You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

296 KiB

1TypeDescriptionTechniqueIdCombinedTechniqueData_ComponentData_Component_Description
2DetectionT1003.008/etc/passwd and /etc/shadowCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
3DetectionT1003.008/etc/passwd and /etc/shadowFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
4DetectionT1557.002ARP Cache PoisoningNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
5DetectionT1557.002ARP Cache PoisoningNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
6DetectionT1558.004AS-REP RoastingActive Directory Credential RequestA user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)
7DetectionT1548Abuse Elevation Control MechanismProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
8DetectionT1548Abuse Elevation Control MechanismProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
9DetectionT1548Abuse Elevation Control MechanismWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
10DetectionT1548Abuse Elevation Control MechanismCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
11DetectionT1548Abuse Elevation Control MechanismFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
12DetectionT1548Abuse Elevation Control MechanismFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
13DetectionT1548Abuse Elevation Control MechanismOS API ExecutionOperating system function/method calls executed by a process
14DetectionT1134Access Token ManipulationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
15DetectionT1134Access Token ManipulationProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
16DetectionT1134Access Token ManipulationOS API ExecutionOperating system function/method calls executed by a process
17DetectionT1134Access Token ManipulationUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
18DetectionT1134Access Token ManipulationActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
19DetectionT1134Access Token ManipulationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
20DetectionT1546.008Accessibility FeaturesProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
21DetectionT1546.008Accessibility FeaturesWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
22DetectionT1546.008Accessibility FeaturesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
23DetectionT1546.008Accessibility FeaturesFile CreationInitial construction of a new file (ex: Sysmon EID 11)
24DetectionT1546.008Accessibility FeaturesFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
25DetectionT1531Account Access RemovalUser Account DeletionRemoval of an account (ex: Windows EID 4726 or /var/log access/authentication logs)
26DetectionT1531Account Access RemovalUser Account ModificationChanges made to an account, such as permissions and/or membership in specific groups (ex: Windows EID 4738 or /var/log access/authentication logs)
27DetectionT1531Account Access RemovalActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
28DetectionT1087Account DiscoveryUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
29DetectionT1087Account DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
30DetectionT1087Account DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
31DetectionT1087Account DiscoveryFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
32DetectionT1098Account ManipulationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
33DetectionT1098Account ManipulationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
34DetectionT1098Account ManipulationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
35DetectionT1098Account ManipulationGroup ModificationChanges made to a group, such as membership, name, or permissions (ex: Windows EID 4728 or 4732, AWS IAM UpdateGroup)
36DetectionT1098Account ManipulationUser Account ModificationChanges made to an account, such as permissions and/or membership in specific groups (ex: Windows EID 4738 or /var/log access/authentication logs)
37DetectionT1098Account ManipulationActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
38DetectionT1583Acquire InfrastructureResponse MetadataContextual data about an Internet-facing resource gathered from a scan, such as running services or ports
39DetectionT1583Acquire InfrastructureResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
40DetectionT1583Acquire InfrastructureActive DNSQueried domain name system (DNS) registry data highlighting current domain to IP address resolutions (ex: dig/nslookup queries)
41DetectionT1583Acquire InfrastructurePassive DNSLogged domain name system (DNS) data highlighting timelines of domain to IP address resolutions (ex: passive DNS)
42DetectionT1583Acquire InfrastructureDomain RegistrationInformation about domain name assignments and other domain metadata (ex: WHOIS)
43DetectionT1595Active ScanningNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
44DetectionT1595Active ScanningNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
45DetectionT1547.014Active SetupWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
46DetectionT1547.014Active SetupWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
47DetectionT1547.014Active SetupProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
48DetectionT1547.014Active SetupCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
49DetectionT1098.003Add Office 365 Global Administrator RoleUser Account ModificationChanges made to an account, such as permissions and/or membership in specific groups (ex: Windows EID 4738 or /var/log access/authentication logs)
50DetectionT1137.006Add-insProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
51DetectionT1137.006Add-insCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
52DetectionT1137.006Add-insWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
53DetectionT1137.006Add-insWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
54DetectionT1137.006Add-insFile CreationInitial construction of a new file (ex: Sysmon EID 11)
55DetectionT1137.006Add-insFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
56DetectionT1098.001Additional Cloud CredentialsUser Account ModificationChanges made to an account, such as permissions and/or membership in specific groups (ex: Windows EID 4738 or /var/log access/authentication logs)
57DetectionT1098.001Additional Cloud CredentialsActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
58DetectionT1557Adversary-in-the-MiddleNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
59DetectionT1557Adversary-in-the-MiddleNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
60DetectionT1557Adversary-in-the-MiddleService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
61DetectionT1557Adversary-in-the-MiddleWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
62DetectionT1546.009AppCert DLLsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
63DetectionT1546.009AppCert DLLsWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
64DetectionT1546.009AppCert DLLsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
65DetectionT1546.009AppCert DLLsModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
66DetectionT1546.010AppInit DLLsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
67DetectionT1546.010AppInit DLLsWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
68DetectionT1546.010AppInit DLLsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
69DetectionT1546.010AppInit DLLsModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
70DetectionT1059.002AppleScriptCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
71DetectionT1059.002AppleScriptProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
72DetectionT1059.002AppleScriptOS API ExecutionOperating system function/method calls executed by a process
73DetectionT1550.001Application Access TokenWeb Credential UsageAn attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)
74DetectionT1550.001Application Access TokenApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
75DetectionT1499.003Application Exhaustion FloodHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
76DetectionT1499.003Application Exhaustion FloodApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
77DetectionT1499.003Application Exhaustion FloodNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
78DetectionT1499.003Application Exhaustion FloodNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
79DetectionT1071Application Layer ProtocolNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
80DetectionT1071Application Layer ProtocolNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
81DetectionT1546.011Application ShimmingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
82DetectionT1546.011Application ShimmingWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
83DetectionT1546.011Application ShimmingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
84DetectionT1546.011Application ShimmingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
85DetectionT1546.011Application ShimmingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
86DetectionT1010Application Window DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
87DetectionT1010Application Window DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
88DetectionT1010Application Window DiscoveryOS API ExecutionOperating system function/method calls executed by a process
89DetectionT1499.004Application or System ExploitationHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
90DetectionT1499.004Application or System ExploitationApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
91DetectionT1499.004Application or System ExploitationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
92DetectionT1499.004Application or System ExploitationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
93DetectionT1560Archive Collected DataProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
94DetectionT1560Archive Collected DataCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
95DetectionT1560Archive Collected DataFile CreationInitial construction of a new file (ex: Sysmon EID 11)
96DetectionT1560Archive Collected DataScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
97DetectionT1560.003Archive via Custom MethodFile CreationInitial construction of a new file (ex: Sysmon EID 11)
98DetectionT1560.003Archive via Custom MethodScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
99DetectionT1560.002Archive via LibraryFile CreationInitial construction of a new file (ex: Sysmon EID 11)
100DetectionT1560.002Archive via LibraryScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
101DetectionT1560.001Archive via UtilityProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
102DetectionT1560.001Archive via UtilityCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
103DetectionT1560.001Archive via UtilityFile CreationInitial construction of a new file (ex: Sysmon EID 11)
104DetectionT1573.002Asymmetric CryptographyNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
105DetectionT1055.004Asynchronous Procedure CallProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
106DetectionT1055.004Asynchronous Procedure CallOS API ExecutionOperating system function/method calls executed by a process
107DetectionT1055.004Asynchronous Procedure CallProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
108DetectionT1053.001At (Linux)Scheduled Job CreationInitial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)
109DetectionT1053.001At (Linux)Command ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
110DetectionT1053.001At (Linux)Process CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
111DetectionT1053.002At (Windows)Scheduled Job CreationInitial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)
112DetectionT1053.002At (Windows)Command ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
113DetectionT1053.002At (Windows)File ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
114DetectionT1053.002At (Windows)Process CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
115DetectionT1123Audio CaptureOS API ExecutionOperating system function/method calls executed by a process
116DetectionT1123Audio CaptureCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
117DetectionT1547.002Authentication PackageWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
118DetectionT1547.002Authentication PackageModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
119DetectionT1547.002Authentication PackageCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
120DetectionT1119Automated CollectionFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
121DetectionT1119Automated CollectionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
122DetectionT1119Automated CollectionScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
123DetectionT1020Automated ExfiltrationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
124DetectionT1020Automated ExfiltrationScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
125DetectionT1020Automated ExfiltrationNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
126DetectionT1020Automated ExfiltrationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
127DetectionT1020Automated ExfiltrationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
128DetectionT1020Automated ExfiltrationFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
129DetectionT1197BITS JobsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
130DetectionT1197BITS JobsNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
131DetectionT1197BITS JobsService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
132DetectionT1197BITS JobsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
133DetectionT1552.003Bash HistoryFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
134DetectionT1552.003Bash HistoryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
135DetectionT1102.002Bidirectional CommunicationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
136DetectionT1102.002Bidirectional CommunicationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
137DetectionT1102.002Bidirectional CommunicationNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
138DetectionT1027.001Binary PaddingFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
139DetectionT1547Boot or Logon Autostart ExecutionFile CreationInitial construction of a new file (ex: Sysmon EID 11)
140DetectionT1547Boot or Logon Autostart ExecutionWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
141DetectionT1547Boot or Logon Autostart ExecutionWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
142DetectionT1547Boot or Logon Autostart ExecutionFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
143DetectionT1547Boot or Logon Autostart ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
144DetectionT1547Boot or Logon Autostart ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
145DetectionT1547Boot or Logon Autostart ExecutionModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
146DetectionT1547Boot or Logon Autostart ExecutionKernel Module LoadAn object file that contains code to extend the running kernel of an OS, typically used to add support for new hardware (as device drivers) and/or filesystems, or for adding system calls
147DetectionT1547Boot or Logon Autostart ExecutionDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
148DetectionT1547Boot or Logon Autostart ExecutionOS API ExecutionOperating system function/method calls executed by a process
149DetectionT1037Boot or Logon Initialization ScriptsWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
150DetectionT1037Boot or Logon Initialization ScriptsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
151DetectionT1037Boot or Logon Initialization ScriptsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
152DetectionT1037Boot or Logon Initialization ScriptsActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
153DetectionT1037Boot or Logon Initialization ScriptsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
154DetectionT1037Boot or Logon Initialization ScriptsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
155DetectionT1542.003BootkitDrive ModificationChanges made to a drive letter or mount point of a data storage device
156DetectionT1217Browser Bookmark DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
157DetectionT1217Browser Bookmark DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
158DetectionT1217Browser Bookmark DiscoveryFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
159DetectionT1176Browser ExtensionsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
160DetectionT1176Browser ExtensionsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
161DetectionT1176Browser ExtensionsNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
162DetectionT1176Browser ExtensionsWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
163DetectionT1176Browser ExtensionsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
164DetectionT1185Browser Session HijackingProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
165DetectionT1185Browser Session HijackingProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
166DetectionT1185Browser Session HijackingLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
167DetectionT1110Brute ForceCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
168DetectionT1110Brute ForceUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
169DetectionT1110Brute ForceApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
170DetectionT1612Build Image on HostImage CreationInitial construction of a virtual machine image (ex: Azure Compute Service Images PUT)
171DetectionT1612Build Image on HostNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
172DetectionT1612Build Image on HostNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
173DetectionT1612Build Image on HostNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
174DetectionT1548.002Bypass User Account ControlProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
175DetectionT1548.002Bypass User Account ControlProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
176DetectionT1548.002Bypass User Account ControlWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
177DetectionT1548.002Bypass User Account ControlCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
178DetectionT1218.003CMSTPProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
179DetectionT1218.003CMSTPCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
180DetectionT1218.003CMSTPNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
181DetectionT1574.012COR_PROFILERWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
182DetectionT1574.012COR_PROFILERProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
183DetectionT1574.012COR_PROFILERModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
184DetectionT1574.012COR_PROFILERCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
185DetectionT1003.005Cached Domain CredentialsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
186DetectionT1546.001Change Default File AssociationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
187DetectionT1546.001Change Default File AssociationWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
