4223
+ Cinnamon Tempest
4224
+ Chimera
4225
+ Cleaver
4226
+ Medusa Group
4227
+ BRONZE BUTLER
4228
+ TA551
4229
+ TEMP.Veles
4230
+ BackdoorDiplomacy
4231
+ Star Blizzard
4232
+ Axiom
4233
+ TA578
4234
+ Deep Panda
4235
+ Ember Bear
4236
+ LazyScripter
4237
+ Windshift
4238
+ Volatile Cedar
4239
+ ToddyCat
4240
+ Whitefly
4241
+ LuminousMoth
4242
+ Agrius
4243
+ Water Galura
4244
+ APT28
4245
+ Malteiro
4246
+ Metador
4247
+ APT42
4248
+ APT5
4249
+ Fox Kitten
4250
+ RTM
4251
+ APT12
4252
+ APT-C-36
4253
+ Winnti Group
4254
+ Tonto Team
4255
+ GOLD SOUTHFIELD
4256
+ Lazarus Group
4257
+ INC Ransom
4258
+ Earth Lusca
4259
+ Silence
4260
+ Sowbug
4261
+ Threat Group-1314
4262
+ Thrip
4263
+ APT16
4264
+ LAPSUS$
4265
+ Cobalt Group
4266
+ CopyKittens
4267
+ Wizard Spider
4268
+ Molerats
4269
+ Velvet Ant
4270
+ Transparent Tribe
4271
+ IndigoZebra
4272
+ Moonstone Sleet
4273
+ Inception
4274
+ Play
4275
+ PROMETHIUM
4276
+ APT30
4277
+ HEXANE
4278
+ DragonOK
4279
+ Daggerfly
4280
+ Rancor
4281
+ WIRTE
4282
+ PLATINUM
4283
+ Magic Hound
4284
+ Ajax Security Team
4285
+ Threat Group-3390
4286
+ APT33
4287
+ FIN10
4288
+ FIN8
4289
+ FIN13
4290
+ APT19
4291
+ PittyTiger
4292
+ Nomadic Octopus
4293
+ PoisonIvy
4294
+ None
4295
+ ngrok