188DetectionT1546.001Change Default File AssociationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
189DetectionT1070.003Clear Command HistoryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
190DetectionT1070.003Clear Command HistoryFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
191DetectionT1070.003Clear Command HistoryFile DeletionRemoval of a file (ex: Sysmon EID 23)
192DetectionT1070.002Clear Linux or Mac System LogsFile DeletionRemoval of a file (ex: Sysmon EID 23)
193DetectionT1070.002Clear Linux or Mac System LogsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
194DetectionT1070.002Clear Linux or Mac System LogsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
195DetectionT1070.001Clear Windows Event LogsOS API ExecutionOperating system function/method calls executed by a process
196DetectionT1070.001Clear Windows Event LogsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
197DetectionT1592.004Client ConfigurationsResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
198DetectionT1115Clipboard DataOS API ExecutionOperating system function/method calls executed by a process
199DetectionT1115Clipboard DataCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
200DetectionT1136.003Cloud AccountUser Account CreationInitial construction of a new account (ex: Windows EID 4720 or /etc/passwd logs)
201DetectionT1087.004Cloud AccountUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
202DetectionT1087.004Cloud AccountCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
203DetectionT1078.004Cloud AccountsLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
204DetectionT1078.004Cloud AccountsUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
205DetectionT1078.004Cloud AccountsLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
206DetectionT1069.003Cloud GroupsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
207DetectionT1069.003Cloud GroupsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
208DetectionT1069.003Cloud GroupsGroup EnumerationAn extracted list of available groups and/or their associated settings (ex: AWS list-groups)
209DetectionT1069.003Cloud GroupsGroup MetadataContextual data about a group which describes group and activity around it, such as name, permissions, or user accounts within the group
210DetectionT1069.003Cloud GroupsApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
211DetectionT1580Cloud Infrastructure DiscoveryInstance MetadataContextual data about an instance and activity around it such as name, type, or status
212DetectionT1580Cloud Infrastructure DiscoveryInstance EnumerationAn extracted list of instances within a cloud environment (ex: instance.list within GCP Audit Logs)
213DetectionT1580Cloud Infrastructure DiscoverySnapshot MetadataContextual data about a snapshot, which may include information such as ID, type, and status
214DetectionT1580Cloud Infrastructure DiscoverySnapshot EnumerationAn extracted list of snapshops within a cloud environment (ex: AWS describe-snapshots)
215DetectionT1580Cloud Infrastructure DiscoveryCloud Storage MetadataContextual data about cloud storage infrastructure and activity around it such as name, size, or owner
216DetectionT1580Cloud Infrastructure DiscoveryCloud Storage EnumerationAn extracted list of cloud storage infrastructure (ex: AWS S3 ListBuckets or ListObjects)
217DetectionT1580Cloud Infrastructure DiscoveryVolume MetadataContextual data about a cloud volume and activity around it, such as id, type, state, and size
218DetectionT1580Cloud Infrastructure DiscoveryVolume EnumerationAn extracted list of available volumes within a cloud environment (ex: AWS describe-volumes)
219DetectionT1552.005Cloud Instance Metadata APIUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
220DetectionT1538Cloud Service DashboardUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
221DetectionT1538Cloud Service DashboardLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
222DetectionT1526Cloud Service DiscoveryCloud Service MetadataContextual data about a cloud service and activity around it such as name, type, or purpose/function
223DetectionT1526Cloud Service DiscoveryCloud Service EnumerationAn extracted list of cloud services (ex: AWS ECS ListServices)
224DetectionT1619Cloud Storage Object DiscoveryCloud Storage EnumerationAn extracted list of cloud storage infrastructure (ex: AWS S3 ListBuckets or ListObjects)
225DetectionT1619Cloud Storage Object DiscoveryCloud Storage AccessOpening of a cloud storage infrastructure, typically to collect/read its value (ex: AWS S3 GetObject)
226DetectionT1213.003Code RepositoriesLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
227DetectionT1213.003Code RepositoriesApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
228DetectionT1553.002Code SigningFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
229DetectionT1587.002Code Signing CertificatesMalware MetadataContextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information
230DetectionT1588.003Code Signing CertificatesMalware MetadataContextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information
231DetectionT1553.006Code Signing Policy ModificationWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
232DetectionT1553.006Code Signing Policy ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
233DetectionT1553.006Code Signing Policy ModificationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
234DetectionT1059Command and Scripting InterpreterCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
235DetectionT1059Command and Scripting InterpreterProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
236DetectionT1059Command and Scripting InterpreterModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
237DetectionT1059Command and Scripting InterpreterScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
238DetectionT1092Communication Through Removable MediaDrive CreationInitial construction of a drive letter or mount point to a data storage device
239DetectionT1092Communication Through Removable MediaDrive AccessOpening of a data storage device with an assigned drive letter or mount point
240DetectionT1027.004Compile After DeliveryFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
241DetectionT1027.004Compile After DeliveryFile CreationInitial construction of a new file (ex: Sysmon EID 11)
242DetectionT1027.004Compile After DeliveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
243DetectionT1027.004Compile After DeliveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
244DetectionT1218.001Compiled HTML FileProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
245DetectionT1218.001Compiled HTML FileFile CreationInitial construction of a new file (ex: Sysmon EID 11)
246DetectionT1218.001Compiled HTML FileCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
247DetectionT1542.002Component FirmwareDriver MetadataContextual data about a driver and activity around it such as driver issues reporting or integrity (page hash, code) checking
248DetectionT1542.002Component FirmwareFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
249DetectionT1542.002Component FirmwareOS API ExecutionOperating system function/method calls executed by a process
250DetectionT1559.001Component Object ModelModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
251DetectionT1559.001Component Object ModelProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
252DetectionT1559.001Component Object ModelScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
253DetectionT1546.015Component Object Model HijackingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
254DetectionT1546.015Component Object Model HijackingWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
255DetectionT1546.015Component Object Model HijackingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
256DetectionT1546.015Component Object Model HijackingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
257DetectionT1586Compromise AccountsSocial MediaEstablished, compromised, or otherwise acquired social media personas
258DetectionT1586Compromise AccountsNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
259DetectionT1554Compromise Client Software BinaryFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
260DetectionT1554Compromise Client Software BinaryFile CreationInitial construction of a new file (ex: Sysmon EID 11)
261DetectionT1554Compromise Client Software BinaryFile DeletionRemoval of a file (ex: Sysmon EID 23)
262DetectionT1554Compromise Client Software BinaryFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
263DetectionT1584Compromise InfrastructureResponse MetadataContextual data about an Internet-facing resource gathered from a scan, such as running services or ports
264DetectionT1584Compromise InfrastructureResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
265DetectionT1584Compromise InfrastructureActive DNSQueried domain name system (DNS) registry data highlighting current domain to IP address resolutions (ex: dig/nslookup queries)
266DetectionT1584Compromise InfrastructurePassive DNSLogged domain name system (DNS) data highlighting timelines of domain to IP address resolutions (ex: passive DNS)
267DetectionT1584Compromise InfrastructureDomain RegistrationInformation about domain name assignments and other domain metadata (ex: WHOIS)
268DetectionT1213.001ConfluenceLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
269DetectionT1213.001ConfluenceApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
270DetectionT1552.007Container APICommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
271DetectionT1552.007Container APIFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
272DetectionT1552.007Container APIUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
273DetectionT1609Container Administration CommandCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
274DetectionT1053.007Container Orchestration JobScheduled Job CreationInitial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)
275DetectionT1053.007Container Orchestration JobContainer CreationInitial construction of a new container (ex: docker create <container_name>)
276DetectionT1053.007Container Orchestration JobFile CreationInitial construction of a new file (ex: Sysmon EID 11)
277DetectionT1613Container and Resource DiscoveryCluster MetadataContextual data about a cluster and activity around it such as name, namespace, age, or status
278DetectionT1613Container and Resource DiscoveryContainer EnumerationAn extracted list of containers (ex: docker ps)
279DetectionT1613Container and Resource DiscoveryContainer MetadataContextual data about a container and activity around it such as name, ID, image, or status
280DetectionT1613Container and Resource DiscoveryPod EnumerationAn extracted list of pods within a cluster (ex: kubectl get pods)
281DetectionT1613Container and Resource DiscoveryPod MetadataContextual data about a pod and activity around it such as name, ID, namespace, or status
282DetectionT1613Container and Resource DiscoveryApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
283DetectionT1218.002Control PanelProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
284DetectionT1218.002Control PanelFile CreationInitial construction of a new file (ex: Sysmon EID 11)
285DetectionT1218.002Control PanelModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
286DetectionT1218.002Control PanelOS API ExecutionOperating system function/method calls executed by a process
287DetectionT1218.002Control PanelCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
288DetectionT1218.002Control PanelWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
289DetectionT1136Create AccountUser Account CreationInitial construction of a new account (ex: Windows EID 4720 or /etc/passwd logs)
290DetectionT1136Create AccountProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
291DetectionT1136Create AccountCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
292DetectionT1578.002Create Cloud InstanceInstance CreationInitial construction of a new instance (ex: instance.insert within GCP Audit Logs)
293DetectionT1134.002Create Process with TokenOS API ExecutionOperating system function/method calls executed by a process
294DetectionT1134.002Create Process with TokenCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
295DetectionT1578.001Create SnapshotSnapshot CreationInitial construction of a new snapshot (ex: AWS create-snapshot)
296DetectionT1543Create or Modify System ProcessService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
297DetectionT1543Create or Modify System ProcessService ModificationChanges made to a service/daemon, such as changes to name, description, and/or start type (ex: Windows EID 7040 or /var/log daemon logs)
298DetectionT1543Create or Modify System ProcessProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
299DetectionT1543Create or Modify System ProcessOS API ExecutionOperating system function/method calls executed by a process
300DetectionT1543Create or Modify System ProcessCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
301DetectionT1543Create or Modify System ProcessWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
302DetectionT1543Create or Modify System ProcessWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
303DetectionT1543Create or Modify System ProcessFile CreationInitial construction of a new file (ex: Sysmon EID 11)
304DetectionT1543Create or Modify System ProcessFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
305DetectionT1056.004Credential API HookingOS API ExecutionOperating system function/method calls executed by a process
306DetectionT1056.004Credential API HookingProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
307DetectionT1110.004Credential StuffingUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
308DetectionT1110.004Credential StuffingApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
309DetectionT1552.001Credentials In FilesFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
310DetectionT1552.001Credentials In FilesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
311DetectionT1555Credentials from Password StoresProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
312DetectionT1555Credentials from Password StoresFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
313DetectionT1555Credentials from Password StoresCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
314DetectionT1555Credentials from Password StoresOS API ExecutionOperating system function/method calls executed by a process
315DetectionT1555Credentials from Password StoresProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
316DetectionT1555.003Credentials from Web BrowsersFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
317DetectionT1555.003Credentials from Web BrowsersCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
318DetectionT1555.003Credentials from Web BrowsersOS API ExecutionOperating system function/method calls executed by a process
319DetectionT1555.003Credentials from Web BrowsersProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
320DetectionT1552.002Credentials in RegistryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
321DetectionT1552.002Credentials in RegistryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
322DetectionT1552.002Credentials in RegistryWindows Registry Key AccessOpening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
323DetectionT1053.003CronScheduled Job CreationInitial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)
324DetectionT1053.003CronCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
325DetectionT1053.003CronFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
326DetectionT1053.003CronProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
327DetectionT1003.006DCSyncActive Directory Object AccessOpening of an active directory object, typically to collect/read its value (ex: Windows EID 4661)
328DetectionT1003.006DCSyncNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
329DetectionT1003.006DCSyncNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
330DetectionT1574.001DLL Search Order HijackingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
331DetectionT1574.001DLL Search Order HijackingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
332DetectionT1574.001DLL Search Order HijackingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
333DetectionT1574.002DLL Side-LoadingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
334DetectionT1574.002DLL Side-LoadingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
335DetectionT1574.002DLL Side-LoadingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
336DetectionT1574.002DLL Side-LoadingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
337DetectionT1071.004DNSNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
338DetectionT1071.004DNSNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
339DetectionT1568.003DNS CalculationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
340DetectionT1584.002DNS ServerActive DNSQueried domain name system (DNS) registry data highlighting current domain to IP address resolutions (ex: dig/nslookup queries)
341DetectionT1584.002DNS ServerPassive DNSLogged domain name system (DNS) data highlighting timelines of domain to IP address resolutions (ex: passive DNS)
342DetectionT1485Data DestructionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
343DetectionT1485Data DestructionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
344DetectionT1485Data DestructionFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
345DetectionT1485Data DestructionFile DeletionRemoval of a file (ex: Sysmon EID 23)
346DetectionT1485Data DestructionImage DeletionRemoval of a virtual machine image (ex: Azure Compute Service Images DELETE)
347DetectionT1485Data DestructionInstance DeletionRemoval of an instance (ex: instance.delete within GCP Audit Logs)
348DetectionT1485Data DestructionSnapshot DeletionRemoval of a snapshot (ex: AWS delete-snapshot)
349DetectionT1485Data DestructionCloud Storage DeletionRemoval of cloud storage infrastructure (ex: AWS S3 DeleteBucket)
350DetectionT1485Data DestructionVolume DeletionRemoval of a a cloud volume (ex: AWS delete-volume)
351DetectionT1132Data EncodingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
352DetectionT1486Data Encrypted for ImpactCloud Storage MetadataContextual data about cloud storage infrastructure and activity around it such as name, size, or owner
353DetectionT1486Data Encrypted for ImpactCloud Storage ModificationChanges made to cloud storage infrastructure, including its settings and/or data (ex: AWS S3 PutObject or PutObjectAcl)
354DetectionT1486Data Encrypted for ImpactProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
355DetectionT1486Data Encrypted for ImpactCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
356DetectionT1486Data Encrypted for ImpactFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
357DetectionT1486Data Encrypted for ImpactFile CreationInitial construction of a new file (ex: Sysmon EID 11)
358DetectionT1565Data ManipulationFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
359DetectionT1565Data ManipulationOS API ExecutionOperating system function/method calls executed by a process
360DetectionT1565Data ManipulationFile CreationInitial construction of a new file (ex: Sysmon EID 11)
361DetectionT1565Data ManipulationFile DeletionRemoval of a file (ex: Sysmon EID 23)
362DetectionT1565Data ManipulationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
363DetectionT1565Data ManipulationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
364DetectionT1565Data ManipulationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
365DetectionT1001Data ObfuscationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
366DetectionT1074Data StagedFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
367DetectionT1074Data StagedFile CreationInitial construction of a new file (ex: Sysmon EID 11)
368DetectionT1074Data StagedCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
369DetectionT1030Data Transfer Size LimitsNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
370DetectionT1030Data Transfer Size LimitsNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
371DetectionT1530Data from Cloud Storage ObjectCloud Storage AccessOpening of a cloud storage infrastructure, typically to collect/read its value (ex: AWS S3 GetObject)
372DetectionT1602Data from Configuration RepositoryNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
373DetectionT1602Data from Configuration RepositoryNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
374DetectionT1213Data from Information RepositoriesLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
375DetectionT1213Data from Information RepositoriesApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
376DetectionT1005Data from Local SystemScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
377DetectionT1005Data from Local SystemFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
378DetectionT1005Data from Local SystemCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
379DetectionT1039Data from Network Shared DriveFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
380DetectionT1039Data from Network Shared DriveNetwork Share AccessOpening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)
381DetectionT1039Data from Network Shared DriveCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
382DetectionT1025Data from Removable MediaFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
383DetectionT1025Data from Removable MediaCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
384DetectionT1102.001Dead Drop ResolverNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
385DetectionT1102.001Dead Drop ResolverNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
386DetectionT1491DefacementFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
387DetectionT1491DefacementFile CreationInitial construction of a new file (ex: Sysmon EID 11)
388DetectionT1491DefacementApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
389DetectionT1491DefacementNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
390DetectionT1078.001Default AccountsUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
391DetectionT1078.001Default AccountsLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
392DetectionT1578.003Delete Cloud InstanceInstance DeletionRemoval of an instance (ex: instance.delete within GCP Audit Logs)
393DetectionT1140Deobfuscate/Decode Files or InformationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
394DetectionT1140Deobfuscate/Decode Files or InformationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
395DetectionT1140Deobfuscate/Decode Files or InformationScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
396DetectionT1610Deploy ContainerContainer CreationInitial construction of a new container (ex: docker create <container_name>)
397DetectionT1610Deploy ContainerContainer StartActivation or invocation of a container (ex: docker start or docker restart)
398DetectionT1610Deploy ContainerPod CreationInitial construction of a new pod (ex: kubectl apply|run)
399DetectionT1610Deploy ContainerPod ModificationChanges made to a pod, including its settings and/or control data (ex: kubectl set|patch|edit)
400DetectionT1610Deploy ContainerApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
401DetectionT1587Develop CapabilitiesMalware MetadataContextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information
402DetectionT1587Develop CapabilitiesMalware ContentCode, strings, and other signatures that compromise a malicious payload
403DetectionT1587Develop CapabilitiesResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
404DetectionT1587.003Digital CertificatesResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
405DetectionT1588.004Digital CertificatesCertificate RegistrationQueried or logged information highlighting current and expired digital certificates (ex: Certificate transparency)
406DetectionT1588.004Digital CertificatesResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
407DetectionT1498.001Direct Network FloodHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
408DetectionT1498.001Direct Network FloodNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
409DetectionT1006Direct Volume AccessCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
410DetectionT1006Direct Volume AccessDrive AccessOpening of a data storage device with an assigned drive letter or mount point
411DetectionT1562.008Disable Cloud LogsCloud Service ModificationChanges made to a cloud service, including its settings and/or data (ex: AWS CloudTrail DeleteTrail or DeleteConfigRule)
412DetectionT1562.008Disable Cloud LogsCloud Service DisableDeactivation or stoppage of a cloud service (ex: AWS Cloudtrail StopLogging)
413DetectionT1600.002Disable Crypto HardwareFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
414DetectionT1562.002Disable Windows Event LoggingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
415DetectionT1562.002Disable Windows Event LoggingScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
416DetectionT1562.002Disable Windows Event LoggingWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
417DetectionT1562.002Disable Windows Event LoggingApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
418DetectionT1562.002Disable Windows Event LoggingHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
419DetectionT1562.002Disable Windows Event LoggingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
420DetectionT1562.007Disable or Modify Cloud FirewallFirewall Rule ModificationChanges made to a firewall rule, typically to allow/block specific network traffic (ex: Windows EID 4950 or Write/Delete entries within Azure Firewall Rule Collection Activity Logs)
421DetectionT1562.007Disable or Modify Cloud FirewallFirewall DisableDeactivation or stoppage of a cloud service (ex: Write/Delete entries within Azure Firewall Activity Logs)
422DetectionT1562.004Disable or Modify System FirewallCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
423DetectionT1562.004Disable or Modify System FirewallWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
424DetectionT1562.004Disable or Modify System FirewallFirewall DisableDeactivation or stoppage of a cloud service (ex: Write/Delete entries within Azure Firewall Activity Logs)
425DetectionT1562.004Disable or Modify System FirewallFirewall Rule ModificationChanges made to a firewall rule, typically to allow/block specific network traffic (ex: Windows EID 4950 or Write/Delete entries within Azure Firewall Rule Collection Activity Logs)
426DetectionT1562.001Disable or Modify ToolsProcess TerminationExit of a running process (ex: Sysmon EID 5 or Windows EID 4689)
427DetectionT1562.001Disable or Modify ToolsWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
428DetectionT1562.001Disable or Modify ToolsWindows Registry Key DeletionRemoval of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
429DetectionT1562.001Disable or Modify ToolsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
430DetectionT1562.001Disable or Modify ToolsService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
431DetectionT1562.001Disable or Modify ToolsHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
432DetectionT1561.001Disk Content WipeProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
433DetectionT1561.001Disk Content WipeCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
434DetectionT1561.001Disk Content WipeDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
435DetectionT1561.001Disk Content WipeDrive AccessOpening of a data storage device with an assigned drive letter or mount point
436DetectionT1561.001Disk Content WipeDrive ModificationChanges made to a drive letter or mount point of a data storage device
437DetectionT1561.002Disk Structure WipeProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
438DetectionT1561.002Disk Structure WipeCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
439DetectionT1561.002Disk Structure WipeDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
440DetectionT1561.002Disk Structure WipeDrive AccessOpening of a data storage device with an assigned drive letter or mount point
441DetectionT1561.002Disk Structure WipeDrive ModificationChanges made to a drive letter or mount point of a data storage device
442DetectionT1561Disk WipeProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
443DetectionT1561Disk WipeCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
444DetectionT1561Disk WipeDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
445DetectionT1561Disk WipeDrive AccessOpening of a data storage device with an assigned drive letter or mount point
446DetectionT1561Disk WipeDrive ModificationChanges made to a drive letter or mount point of a data storage device
447DetectionT1021.003Distributed Component Object ModelModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
448DetectionT1021.003Distributed Component Object ModelProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
449DetectionT1021.003Distributed Component Object ModelNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
450DetectionT1136.002Domain AccountUser Account CreationInitial construction of a new account (ex: Windows EID 4720 or /etc/passwd logs)
451DetectionT1136.002Domain AccountProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
452DetectionT1136.002Domain AccountCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
453DetectionT1087.002Domain AccountProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
454DetectionT1087.002Domain AccountCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
455DetectionT1078.002Domain AccountsLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
456DetectionT1078.002Domain AccountsUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
457DetectionT1078.002Domain AccountsLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
458DetectionT1556.001Domain Controller AuthenticationLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
459DetectionT1556.001Domain Controller AuthenticationOS API ExecutionOperating system function/method calls executed by a process
460DetectionT1556.001Domain Controller AuthenticationProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
461DetectionT1556.001Domain Controller AuthenticationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
462DetectionT1090.004Domain FrontingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
463DetectionT1568.002Domain Generation AlgorithmsNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
464DetectionT1568.002Domain Generation AlgorithmsNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
465DetectionT1069.002Domain GroupsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
466DetectionT1069.002Domain GroupsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
467DetectionT1484Domain Policy ModificationActive Directory Object CreationInitial construction of a new active directory object (ex: Windows EID 5137)
468DetectionT1484Domain Policy ModificationActive Directory Object DeletionRemoval of an active directory object (ex: Windows EID 5141)
469DetectionT1484Domain Policy ModificationActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
470DetectionT1484Domain Policy ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
471DetectionT1482Domain Trust DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
472DetectionT1482Domain Trust DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
473DetectionT1482Domain Trust DiscoveryOS API ExecutionOperating system function/method calls executed by a process
474DetectionT1482Domain Trust DiscoveryScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
475DetectionT1484.002Domain Trust ModificationActive Directory Object CreationInitial construction of a new active directory object (ex: Windows EID 5137)
476DetectionT1484.002Domain Trust ModificationActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
477DetectionT1484.002Domain Trust ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
478DetectionT1583.001DomainsActive DNSQueried domain name system (DNS) registry data highlighting current domain to IP address resolutions (ex: dig/nslookup queries)
479DetectionT1583.001DomainsPassive DNSLogged domain name system (DNS) data highlighting timelines of domain to IP address resolutions (ex: passive DNS)
480DetectionT1583.001DomainsDomain RegistrationInformation about domain name assignments and other domain metadata (ex: WHOIS)
481DetectionT1584.001DomainsActive DNSQueried domain name system (DNS) registry data highlighting current domain to IP address resolutions (ex: dig/nslookup queries)
482DetectionT1584.001DomainsPassive DNSLogged domain name system (DNS) data highlighting timelines of domain to IP address resolutions (ex: passive DNS)
483DetectionT1584.001DomainsDomain RegistrationInformation about domain name assignments and other domain metadata (ex: WHOIS)
484DetectionT1036.007Double File ExtensionFile CreationInitial construction of a new file (ex: Sysmon EID 11)
485DetectionT1036.007Double File ExtensionFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
486DetectionT1562.010Downgrade AttackCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
487DetectionT1562.010Downgrade AttackProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
488DetectionT1562.010Downgrade AttackProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
489DetectionT1601.002Downgrade System ImageFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
490DetectionT1189Drive-by CompromiseFile CreationInitial construction of a new file (ex: Sysmon EID 11)
491DetectionT1189Drive-by CompromiseProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
492DetectionT1189Drive-by CompromiseNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
493DetectionT1189Drive-by CompromiseNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
494DetectionT1189Drive-by CompromiseApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
495DetectionT1608.004Drive-by TargetResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
496DetectionT1574.004Dylib HijackingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
497DetectionT1574.004Dylib HijackingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
498DetectionT1574.004Dylib HijackingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
499DetectionT1559.002Dynamic Data ExchangeModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
500DetectionT1559.002Dynamic Data ExchangeProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
501DetectionT1559.002Dynamic Data ExchangeScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
502DetectionT1574.006Dynamic Linker HijackingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
503DetectionT1574.006Dynamic Linker HijackingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
504DetectionT1574.006Dynamic Linker HijackingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
505DetectionT1574.006Dynamic Linker HijackingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
506DetectionT1574.006Dynamic Linker HijackingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
507DetectionT1568Dynamic ResolutionNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
508DetectionT1568Dynamic ResolutionNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
509DetectionT1568Dynamic ResolutionNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
510DetectionT1055.001Dynamic-link Library InjectionProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
511DetectionT1055.001Dynamic-link Library InjectionModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
512DetectionT1055.001Dynamic-link Library InjectionOS API ExecutionOperating system function/method calls executed by a process
513DetectionT1055.001Dynamic-link Library InjectionProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
514DetectionT1548.004Elevated Execution with PromptOS API ExecutionOperating system function/method calls executed by a process
515DetectionT1548.004Elevated Execution with PromptProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
516DetectionT1087.003Email AccountUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
517DetectionT1087.003Email AccountCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
518DetectionT1114Email CollectionFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
519DetectionT1114Email CollectionNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
520DetectionT1114Email CollectionLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
521DetectionT1114Email CollectionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
522DetectionT1114Email CollectionApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
523DetectionT1114.003Email Forwarding RuleApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
524DetectionT1564.008Email Hiding RulesFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
525DetectionT1564.008Email Hiding RulesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
526DetectionT1564.008Email Hiding RulesApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
527DetectionT1546.014EmondProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
528DetectionT1546.014EmondCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
529DetectionT1546.014EmondFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
530DetectionT1546.014EmondFile CreationInitial construction of a new file (ex: Sysmon EID 11)
531DetectionT1573Encrypted ChannelNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
532DetectionT1499Endpoint Denial of ServiceHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
533DetectionT1499Endpoint Denial of ServiceApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
534DetectionT1499Endpoint Denial of ServiceNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
535DetectionT1499Endpoint Denial of ServiceNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
536DetectionT1480.001Environmental KeyingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
537DetectionT1480.001Environmental KeyingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
538DetectionT1611Escape to HostContainer CreationInitial construction of a new container (ex: docker create <container_name>)
539DetectionT1611Escape to HostOS API ExecutionOperating system function/method calls executed by a process
540DetectionT1611Escape to HostProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
541DetectionT1585Establish AccountsSocial MediaEstablished, compromised, or otherwise acquired social media personas
542DetectionT1585Establish AccountsNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
543DetectionT1546Event Triggered ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
544DetectionT1546Event Triggered ExecutionWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
545DetectionT1546Event Triggered ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
546DetectionT1546Event Triggered ExecutionFile CreationInitial construction of a new file (ex: Sysmon EID 11)
547DetectionT1546Event Triggered ExecutionFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
548DetectionT1546Event Triggered ExecutionWMI CreationInitial construction of a WMI object, such as a filter, consumer, subscription, binding, or provider (ex: Sysmon EIDs 19-21)
549DetectionT1546Event Triggered ExecutionFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
550DetectionT1546Event Triggered ExecutionModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
551DetectionT1098.002Exchange Email Delegate PermissionsApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
552DetectionT1098.002Exchange Email Delegate PermissionsGroup ModificationChanges made to a group, such as membership, name, or permissions (ex: Windows EID 4728 or 4732, AWS IAM UpdateGroup)
553DetectionT1098.002Exchange Email Delegate PermissionsUser Account ModificationChanges made to an account, such as permissions and/or membership in specific groups (ex: Windows EID 4738 or /var/log access/authentication logs)
554DetectionT1574.005Executable Installer File Permissions WeaknessFile CreationInitial construction of a new file (ex: Sysmon EID 11)
555DetectionT1574.005Executable Installer File Permissions WeaknessFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
556DetectionT1574.005Executable Installer File Permissions WeaknessModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
557DetectionT1574.005Executable Installer File Permissions WeaknessProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
558DetectionT1574.005Executable Installer File Permissions WeaknessService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
559DetectionT1480Execution GuardrailsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
560DetectionT1480Execution GuardrailsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
561DetectionT1048Exfiltration Over Alternative ProtocolNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
562DetectionT1048Exfiltration Over Alternative ProtocolNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
563DetectionT1048Exfiltration Over Alternative ProtocolNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
564DetectionT1048Exfiltration Over Alternative ProtocolFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
565DetectionT1048Exfiltration Over Alternative ProtocolCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
566DetectionT1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
567DetectionT1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
568DetectionT1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
569DetectionT1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
570DetectionT1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
571DetectionT1011.001Exfiltration Over BluetoothNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
572DetectionT1011.001Exfiltration Over BluetoothNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
573DetectionT1011.001Exfiltration Over BluetoothNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
574DetectionT1011.001Exfiltration Over BluetoothFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
575DetectionT1011.001Exfiltration Over BluetoothCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
576DetectionT1041Exfiltration Over C2 ChannelNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
577DetectionT1041Exfiltration Over C2 ChannelNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
578DetectionT1041Exfiltration Over C2 ChannelNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
579DetectionT1041Exfiltration Over C2 ChannelFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
580DetectionT1041Exfiltration Over C2 ChannelCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
581DetectionT1011Exfiltration Over Other Network MediumNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
582DetectionT1011Exfiltration Over Other Network MediumNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
583DetectionT1011Exfiltration Over Other Network MediumNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
584DetectionT1011Exfiltration Over Other Network MediumFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
585DetectionT1011Exfiltration Over Other Network MediumCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
586DetectionT1052Exfiltration Over Physical MediumProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
587DetectionT1052Exfiltration Over Physical MediumFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
588DetectionT1052Exfiltration Over Physical MediumDrive CreationInitial construction of a drive letter or mount point to a data storage device
589DetectionT1052Exfiltration Over Physical MediumCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
590DetectionT1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
591DetectionT1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
592DetectionT1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
593DetectionT1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
594DetectionT1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
595DetectionT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
596DetectionT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
597DetectionT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
598DetectionT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
599DetectionT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
600DetectionT1567Exfiltration Over Web ServiceNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
601DetectionT1567Exfiltration Over Web ServiceNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
602DetectionT1567Exfiltration Over Web ServiceFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
603DetectionT1567Exfiltration Over Web ServiceCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
604DetectionT1052.001Exfiltration over USBProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
605DetectionT1052.001Exfiltration over USBFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
606DetectionT1052.001Exfiltration over USBDrive CreationInitial construction of a drive letter or mount point to a data storage device
607DetectionT1052.001Exfiltration over USBCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
608DetectionT1567.002Exfiltration to Cloud StorageNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
609DetectionT1567.002Exfiltration to Cloud StorageNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
610DetectionT1567.002Exfiltration to Cloud StorageFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
611DetectionT1567.002Exfiltration to Cloud StorageCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
612DetectionT1567.001Exfiltration to Code RepositoryNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
613DetectionT1567.001Exfiltration to Code RepositoryNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
614DetectionT1567.001Exfiltration to Code RepositoryFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
615DetectionT1567.001Exfiltration to Code RepositoryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
616DetectionT1190Exploit Public-Facing ApplicationApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
617DetectionT1190Exploit Public-Facing ApplicationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
618DetectionT1068Exploitation for Privilege EscalationDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
619DetectionT1210Exploitation of Remote ServicesApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
620DetectionT1210Exploitation of Remote ServicesNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
621DetectionT1491.002External DefacementFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
622DetectionT1491.002External DefacementFile CreationInitial construction of a new file (ex: Sysmon EID 11)
623DetectionT1491.002External DefacementApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
624DetectionT1491.002External DefacementNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
625DetectionT1090.002External ProxyNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
626DetectionT1090.002External ProxyNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
627DetectionT1090.002External ProxyNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
628DetectionT1133External Remote ServicesApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
629DetectionT1133External Remote ServicesLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
630DetectionT1133External Remote ServicesNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
631DetectionT1055.011Extra Window Memory InjectionOS API ExecutionOperating system function/method calls executed by a process
632DetectionT1008Fallback ChannelsNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
633DetectionT1008Fallback ChannelsNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
634DetectionT1568.001Fast Flux DNSNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
635DetectionT1568.001Fast Flux DNSNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
636DetectionT1070.004File DeletionFile DeletionRemoval of a file (ex: Sysmon EID 23)
637DetectionT1070.004File DeletionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
638DetectionT1071.002File Transfer ProtocolsNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
639DetectionT1071.002File Transfer ProtocolsNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
640DetectionT1083File and Directory DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
641DetectionT1083File and Directory DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
642DetectionT1083File and Directory DiscoveryOS API ExecutionOperating system function/method calls executed by a process
643DetectionT1222File and Directory Permissions ModificationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
644DetectionT1222File and Directory Permissions ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
645DetectionT1222File and Directory Permissions ModificationActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
646DetectionT1222File and Directory Permissions ModificationFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
647DetectionT1495Firmware CorruptionFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
648DetectionT1187Forced AuthenticationFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
649DetectionT1187Forced AuthenticationFile CreationInitial construction of a new file (ex: Sysmon EID 11)
650DetectionT1187Forced AuthenticationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
651DetectionT1187Forced AuthenticationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
652DetectionT1187Forced AuthenticationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
653DetectionT1606Forge Web CredentialsLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
654DetectionT1606Forge Web CredentialsWeb Credential CreationInitial construction of new web credential material (ex: Windows EID 1200 or 4769)
655DetectionT1606Forge Web CredentialsWeb Credential UsageAn attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)
656DetectionT1056.002GUI Input CaptureScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
657DetectionT1056.002GUI Input CaptureCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
658DetectionT1056.002GUI Input CaptureProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
659DetectionT1553.001Gatekeeper BypassFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
660DetectionT1553.001Gatekeeper BypassFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
661DetectionT1553.001Gatekeeper BypassProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
662DetectionT1553.001Gatekeeper BypassCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
663DetectionT1592Gather Victim Host InformationResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
664DetectionT1558.001Golden TicketActive Directory Credential RequestA user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)
665DetectionT1558.001Golden TicketLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
666DetectionT1615Group Policy DiscoveryNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
667DetectionT1615Group Policy DiscoveryActive Directory Object AccessOpening of an active directory object, typically to collect/read its value (ex: Windows EID 4661)
668DetectionT1615Group Policy DiscoveryScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
669DetectionT1615Group Policy DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
670DetectionT1615Group Policy DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
671DetectionT1484.001Group Policy ModificationActive Directory Object CreationInitial construction of a new active directory object (ex: Windows EID 5137)
672DetectionT1484.001Group Policy ModificationActive Directory Object DeletionRemoval of an active directory object (ex: Windows EID 5141)
673DetectionT1484.001Group Policy ModificationActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
674DetectionT1484.001Group Policy ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
675DetectionT1552.006Group Policy PreferencesFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
676DetectionT1552.006Group Policy PreferencesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
677DetectionT1027.006HTML SmugglingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
678DetectionT1592.001HardwareResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
679DetectionT1564.005Hidden File SystemWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
680DetectionT1564.005Hidden File SystemFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
681DetectionT1564.005Hidden File SystemFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
682DetectionT1564.001Hidden Files and DirectoriesFile CreationInitial construction of a new file (ex: Sysmon EID 11)
683DetectionT1564.001Hidden Files and DirectoriesProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
684DetectionT1564.001Hidden Files and DirectoriesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
685DetectionT1564.001Hidden Files and DirectoriesFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
686DetectionT1564.002Hidden UsersCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
687DetectionT1564.002Hidden UsersWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
688DetectionT1564.002Hidden UsersProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
689DetectionT1564.002Hidden UsersUser Account CreationInitial construction of a new account (ex: Windows EID 4720 or /etc/passwd logs)
690DetectionT1564.002Hidden UsersUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
691DetectionT1564.002Hidden UsersFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
692DetectionT1564.003Hidden WindowProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
693DetectionT1564.003Hidden WindowCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
694DetectionT1564.003Hidden WindowScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
695DetectionT1564.003Hidden WindowFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
696DetectionT1564Hide ArtifactsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
697DetectionT1564Hide ArtifactsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
698DetectionT1564Hide ArtifactsApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
699DetectionT1564Hide ArtifactsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
700DetectionT1564Hide ArtifactsFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
701DetectionT1564Hide ArtifactsUser Account CreationInitial construction of a new account (ex: Windows EID 4720 or /etc/passwd logs)
702DetectionT1564Hide ArtifactsUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
703DetectionT1564Hide ArtifactsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
704DetectionT1564Hide ArtifactsScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
705DetectionT1564Hide ArtifactsOS API ExecutionOperating system function/method calls executed by a process
706DetectionT1564Hide ArtifactsWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
707DetectionT1564Hide ArtifactsFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
708DetectionT1564Hide ArtifactsService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
709DetectionT1574Hijack Execution FlowWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
710DetectionT1574Hijack Execution FlowProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
711DetectionT1574Hijack Execution FlowModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
712DetectionT1574Hijack Execution FlowCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
713DetectionT1574Hijack Execution FlowService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
714DetectionT1574Hijack Execution FlowFile CreationInitial construction of a new file (ex: Sysmon EID 11)
715DetectionT1574Hijack Execution FlowFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
716DetectionT1505.004IIS ComponentsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
717DetectionT1505.004IIS ComponentsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
718DetectionT1505.004IIS ComponentsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
719DetectionT1546.012Image File Execution Options InjectionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
720DetectionT1546.012Image File Execution Options InjectionWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
721DetectionT1546.012Image File Execution Options InjectionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
722DetectionT1562.003Impair Command History LoggingHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
723DetectionT1562.003Impair Command History LoggingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
724DetectionT1562Impair DefensesProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
725DetectionT1562Impair DefensesProcess TerminationExit of a running process (ex: Sysmon EID 5 or Windows EID 4689)
726DetectionT1562Impair DefensesWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
727DetectionT1562Impair DefensesWindows Registry Key DeletionRemoval of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
728DetectionT1562Impair DefensesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
729DetectionT1562Impair DefensesService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
730DetectionT1562Impair DefensesHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
731DetectionT1562Impair DefensesScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
732DetectionT1562Impair DefensesFirewall DisableDeactivation or stoppage of a cloud service (ex: Write/Delete entries within Azure Firewall Activity Logs)
733DetectionT1562Impair DefensesFirewall Rule ModificationChanges made to a firewall rule, typically to allow/block specific network traffic (ex: Windows EID 4950 or Write/Delete entries within Azure Firewall Rule Collection Activity Logs)
734DetectionT1562Impair DefensesCloud Service ModificationChanges made to a cloud service, including its settings and/or data (ex: AWS CloudTrail DeleteTrail or DeleteConfigRule)
735DetectionT1562Impair DefensesCloud Service DisableDeactivation or stoppage of a cloud service (ex: AWS Cloudtrail StopLogging)
736DetectionT1525Implant Internal ImageImage CreationInitial construction of a virtual machine image (ex: Azure Compute Service Images PUT)
737DetectionT1525Implant Internal ImageImage ModificationChanges made to a virtual machine image, including setting and/or control data (ex: Azure Compute Service Images PATCH)
738DetectionT1562.006Indicator BlockingWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
739DetectionT1562.006Indicator BlockingHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
740DetectionT1562.006Indicator BlockingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
741DetectionT1070Indicator Removal on HostProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
742DetectionT1070Indicator Removal on HostFile DeletionRemoval of a file (ex: Sysmon EID 23)
743DetectionT1070Indicator Removal on HostFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
744DetectionT1070Indicator Removal on HostWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
745DetectionT1070Indicator Removal on HostWindows Registry Key DeletionRemoval of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
746DetectionT1070Indicator Removal on HostOS API ExecutionOperating system function/method calls executed by a process
747DetectionT1070Indicator Removal on HostCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
748DetectionT1070Indicator Removal on HostNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
749DetectionT1070Indicator Removal on HostUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
750DetectionT1070Indicator Removal on HostFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
751DetectionT1202Indirect Command ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
752DetectionT1202Indirect Command ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
753DetectionT1105Ingress Tool TransferNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
754DetectionT1105Ingress Tool TransferNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
755DetectionT1105Ingress Tool TransferNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
756DetectionT1105Ingress Tool TransferFile CreationInitial construction of a new file (ex: Sysmon EID 11)
757DetectionT1490Inhibit System RecoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
758DetectionT1490Inhibit System RecoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
759DetectionT1490Inhibit System RecoveryService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
760DetectionT1490Inhibit System RecoveryWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
761DetectionT1490Inhibit System RecoveryFile DeletionRemoval of a file (ex: Sysmon EID 23)
762DetectionT1056Input CaptureWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
763DetectionT1056Input CaptureDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
764DetectionT1056Input CaptureOS API ExecutionOperating system function/method calls executed by a process
765DetectionT1056Input CaptureProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
766DetectionT1056Input CaptureFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
767DetectionT1056Input CaptureProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
768DetectionT1608.003Install Digital CertificateResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
769DetectionT1553.004Install Root CertificateWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
770DetectionT1553.004Install Root CertificateWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
771DetectionT1553.004Install Root CertificateProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
772DetectionT1553.004Install Root CertificateCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
773DetectionT1218.004InstallUtilProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
774DetectionT1218.004InstallUtilCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
775DetectionT1559Inter-Process CommunicationModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
776DetectionT1559Inter-Process CommunicationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
777DetectionT1559Inter-Process CommunicationScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
778DetectionT1491.001Internal DefacementFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
779DetectionT1491.001Internal DefacementFile CreationInitial construction of a new file (ex: Sysmon EID 11)
780DetectionT1491.001Internal DefacementApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
781DetectionT1491.001Internal DefacementNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
782DetectionT1090.001Internal ProxyNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
783DetectionT1090.001Internal ProxyNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
784DetectionT1090.001Internal ProxyNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
785DetectionT1534Internal SpearphishingApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
786DetectionT1534Internal SpearphishingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
787DetectionT1534Internal SpearphishingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
788DetectionT1016.001Internet Connection DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
789DetectionT1016.001Internet Connection DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
790DetectionT1036.001Invalid Code SignatureFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
791DetectionT1059.007JavaScriptCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
792DetectionT1059.007JavaScriptProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
793DetectionT1059.007JavaScriptModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
794DetectionT1059.007JavaScriptScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
795DetectionT1001.001Junk DataNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
796DetectionT1558.003KerberoastingActive Directory Credential RequestA user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)
797DetectionT1547.006Kernel Modules and ExtensionsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
798DetectionT1547.006Kernel Modules and ExtensionsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
799DetectionT1547.006Kernel Modules and ExtensionsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
800DetectionT1547.006Kernel Modules and ExtensionsKernel Module LoadAn object file that contains code to extend the running kernel of an OS, typically used to add support for new hardware (as device drivers) and/or filesystems, or for adding system calls
801DetectionT1555.001KeychainCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
802DetectionT1555.001KeychainOS API ExecutionOperating system function/method calls executed by a process
803DetectionT1555.001KeychainFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
804DetectionT1056.001KeyloggingWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
805DetectionT1056.001KeyloggingDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
806DetectionT1056.001KeyloggingOS API ExecutionOperating system function/method calls executed by a process
807DetectionT1546.006LC_LOAD_DYLIB AdditionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
808DetectionT1546.006LC_LOAD_DYLIB AdditionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
809DetectionT1546.006LC_LOAD_DYLIB AdditionFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
810DetectionT1546.006LC_LOAD_DYLIB AdditionFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
811DetectionT1546.006LC_LOAD_DYLIB AdditionModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
812DetectionT1557.001LLMNR/NBT-NS Poisoning and SMB RelayNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
813DetectionT1557.001LLMNR/NBT-NS Poisoning and SMB RelayNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
814DetectionT1557.001LLMNR/NBT-NS Poisoning and SMB RelayService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
815DetectionT1557.001LLMNR/NBT-NS Poisoning and SMB RelayWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
816DetectionT1003.004LSA SecretsWindows Registry Key AccessOpening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
817DetectionT1003.004LSA SecretsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
818DetectionT1547.008LSASS DriverModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
819DetectionT1547.008LSASS DriverDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
820DetectionT1547.008LSASS DriverFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
821DetectionT1547.008LSASS DriverFile CreationInitial construction of a new file (ex: Sysmon EID 11)
822DetectionT1003.001LSASS MemoryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
823DetectionT1003.001LSASS MemoryProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
824DetectionT1003.001LSASS MemoryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
825DetectionT1003.001LSASS MemoryOS API ExecutionOperating system function/method calls executed by a process
826DetectionT1570Lateral Tool TransferNetwork Share AccessOpening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)
827DetectionT1570Lateral Tool TransferNamed Pipe MetadataContextual data about a named pipe on a system, including pipe name and creating process (ex: Sysmon EIDs 17-18)
828DetectionT1570Lateral Tool TransferNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
829DetectionT1570Lateral Tool TransferNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
830DetectionT1570Lateral Tool TransferCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
831DetectionT1570Lateral Tool TransferProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
832DetectionT1570Lateral Tool TransferFile CreationInitial construction of a new file (ex: Sysmon EID 11)
833DetectionT1570Lateral Tool TransferFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
834DetectionT1543.001Launch AgentFile CreationInitial construction of a new file (ex: Sysmon EID 11)
835DetectionT1543.001Launch AgentFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
836DetectionT1543.001Launch AgentCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
837DetectionT1543.001Launch AgentService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
838DetectionT1543.001Launch AgentService ModificationChanges made to a service/daemon, such as changes to name, description, and/or start type (ex: Windows EID 7040 or /var/log daemon logs)
839DetectionT1543.004Launch DaemonFile CreationInitial construction of a new file (ex: Sysmon EID 11)
840DetectionT1543.004Launch DaemonFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
841DetectionT1543.004Launch DaemonProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
842DetectionT1543.004Launch DaemonCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
843DetectionT1543.004Launch DaemonService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
844DetectionT1543.004Launch DaemonService ModificationChanges made to a service/daemon, such as changes to name, description, and/or start type (ex: Windows EID 7040 or /var/log daemon logs)
845DetectionT1569.001LaunchctlCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
846DetectionT1569.001LaunchctlProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
847DetectionT1569.001LaunchctlService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
848DetectionT1569.001LaunchctlFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
849DetectionT1608.005Link TargetResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
850DetectionT1222.002Linux and Mac File and Directory Permissions ModificationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
851DetectionT1222.002Linux and Mac File and Directory Permissions ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
852DetectionT1222.002Linux and Mac File and Directory Permissions ModificationFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
853DetectionT1136.001Local AccountUser Account CreationInitial construction of a new account (ex: Windows EID 4720 or /etc/passwd logs)
854DetectionT1136.001Local AccountProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
855DetectionT1136.001Local AccountCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
856DetectionT1087.001Local AccountProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
857DetectionT1087.001Local AccountCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
858DetectionT1087.001Local AccountFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
859DetectionT1078.003Local AccountsLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
860DetectionT1078.003Local AccountsUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
861DetectionT1078.003Local AccountsLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
862DetectionT1074.001Local Data StagingFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
863DetectionT1074.001Local Data StagingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
864DetectionT1074.001Local Data StagingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
865DetectionT1114.001Local Email CollectionFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
866DetectionT1114.001Local Email CollectionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
867DetectionT1069.001Local GroupsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
868DetectionT1069.001Local GroupsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
869DetectionT1547.015Login ItemsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
870DetectionT1547.015Login ItemsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
871DetectionT1547.015Login ItemsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
872DetectionT1037.002Logon Script (Mac)File CreationInitial construction of a new file (ex: Sysmon EID 11)
873DetectionT1037.002Logon Script (Mac)File ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
874DetectionT1037.002Logon Script (Mac)Process CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
875DetectionT1037.002Logon Script (Mac)Command ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
876DetectionT1037.001Logon Script (Windows)Windows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
877DetectionT1037.001Logon Script (Windows)Process CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
878DetectionT1037.001Logon Script (Windows)Command ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
879DetectionT1218.014MMCProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
880DetectionT1218.014MMCFile CreationInitial construction of a new file (ex: Sysmon EID 11)
881DetectionT1218.014MMCCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
882DetectionT1127.001MSBuildProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
883DetectionT1127.001MSBuildCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
884DetectionT1071.003Mail ProtocolsNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
885DetectionT1071.003Mail ProtocolsNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
886DetectionT1134.003Make and Impersonate TokenOS API ExecutionOperating system function/method calls executed by a process
887DetectionT1134.003Make and Impersonate TokenCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
888DetectionT1204.002Malicious FileProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
889DetectionT1204.002Malicious FileFile CreationInitial construction of a new file (ex: Sysmon EID 11)
890DetectionT1204.003Malicious ImageContainer CreationInitial construction of a new container (ex: docker create <container_name>)
891DetectionT1204.003Malicious ImageContainer StartActivation or invocation of a container (ex: docker start or docker restart)
892DetectionT1204.003Malicious ImageCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
893DetectionT1204.003Malicious ImageImage CreationInitial construction of a virtual machine image (ex: Azure Compute Service Images PUT)
894DetectionT1204.003Malicious ImageInstance CreationInitial construction of a new instance (ex: instance.insert within GCP Audit Logs)
895DetectionT1204.003Malicious ImageInstance StartActivation or invocation of an instance (ex: instance.start within GCP Audit Logs)
896DetectionT1204.003Malicious ImageApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
897DetectionT1204.001Malicious LinkNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
898DetectionT1204.001Malicious LinkNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
899DetectionT1204.001Malicious LinkFile CreationInitial construction of a new file (ex: Sysmon EID 11)
900DetectionT1587.001MalwareMalware MetadataContextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information
901DetectionT1587.001MalwareMalware ContentCode, strings, and other signatures that compromise a malicious payload
902DetectionT1588.001MalwareMalware MetadataContextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information
903DetectionT1588.001MalwareMalware ContentCode, strings, and other signatures that compromise a malicious payload
904DetectionT1553.005Mark-of-the-Web BypassFile CreationInitial construction of a new file (ex: Sysmon EID 11)
905DetectionT1553.005Mark-of-the-Web BypassFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
906DetectionT1036.004Masquerade Task or ServiceCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
907DetectionT1036.004Masquerade Task or ServiceService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
908DetectionT1036.004Masquerade Task or ServiceService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
909DetectionT1036.004Masquerade Task or ServiceScheduled Job MetadataContextual data about a scheduled job, which may include information such as name, timing, command(s), etc.
910DetectionT1036.004Masquerade Task or ServiceScheduled Job ModificationChanges made to a scheduled job, such as modifications to the execution launch (ex: Windows EID 4702 or /var/log cron logs)
911DetectionT1036MasqueradingImage MetadataContextual data about a virtual machine image such as name, resource group, state, or type
912DetectionT1036MasqueradingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
913DetectionT1036MasqueradingService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
914DetectionT1036MasqueradingService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
915DetectionT1036MasqueradingScheduled Job MetadataContextual data about a scheduled job, which may include information such as name, timing, command(s), etc.
916DetectionT1036MasqueradingScheduled Job ModificationChanges made to a scheduled job, such as modifications to the execution launch (ex: Windows EID 4702 or /var/log cron logs)
917DetectionT1036MasqueradingFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
918DetectionT1036MasqueradingProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
919DetectionT1036MasqueradingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
920DetectionT1036.005Match Legitimate Name or LocationImage MetadataContextual data about a virtual machine image such as name, resource group, state, or type
921DetectionT1036.005Match Legitimate Name or LocationFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
922DetectionT1036.005Match Legitimate Name or LocationProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
923DetectionT1218.013MavinjectProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
924DetectionT1218.013MavinjectCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
925DetectionT1556Modify Authentication ProcessLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
926DetectionT1556Modify Authentication ProcessOS API ExecutionOperating system function/method calls executed by a process
927DetectionT1556Modify Authentication ProcessProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
928DetectionT1556Modify Authentication ProcessFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
929DetectionT1556Modify Authentication ProcessFile CreationInitial construction of a new file (ex: Sysmon EID 11)
930DetectionT1556Modify Authentication ProcessModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
931DetectionT1556Modify Authentication ProcessWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
932DetectionT1578Modify Cloud Compute InfrastructureInstance StopDeactivation or stoppage of an instance (ex: instance.stop within GCP Audit Logs)
933DetectionT1578Modify Cloud Compute InfrastructureInstance StartActivation or invocation of an instance (ex: instance.start within GCP Audit Logs)
934DetectionT1578Modify Cloud Compute InfrastructureInstance CreationInitial construction of a new instance (ex: instance.insert within GCP Audit Logs)
935DetectionT1578Modify Cloud Compute InfrastructureInstance ModificationChanges made to an instance, including its settings and/or control data (ex: instance.addResourcePolicies or instances.setMetadata within GCP Audit Logs)
936DetectionT1578Modify Cloud Compute InfrastructureInstance DeletionRemoval of an instance (ex: instance.delete within GCP Audit Logs)
937DetectionT1578Modify Cloud Compute InfrastructureSnapshot CreationInitial construction of a new snapshot (ex: AWS create-snapshot)
938DetectionT1578Modify Cloud Compute InfrastructureSnapshot ModificationChanges made to a snapshop, such as metadata and control data (ex: AWS modify-snapshot-attribute)
939DetectionT1578Modify Cloud Compute InfrastructureSnapshot DeletionRemoval of a snapshot (ex: AWS delete-snapshot)
940DetectionT1578Modify Cloud Compute InfrastructureVolume CreationInitial construction of a cloud volume (ex: AWS create-volume)
941DetectionT1578Modify Cloud Compute InfrastructureVolume ModificationChanges made to a cloud volume, including its settings and control data (ex: AWS modify-volume)
942DetectionT1578Modify Cloud Compute InfrastructureVolume DeletionRemoval of a a cloud volume (ex: AWS delete-volume)
943DetectionT1112Modify RegistryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
944DetectionT1112Modify RegistryOS API ExecutionOperating system function/method calls executed by a process
945DetectionT1112Modify RegistryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
946DetectionT1112Modify RegistryWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
947DetectionT1112Modify RegistryWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
948DetectionT1112Modify RegistryWindows Registry Key DeletionRemoval of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
949DetectionT1601Modify System ImageFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
950DetectionT1218.005MshtaProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
951DetectionT1218.005MshtaFile CreationInitial construction of a new file (ex: Sysmon EID 11)
952DetectionT1218.005MshtaCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
953DetectionT1218.005MshtaNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
954DetectionT1218.007MsiexecProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
955DetectionT1218.007MsiexecModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
956DetectionT1218.007MsiexecCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
957DetectionT1218.007MsiexecNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
958DetectionT1104Multi-Stage ChannelsNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
959DetectionT1104Multi-Stage ChannelsNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
960DetectionT1090.003Multi-hop ProxyNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
961DetectionT1090.003Multi-hop ProxyNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
962DetectionT1090.003Multi-hop ProxyNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
963DetectionT1003.003NTDSFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
964DetectionT1003.003NTDSCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
965DetectionT1564.004NTFS File AttributesOS API ExecutionOperating system function/method calls executed by a process
966DetectionT1564.004NTFS File AttributesFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
967DetectionT1564.004NTFS File AttributesFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
968DetectionT1564.004NTFS File AttributesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
969DetectionT1106Native APIOS API ExecutionOperating system function/method calls executed by a process
970DetectionT1106Native APIModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
971DetectionT1546.007Netsh Helper DLLProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
972DetectionT1546.007Netsh Helper DLLWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
973DetectionT1546.007Netsh Helper DLLCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
974DetectionT1546.007Netsh Helper DLLModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
975DetectionT1599.001Network Address Translation TraversalNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
976DetectionT1599.001Network Address Translation TraversalNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
977DetectionT1599Network Boundary BridgingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
978DetectionT1599Network Boundary BridgingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
979DetectionT1498Network Denial of ServiceHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
980DetectionT1498Network Denial of ServiceNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
981DetectionT1556.004Network Device AuthenticationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
982DetectionT1059.008Network Device CLICommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
983DetectionT1602.002Network Device Configuration DumpNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
984DetectionT1602.002Network Device Configuration DumpNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
985DetectionT1037.003Network Logon ScriptFile CreationInitial construction of a new file (ex: Sysmon EID 11)
986DetectionT1037.003Network Logon ScriptFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
987DetectionT1037.003Network Logon ScriptProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
988DetectionT1037.003Network Logon ScriptCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
989DetectionT1037.003Network Logon ScriptActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
990DetectionT1046Network Service ScanningCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
991DetectionT1046Network Service ScanningCloud Service EnumerationAn extracted list of cloud services (ex: AWS ECS ListServices)
992DetectionT1046Network Service ScanningNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
993DetectionT1070.005Network Share Connection RemovalProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
994DetectionT1070.005Network Share Connection RemovalCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
995DetectionT1070.005Network Share Connection RemovalNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
996DetectionT1070.005Network Share Connection RemovalUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
997DetectionT1135Network Share DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
998DetectionT1135Network Share DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
999DetectionT1135Network Share DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1000DetectionT1040Network SniffingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1001DetectionT1040Network SniffingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1002DetectionT1095Non-Application Layer ProtocolNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1003DetectionT1095Non-Application Layer ProtocolNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1004DetectionT1132.002Non-Standard EncodingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1005DetectionT1571Non-Standard PortNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1006DetectionT1571Non-Standard PortNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1007DetectionT1571Non-Standard PortNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1008DetectionT1003OS Credential DumpingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1009DetectionT1003OS Credential DumpingProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1010DetectionT1003OS Credential DumpingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1011DetectionT1003OS Credential DumpingFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1012DetectionT1003OS Credential DumpingWindows Registry Key AccessOpening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
1013DetectionT1003OS Credential DumpingActive Directory Object AccessOpening of an active directory object, typically to collect/read its value (ex: Windows EID 4661)
1014DetectionT1003OS Credential DumpingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1015DetectionT1003OS Credential DumpingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1016DetectionT1003OS Credential DumpingOS API ExecutionOperating system function/method calls executed by a process
1017DetectionT1499.001OS Exhaustion FloodHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
1018DetectionT1499.001OS Exhaustion FloodNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1019DetectionT1499.001OS Exhaustion FloodNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1020DetectionT1027Obfuscated Files or InformationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1021DetectionT1027Obfuscated Files or InformationFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1022DetectionT1027Obfuscated Files or InformationFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1023DetectionT1027Obfuscated Files or InformationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1024DetectionT1588Obtain CapabilitiesMalware MetadataContextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information
1025DetectionT1588Obtain CapabilitiesMalware ContentCode, strings, and other signatures that compromise a malicious payload
1026DetectionT1588Obtain CapabilitiesCertificate RegistrationQueried or logged information highlighting current and expired digital certificates (ex: Certificate transparency)
1027DetectionT1588Obtain CapabilitiesResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1028DetectionT1218.008OdbcconfProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1029DetectionT1218.008OdbcconfModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1030DetectionT1218.008OdbcconfCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1031DetectionT1137Office Application StartupProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1032DetectionT1137Office Application StartupCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1033DetectionT1137Office Application StartupWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
1034DetectionT1137Office Application StartupWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1035DetectionT1137Office Application StartupFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1036DetectionT1137Office Application StartupFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1037DetectionT1137Office Application StartupModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1038DetectionT1137Office Application StartupApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1039DetectionT1137.001Office Template MacrosProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1040DetectionT1137.001Office Template MacrosCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1041DetectionT1137.001Office Template MacrosWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
1042DetectionT1137.001Office Template MacrosWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1043DetectionT1137.001Office Template MacrosFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1044DetectionT1137.001Office Template MacrosFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1045DetectionT1137.002Office TestProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1046DetectionT1137.002Office TestCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1047DetectionT1137.002Office TestWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
1048DetectionT1137.002Office TestWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1049DetectionT1137.002Office TestFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1050DetectionT1137.002Office TestFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1051DetectionT1137.002Office TestModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1052DetectionT1102.003One-Way CommunicationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1053DetectionT1102.003One-Way CommunicationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1054DetectionT1102.003One-Way CommunicationNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1055DetectionT1137.003Outlook FormsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1056DetectionT1137.003Outlook FormsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1057DetectionT1137.003Outlook FormsApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1058DetectionT1137.004Outlook Home PageProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1059DetectionT1137.004Outlook Home PageCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1060DetectionT1137.004Outlook Home PageApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1061DetectionT1137.005Outlook RulesProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1062DetectionT1137.005Outlook RulesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1063DetectionT1137.005Outlook RulesApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1064DetectionT1134.004Parent PID SpoofingOS API ExecutionOperating system function/method calls executed by a process
1065DetectionT1134.004Parent PID SpoofingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1066DetectionT1134.004Parent PID SpoofingProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
1067DetectionT1550.002Pass the HashUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1068DetectionT1550.002Pass the HashLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1069DetectionT1550.002Pass the HashActive Directory Credential RequestA user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)
1070DetectionT1550.003Pass the TicketUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1071DetectionT1550.003Pass the TicketLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1072DetectionT1550.003Pass the TicketActive Directory Credential RequestA user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)
1073DetectionT1110.002Password CrackingUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1074DetectionT1110.002Password CrackingApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1075DetectionT1556.002Password Filter DLLFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1076DetectionT1556.002Password Filter DLLModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1077DetectionT1556.002Password Filter DLLWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1078DetectionT1110.001Password GuessingUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1079DetectionT1110.001Password GuessingApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1080DetectionT1555.005Password ManagersOS API ExecutionOperating system function/method calls executed by a process
1081DetectionT1555.005Password ManagersFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1082DetectionT1555.005Password ManagersProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1083DetectionT1555.005Password ManagersCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1084DetectionT1201Password Policy DiscoveryUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
1085DetectionT1201Password Policy DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1086DetectionT1201Password Policy DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1087DetectionT1110.003Password SprayingUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1088DetectionT1110.003Password SprayingApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1089DetectionT1601.001Patch System ImageFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1090DetectionT1574.007Path Interception by PATH Environment VariableFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1091DetectionT1574.007Path Interception by PATH Environment VariableFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1092DetectionT1574.007Path Interception by PATH Environment VariableProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1093DetectionT1574.008Path Interception by Search Order HijackingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1094DetectionT1574.008Path Interception by Search Order HijackingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1095DetectionT1574.008Path Interception by Search Order HijackingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1096DetectionT1574.009Path Interception by Unquoted PathFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1097DetectionT1574.009Path Interception by Unquoted PathFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1098DetectionT1574.009Path Interception by Unquoted PathProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1099DetectionT1120Peripheral Device DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1100DetectionT1120Peripheral Device DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1101DetectionT1120Peripheral Device DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1102DetectionT1069Permission Groups DiscoveryPod MetadataContextual data about a pod and activity around it such as name, ID, namespace, or status
1103DetectionT1069Permission Groups DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1104DetectionT1069Permission Groups DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1105DetectionT1069Permission Groups DiscoveryGroup EnumerationAn extracted list of available groups and/or their associated settings (ex: AWS list-groups)
1106DetectionT1069Permission Groups DiscoveryGroup MetadataContextual data about a group which describes group and activity around it, such as name, permissions, or user accounts within the group
1107DetectionT1069Permission Groups DiscoveryApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1108DetectionT1566PhishingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1109DetectionT1566PhishingApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1110DetectionT1566PhishingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1111DetectionT1566PhishingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1112DetectionT1598Phishing for InformationApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1113DetectionT1598Phishing for InformationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1114DetectionT1598Phishing for InformationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1115DetectionT1547.011Plist ModificationService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
1116DetectionT1547.011Plist ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1117DetectionT1547.011Plist ModificationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1118DetectionT1547.011Plist ModificationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1119DetectionT1556.003Pluggable Authentication ModulesFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1120DetectionT1556.003Pluggable Authentication ModulesLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1121DetectionT1205.001Port KnockingNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1122DetectionT1205.001Port KnockingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1123DetectionT1547.010Port MonitorsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1124DetectionT1547.010Port MonitorsOS API ExecutionOperating system function/method calls executed by a process
1125DetectionT1547.010Port MonitorsModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1126DetectionT1547.010Port MonitorsWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1127DetectionT1055.002Portable Executable InjectionProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
1128DetectionT1055.002Portable Executable InjectionOS API ExecutionOperating system function/method calls executed by a process
1129DetectionT1055.002Portable Executable InjectionProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1130DetectionT1059.001PowerShellCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1131DetectionT1059.001PowerShellModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1132DetectionT1059.001PowerShellProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1133DetectionT1059.001PowerShellScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
1134DetectionT1546.013PowerShell ProfileProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1135DetectionT1546.013PowerShell ProfileCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1136DetectionT1546.013PowerShell ProfileFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1137DetectionT1546.013PowerShell ProfileFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1138DetectionT1542Pre-OS BootCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1139DetectionT1542Pre-OS BootNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1140DetectionT1542Pre-OS BootFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
1141DetectionT1542Pre-OS BootDriver MetadataContextual data about a driver and activity around it such as driver issues reporting or integrity (page hash, code) checking
1142DetectionT1542Pre-OS BootOS API ExecutionOperating system function/method calls executed by a process
1143DetectionT1542Pre-OS BootDrive ModificationChanges made to a drive letter or mount point of a data storage device
1144DetectionT1547.012Print ProcessorsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1145DetectionT1547.012Print ProcessorsOS API ExecutionOperating system function/method calls executed by a process
1146DetectionT1547.012Print ProcessorsModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1147DetectionT1547.012Print ProcessorsWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1148DetectionT1547.012Print ProcessorsDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
1149DetectionT1552.004Private KeysFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1150DetectionT1552.004Private KeysCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1151DetectionT1003.007Proc FilesystemCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1152DetectionT1003.007Proc FilesystemFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1153DetectionT1055.009Proc MemoryFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1154DetectionT1057Process DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1155DetectionT1057Process DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1156DetectionT1057Process DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1157DetectionT1055.013Process DoppelgängingOS API ExecutionOperating system function/method calls executed by a process
1158DetectionT1055.013Process DoppelgängingFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1159DetectionT1055.012Process HollowingProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
1160DetectionT1055.012Process HollowingOS API ExecutionOperating system function/method calls executed by a process
1161DetectionT1055.012Process HollowingProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1162DetectionT1055Process InjectionProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
1163DetectionT1055Process InjectionModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1164DetectionT1055Process InjectionOS API ExecutionOperating system function/method calls executed by a process
1165DetectionT1055Process InjectionProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1166DetectionT1055Process InjectionFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1167DetectionT1055Process InjectionFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1168DetectionT1001.003Protocol ImpersonationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1169DetectionT1572Protocol TunnelingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1170DetectionT1572Protocol TunnelingNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1171DetectionT1572Protocol TunnelingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1172DetectionT1090ProxyNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1173DetectionT1090ProxyNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1174DetectionT1090ProxyNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1175DetectionT1055.008Ptrace System CallsProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
1176DetectionT1055.008Ptrace System CallsOS API ExecutionOperating system function/method calls executed by a process
1177DetectionT1055.008Ptrace System CallsProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1178DetectionT1216.001PubPrnProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1179DetectionT1216.001PubPrnCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1180DetectionT1216.001PubPrnScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
1181DetectionT1059.006PythonCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1182DetectionT1059.006PythonProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1183DetectionT1012Query RegistryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1184DetectionT1012Query RegistryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1185DetectionT1012Query RegistryWindows Registry Key AccessOpening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
1186DetectionT1012Query RegistryOS API ExecutionOperating system function/method calls executed by a process
1187DetectionT1037.004RC ScriptsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1188DetectionT1037.004RC ScriptsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1189DetectionT1037.004RC ScriptsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1190DetectionT1037.004RC ScriptsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1191DetectionT1563.002RDP HijackingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1192DetectionT1563.002RDP HijackingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1193DetectionT1563.002RDP HijackingLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1194DetectionT1563.002RDP HijackingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1195DetectionT1563.002RDP HijackingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1196DetectionT1542.004ROMMONkitFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
1197DetectionT1547.007Re-opened ApplicationsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1198DetectionT1547.007Re-opened ApplicationsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1199DetectionT1600.001Reduce Key SpaceFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1200DetectionT1498.002Reflection AmplificationHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
1201DetectionT1498.002Reflection AmplificationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1202DetectionT1620Reflective Code LoadingScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
1203DetectionT1620Reflective Code LoadingOS API ExecutionOperating system function/method calls executed by a process
1204DetectionT1620Reflective Code LoadingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1205DetectionT1547.001Registry Run Keys / Startup FolderWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
1206DetectionT1547.001Registry Run Keys / Startup FolderWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1207DetectionT1547.001Registry Run Keys / Startup FolderFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1208DetectionT1547.001Registry Run Keys / Startup FolderCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1209DetectionT1547.001Registry Run Keys / Startup FolderProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1210DetectionT1218.009Regsvcs/RegasmProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1211DetectionT1218.009Regsvcs/RegasmCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1212DetectionT1218.010Regsvr32Process CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1213DetectionT1218.010Regsvr32Module LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1214DetectionT1218.010Regsvr32Command ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1215DetectionT1218.010Regsvr32Network Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1216DetectionT1219Remote Access SoftwareProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1217DetectionT1219Remote Access SoftwareNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1218DetectionT1219Remote Access SoftwareNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1219DetectionT1219Remote Access SoftwareNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1220DetectionT1074.002Remote Data StagingFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1221DetectionT1074.002Remote Data StagingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1222DetectionT1074.002Remote Data StagingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1223DetectionT1021.001Remote Desktop ProtocolProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1224DetectionT1021.001Remote Desktop ProtocolNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1225DetectionT1021.001Remote Desktop ProtocolNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1226DetectionT1021.001Remote Desktop ProtocolLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1227DetectionT1114.002Remote Email CollectionNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1228DetectionT1114.002Remote Email CollectionLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1229DetectionT1114.002Remote Email CollectionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1230DetectionT1563Remote Service Session HijackingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1231DetectionT1563Remote Service Session HijackingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1232DetectionT1563Remote Service Session HijackingLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1233DetectionT1563Remote Service Session HijackingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1234DetectionT1563Remote Service Session HijackingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1235DetectionT1021Remote ServicesProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1236DetectionT1021Remote ServicesNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1237DetectionT1021Remote ServicesNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1238DetectionT1021Remote ServicesLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1239DetectionT1021Remote ServicesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1240DetectionT1021Remote ServicesNetwork Share AccessOpening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)
1241DetectionT1021Remote ServicesModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1242DetectionT1018Remote System DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1243DetectionT1018Remote System DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1244DetectionT1018Remote System DiscoveryNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1245DetectionT1018Remote System DiscoveryFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1246DetectionT1036.003Rename System UtilitiesFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1247DetectionT1036.003Rename System UtilitiesProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
1248DetectionT1036.003Rename System UtilitiesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1249DetectionT1036.003Rename System UtilitiesFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1250DetectionT1091Replication Through Removable MediaProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1251DetectionT1091Replication Through Removable MediaFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1252DetectionT1091Replication Through Removable MediaFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1253DetectionT1091Replication Through Removable MediaDrive CreationInitial construction of a drive letter or mount point to a data storage device
1254DetectionT1564.009Resource ForkingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1255DetectionT1564.009Resource ForkingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1256DetectionT1564.009Resource ForkingFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1257DetectionT1564.009Resource ForkingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1258DetectionT1496Resource HijackingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1259DetectionT1496Resource HijackingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1260DetectionT1496Resource HijackingFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1261DetectionT1496Resource HijackingNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1262DetectionT1496Resource HijackingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1263DetectionT1496Resource HijackingHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
1264DetectionT1578.004Revert Cloud InstanceInstance ModificationChanges made to an instance, including its settings and/or control data (ex: instance.addResourcePolicies or instances.setMetadata within GCP Audit Logs)
1265DetectionT1578.004Revert Cloud InstanceInstance StartActivation or invocation of an instance (ex: instance.start within GCP Audit Logs)
1266DetectionT1578.004Revert Cloud InstanceInstance StopDeactivation or stoppage of an instance (ex: instance.stop within GCP Audit Logs)
1267DetectionT1036.002Right-to-Left OverrideFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1268DetectionT1207Rogue Domain ControllerActive Directory Object CreationInitial construction of a new active directory object (ex: Windows EID 5137)
1269DetectionT1207Rogue Domain ControllerActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
1270DetectionT1207Rogue Domain ControllerNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1271DetectionT1207Rogue Domain ControllerUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1272DetectionT1014RootkitDrive ModificationChanges made to a drive letter or mount point of a data storage device
1273DetectionT1014RootkitFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
1274DetectionT1564.006Run Virtual InstanceProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1275DetectionT1564.006Run Virtual InstanceFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1276DetectionT1564.006Run Virtual InstanceCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1277DetectionT1564.006Run Virtual InstanceService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
1278DetectionT1564.006Run Virtual InstanceWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1279DetectionT1218.011Rundll32File MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1280DetectionT1218.011Rundll32Process CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1281DetectionT1218.011Rundll32Command ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1282DetectionT1218.011Rundll32Module LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1283DetectionT1565.003Runtime Data ManipulationOS API ExecutionOperating system function/method calls executed by a process
1284DetectionT1565.003Runtime Data ManipulationFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1285DetectionT1565.003Runtime Data ManipulationFile DeletionRemoval of a file (ex: Sysmon EID 23)
1286DetectionT1565.003Runtime Data ManipulationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1287DetectionT1565.003Runtime Data ManipulationFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1288DetectionT1606.002SAML TokensLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1289DetectionT1606.002SAML TokensWeb Credential CreationInitial construction of new web credential material (ex: Windows EID 1200 or 4769)
1290DetectionT1606.002SAML TokensWeb Credential UsageAn attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)
1291DetectionT1134.005SID-History InjectionOS API ExecutionOperating system function/method calls executed by a process
1292DetectionT1134.005SID-History InjectionUser Account MetadataContextual data about an account, which may include a username, user ID, environmental data, etc.
1293DetectionT1134.005SID-History InjectionActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
1294DetectionT1553.003SIP and Trust Provider HijackingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1295DetectionT1553.003SIP and Trust Provider HijackingWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1296DetectionT1553.003SIP and Trust Provider HijackingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1297DetectionT1021.002SMB/Windows Admin SharesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1298DetectionT1021.002SMB/Windows Admin SharesNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1299DetectionT1021.002SMB/Windows Admin SharesNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1300DetectionT1021.002SMB/Windows Admin SharesLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1301DetectionT1021.002SMB/Windows Admin SharesNetwork Share AccessOpening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)
1302DetectionT1602.001SNMP (MIB Dump)Network Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1303DetectionT1602.001SNMP (MIB Dump)Network Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1304DetectionT1505.001SQL Stored ProceduresApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1305DetectionT1021.004SSHProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1306DetectionT1021.004SSHNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1307DetectionT1021.004SSHLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1308DetectionT1098.004SSH Authorized KeysProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1309DetectionT1098.004SSH Authorized KeysCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1310DetectionT1098.004SSH Authorized KeysFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1311DetectionT1563.001SSH HijackingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1312DetectionT1563.001SSH HijackingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1313DetectionT1563.001SSH HijackingLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1314DetectionT1563.001SSH HijackingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1315DetectionT1563.001SSH HijackingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1316DetectionT1562.009Safe Mode BootProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1317DetectionT1562.009Safe Mode BootWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1318DetectionT1562.009Safe Mode BootWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
1319DetectionT1562.009Safe Mode BootCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1320DetectionT1595.001Scanning IP BlocksNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1321DetectionT1053.005Scheduled TaskScheduled Job CreationInitial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)
1322DetectionT1053.005Scheduled TaskCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1323DetectionT1053.005Scheduled TaskFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1324DetectionT1053.005Scheduled TaskProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1325DetectionT1053Scheduled Task/JobFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1326DetectionT1053Scheduled Task/JobContainer CreationInitial construction of a new container (ex: docker create <container_name>)
1327DetectionT1053Scheduled Task/JobScheduled Job CreationInitial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)
1328DetectionT1053Scheduled Task/JobCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1329DetectionT1053Scheduled Task/JobFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1330DetectionT1053Scheduled Task/JobProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1331DetectionT1029Scheduled TransferNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1332DetectionT1029Scheduled TransferNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1333DetectionT1113Screen CaptureOS API ExecutionOperating system function/method calls executed by a process
1334DetectionT1113Screen CaptureCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1335DetectionT1546.002ScreensaverProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1336DetectionT1546.002ScreensaverWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1337DetectionT1546.002ScreensaverCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1338DetectionT1546.002ScreensaverFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1339DetectionT1546.002ScreensaverFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1340DetectionT1594Search Victim-Owned WebsitesApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1341DetectionT1003.002Security Account ManagerCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1342DetectionT1003.002Security Account ManagerWindows Registry Key AccessOpening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
1343DetectionT1003.002Security Account ManagerFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1344DetectionT1518.001Security Software DiscoveryFirewall MetadataContextual data about a firewall and activity around it such as name, policy, or status
1345DetectionT1518.001Security Software DiscoveryFirewall EnumerationAn extracted list of available firewalls and/or their associated settings/rules (ex: Azure Network Firewall CLI Show commands)
1346DetectionT1518.001Security Software DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1347DetectionT1518.001Security Software DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1348DetectionT1518.001Security Software DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1349DetectionT1547.005Security Support ProviderWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1350DetectionT1547.005Security Support ProviderModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1351DetectionT1547.005Security Support ProviderCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1352DetectionT1555.002Securityd MemoryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1353DetectionT1555.002Securityd MemoryProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1354DetectionT1583.004ServerResponse MetadataContextual data about an Internet-facing resource gathered from a scan, such as running services or ports
1355DetectionT1583.004ServerResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1356DetectionT1584.004ServerResponse MetadataContextual data about an Internet-facing resource gathered from a scan, such as running services or ports
1357DetectionT1584.004ServerResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1358DetectionT1505Server Software ComponentFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1359DetectionT1505Server Software ComponentFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1360DetectionT1505Server Software ComponentProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1361DetectionT1505Server Software ComponentNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1362DetectionT1505Server Software ComponentNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1363DetectionT1505Server Software ComponentApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1364DetectionT1569.002Service ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1365DetectionT1569.002Service ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1366DetectionT1569.002Service ExecutionService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
1367DetectionT1569.002Service ExecutionWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1368DetectionT1499.002Service Exhaustion FloodHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
1369DetectionT1499.002Service Exhaustion FloodApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1370DetectionT1499.002Service Exhaustion FloodNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1371DetectionT1499.002Service Exhaustion FloodNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1372DetectionT1489Service StopProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1373DetectionT1489Service StopCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1374DetectionT1489Service StopOS API ExecutionOperating system function/method calls executed by a process
1375DetectionT1489Service StopService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
1376DetectionT1489Service StopWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1377DetectionT1489Service StopFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1378DetectionT1489Service StopProcess TerminationExit of a running process (ex: Sysmon EID 5 or Windows EID 4689)
1379DetectionT1574.010Services File Permissions WeaknessFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1380DetectionT1574.010Services File Permissions WeaknessFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1381DetectionT1574.010Services File Permissions WeaknessProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1382DetectionT1574.010Services File Permissions WeaknessService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
1383DetectionT1574.011Services Registry Permissions WeaknessWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1384DetectionT1574.011Services Registry Permissions WeaknessProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1385DetectionT1574.011Services Registry Permissions WeaknessService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
1386DetectionT1574.011Services Registry Permissions WeaknessCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1387DetectionT1548.001Setuid and SetgidCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1388DetectionT1548.001Setuid and SetgidFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1389DetectionT1548.001Setuid and SetgidFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1390DetectionT1129Shared ModulesOS API ExecutionOperating system function/method calls executed by a process
1391DetectionT1129Shared ModulesModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1392DetectionT1213.002SharepointLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1393DetectionT1213.002SharepointApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1394DetectionT1547.009Shortcut ModificationFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1395DetectionT1547.009Shortcut ModificationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1396DetectionT1547.009Shortcut ModificationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1397DetectionT1218Signed Binary Proxy ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1398DetectionT1218Signed Binary Proxy ExecutionFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1399DetectionT1218Signed Binary Proxy ExecutionModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1400DetectionT1218Signed Binary Proxy ExecutionOS API ExecutionOperating system function/method calls executed by a process
1401DetectionT1218Signed Binary Proxy ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1402DetectionT1218Signed Binary Proxy ExecutionWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1403DetectionT1218Signed Binary Proxy ExecutionNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1404DetectionT1216Signed Script Proxy ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1405DetectionT1216Signed Script Proxy ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1406DetectionT1216Signed Script Proxy ExecutionScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
1407DetectionT1558.002Silver TicketLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
1408DetectionT1585.001Social Media AccountsSocial MediaEstablished, compromised, or otherwise acquired social media personas
1409DetectionT1585.001Social Media AccountsNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1410DetectionT1586.001Social Media AccountsSocial MediaEstablished, compromised, or otherwise acquired social media personas
1411DetectionT1586.001Social Media AccountsNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1412DetectionT1592.002SoftwareResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1413DetectionT1072Software Deployment ToolsApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1414DetectionT1072Software Deployment ToolsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1415DetectionT1518Software DiscoveryFirewall MetadataContextual data about a firewall and activity around it such as name, policy, or status
1416DetectionT1518Software DiscoveryFirewall EnumerationAn extracted list of available firewalls and/or their associated settings/rules (ex: Azure Network Firewall CLI Show commands)
1417DetectionT1518Software DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1418DetectionT1518Software DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1419DetectionT1518Software DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1420DetectionT1027.002Software PackingFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1421DetectionT1036.006Space after FilenameFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1422DetectionT1566.001Spearphishing AttachmentFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1423DetectionT1566.001Spearphishing AttachmentApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1424DetectionT1566.001Spearphishing AttachmentNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1425DetectionT1566.001Spearphishing AttachmentNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1426DetectionT1598.002Spearphishing AttachmentApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1427DetectionT1598.002Spearphishing AttachmentNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1428DetectionT1598.002Spearphishing AttachmentNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1429DetectionT1566.002Spearphishing LinkApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1430DetectionT1566.002Spearphishing LinkNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1431DetectionT1566.002Spearphishing LinkNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1432DetectionT1598.003Spearphishing LinkApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1433DetectionT1598.003Spearphishing LinkNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1434DetectionT1598.003Spearphishing LinkNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1435DetectionT1598.001Spearphishing ServiceApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1436DetectionT1598.001Spearphishing ServiceNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1437DetectionT1598.001Spearphishing ServiceNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1438DetectionT1566.003Spearphishing via ServiceApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1439DetectionT1566.003Spearphishing via ServiceNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1440DetectionT1566.003Spearphishing via ServiceNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1441DetectionT1608Stage CapabilitiesResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1442DetectionT1132.001Standard EncodingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1443DetectionT1037.005Startup ItemsFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1444DetectionT1037.005Startup ItemsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1445DetectionT1037.005Startup ItemsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1446DetectionT1037.005Startup ItemsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1447DetectionT1528Steal Application Access TokenUser Account ModificationChanges made to an account, such as permissions and/or membership in specific groups (ex: Windows EID 4738 or /var/log access/authentication logs)
1448DetectionT1539Steal Web Session CookieFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1449DetectionT1539Steal Web Session CookieProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1450DetectionT1558Steal or Forge Kerberos TicketsFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1451DetectionT1558Steal or Forge Kerberos TicketsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1452DetectionT1558Steal or Forge Kerberos TicketsActive Directory Credential RequestA user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)
1453DetectionT1558Steal or Forge Kerberos TicketsLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
1454DetectionT1027.003SteganographyFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1455DetectionT1001.002SteganographyNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1456DetectionT1565.001Stored Data ManipulationFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1457DetectionT1565.001Stored Data ManipulationFile DeletionRemoval of a file (ex: Sysmon EID 23)
1458DetectionT1565.001Stored Data ManipulationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1459DetectionT1553Subvert Trust ControlsWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
1460DetectionT1553Subvert Trust ControlsWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1461DetectionT1553Subvert Trust ControlsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1462DetectionT1553Subvert Trust ControlsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1463DetectionT1553Subvert Trust ControlsFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1464DetectionT1553Subvert Trust ControlsFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1465DetectionT1553Subvert Trust ControlsModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1466DetectionT1548.003Sudo and Sudo CachingProcess MetadataContextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.
1467DetectionT1548.003Sudo and Sudo CachingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1468DetectionT1548.003Sudo and Sudo CachingCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1469DetectionT1548.003Sudo and Sudo CachingFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1470DetectionT1573.001Symmetric CryptographyNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1471DetectionT1497.001System ChecksProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1472DetectionT1497.001System ChecksCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1473DetectionT1497.001System ChecksOS API ExecutionOperating system function/method calls executed by a process
1474DetectionT1542.001System FirmwareFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
1475DetectionT1082System Information DiscoveryInstance MetadataContextual data about an instance and activity around it such as name, type, or status
1476DetectionT1082System Information DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1477DetectionT1082System Information DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1478DetectionT1082System Information DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1479DetectionT1614.001System Language DiscoveryWindows Registry Key AccessOpening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
1480DetectionT1614.001System Language DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1481DetectionT1614.001System Language DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1482DetectionT1614.001System Language DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1483DetectionT1614System Location DiscoveryInstance MetadataContextual data about an instance and activity around it such as name, type, or status
1484DetectionT1614System Location DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1485DetectionT1614System Location DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1486DetectionT1614System Location DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1487DetectionT1016System Network Configuration DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1488DetectionT1016System Network Configuration DiscoveryScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
1489DetectionT1016System Network Configuration DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1490DetectionT1016System Network Configuration DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1491DetectionT1049System Network Connections DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1492DetectionT1049System Network Connections DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1493DetectionT1049System Network Connections DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1494DetectionT1033System Owner/User DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1495DetectionT1033System Owner/User DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1496DetectionT1007System Service DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1497DetectionT1007System Service DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1498DetectionT1569System ServicesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1499DetectionT1569System ServicesProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1500DetectionT1569System ServicesService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
1501DetectionT1569System ServicesFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1502DetectionT1569System ServicesWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1503DetectionT1529System Shutdown/RebootProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1504DetectionT1529System Shutdown/RebootCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1505DetectionT1529System Shutdown/RebootHost StatusLogging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)
1506DetectionT1124System Time DiscoveryProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1507DetectionT1124System Time DiscoveryCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1508DetectionT1124System Time DiscoveryOS API ExecutionOperating system function/method calls executed by a process
1509DetectionT1543.002Systemd ServiceFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1510DetectionT1543.002Systemd ServiceFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1511DetectionT1543.002Systemd ServiceProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1512DetectionT1543.002Systemd ServiceCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1513DetectionT1543.002Systemd ServiceService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
1514DetectionT1543.002Systemd ServiceService ModificationChanges made to a service/daemon, such as changes to name, description, and/or start type (ex: Windows EID 7040 or /var/log daemon logs)
1515DetectionT1053.006Systemd TimersScheduled Job CreationInitial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)
1516DetectionT1053.006Systemd TimersCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1517DetectionT1053.006Systemd TimersFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1518DetectionT1053.006Systemd TimersProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1519DetectionT1542.005TFTP BootCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1520DetectionT1542.005TFTP BootNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1521DetectionT1542.005TFTP BootFirmware ModificationChanges made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)
1522DetectionT1080Taint Shared ContentProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1523DetectionT1080Taint Shared ContentFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1524DetectionT1080Taint Shared ContentFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1525DetectionT1080Taint Shared ContentNetwork Share AccessOpening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)
1526DetectionT1221Template InjectionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1527DetectionT1221Template InjectionNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1528DetectionT1221Template InjectionNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1529DetectionT1055.003Thread Execution HijackingProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
1530DetectionT1055.003Thread Execution HijackingOS API ExecutionOperating system function/method calls executed by a process
1531DetectionT1055.003Thread Execution HijackingProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1532DetectionT1055.005Thread Local StorageProcess ModificationChanges made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)
1533DetectionT1055.005Thread Local StorageOS API ExecutionOperating system function/method calls executed by a process
1534DetectionT1055.005Thread Local StorageProcess AccessOpening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)
1535DetectionT1497.003Time Based EvasionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1536DetectionT1497.003Time Based EvasionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1537DetectionT1497.003Time Based EvasionOS API ExecutionOperating system function/method calls executed by a process
1538DetectionT1547.003Time ProvidersWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1539DetectionT1547.003Time ProvidersModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1540DetectionT1547.003Time ProvidersCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1541DetectionT1547.003Time ProvidersProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1542DetectionT1070.006TimestompFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1543DetectionT1070.006TimestompFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1544DetectionT1134.001Token Impersonation/TheftOS API ExecutionOperating system function/method calls executed by a process
1545DetectionT1134.001Token Impersonation/TheftCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1546DetectionT1588.002ToolMalware MetadataContextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information
1547DetectionT1020.001Traffic DuplicationNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1548DetectionT1020.001Traffic DuplicationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1549DetectionT1205Traffic SignalingNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1550DetectionT1205Traffic SignalingNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1551DetectionT1205Traffic SignalingNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1552DetectionT1537Transfer Data to Cloud AccountSnapshot CreationInitial construction of a new snapshot (ex: AWS create-snapshot)
1553DetectionT1537Transfer Data to Cloud AccountSnapshot ModificationChanges made to a snapshop, such as metadata and control data (ex: AWS modify-snapshot-attribute)
1554DetectionT1537Transfer Data to Cloud AccountCloud Storage ModificationChanges made to cloud storage infrastructure, including its settings and/or data (ex: AWS S3 PutObject or PutObjectAcl)
1555DetectionT1537Transfer Data to Cloud AccountCloud Storage CreationInitial construction of new cloud storage infrastructure (ex: AWS S3 CreateBucket)
1556DetectionT1565.002Transmitted Data ManipulationOS API ExecutionOperating system function/method calls executed by a process
1557DetectionT1565.002Transmitted Data ManipulationNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1558DetectionT1565.002Transmitted Data ManipulationNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1559DetectionT1505.002Transport AgentFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1560DetectionT1505.002Transport AgentApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1561DetectionT1546.005TrapProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1562DetectionT1546.005TrapCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1563DetectionT1546.005TrapFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1564DetectionT1546.005TrapFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1565DetectionT1127Trusted Developer Utilities Proxy ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1566DetectionT1127Trusted Developer Utilities Proxy ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1567DetectionT1199Trusted RelationshipApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1568DetectionT1199Trusted RelationshipLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
1569DetectionT1199Trusted RelationshipLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1570DetectionT1111Two-Factor Authentication InterceptionWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1571DetectionT1111Two-Factor Authentication InterceptionDriver LoadAttaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)
1572DetectionT1111Two-Factor Authentication InterceptionOS API ExecutionOperating system function/method calls executed by a process
1573DetectionT1059.004Unix ShellCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1574DetectionT1059.004Unix ShellProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1575DetectionT1546.004Unix Shell Configuration ModificationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1576DetectionT1546.004Unix Shell Configuration ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1577DetectionT1546.004Unix Shell Configuration ModificationFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1578DetectionT1546.004Unix Shell Configuration ModificationFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1579DetectionT1552Unsecured CredentialsCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1580DetectionT1552Unsecured CredentialsFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1581DetectionT1552Unsecured CredentialsProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1582DetectionT1552Unsecured CredentialsUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1583DetectionT1552Unsecured CredentialsWindows Registry Key AccessOpening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
1584DetectionT1535Unused/Unsupported Cloud RegionsInstance CreationInitial construction of a new instance (ex: instance.insert within GCP Audit Logs)
1585DetectionT1608.001Upload MalwareResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1586DetectionT1608.002Upload ToolResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1587DetectionT1550Use Alternate Authentication MaterialLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1588DetectionT1550Use Alternate Authentication MaterialWeb Credential UsageAn attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)
1589DetectionT1550Use Alternate Authentication MaterialApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1590DetectionT1550Use Alternate Authentication MaterialUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1591DetectionT1550Use Alternate Authentication MaterialActive Directory Credential RequestA user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)
1592DetectionT1497.002User Activity Based ChecksProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1593DetectionT1497.002User Activity Based ChecksCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1594DetectionT1497.002User Activity Based ChecksOS API ExecutionOperating system function/method calls executed by a process
1595DetectionT1204User ExecutionApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1596DetectionT1204User ExecutionInstance StartActivation or invocation of an instance (ex: instance.start within GCP Audit Logs)
1597DetectionT1204User ExecutionInstance CreationInitial construction of a new instance (ex: instance.insert within GCP Audit Logs)
1598DetectionT1204User ExecutionImage CreationInitial construction of a virtual machine image (ex: Azure Compute Service Images PUT)
1599DetectionT1204User ExecutionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1600DetectionT1204User ExecutionContainer StartActivation or invocation of a container (ex: docker start or docker restart)
1601DetectionT1204User ExecutionContainer CreationInitial construction of a new container (ex: docker create <container_name>)
1602DetectionT1204User ExecutionNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1603DetectionT1204User ExecutionNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1604DetectionT1204User ExecutionFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1605DetectionT1204User ExecutionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1606DetectionT1564.007VBA StompingScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
1607DetectionT1564.007VBA StompingFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1608DetectionT1055.014VDSO HijackingOS API ExecutionOperating system function/method calls executed by a process
1609DetectionT1055.014VDSO HijackingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1610DetectionT1021.005VNCProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1611DetectionT1021.005VNCNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1612DetectionT1021.005VNCLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1613DetectionT1078Valid AccountsLogon Session MetadataContextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
1614DetectionT1078Valid AccountsUser Account AuthenticationAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)
1615DetectionT1078Valid AccountsLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1616DetectionT1218.012VerclsidProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1617DetectionT1218.012VerclsidCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1618DetectionT1125Video CaptureOS API ExecutionOperating system function/method calls executed by a process
1619DetectionT1125Video CaptureCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1620DetectionT1583.003Virtual Private ServerResponse MetadataContextual data about an Internet-facing resource gathered from a scan, such as running services or ports
1621DetectionT1583.003Virtual Private ServerResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1622DetectionT1584.003Virtual Private ServerResponse MetadataContextual data about an Internet-facing resource gathered from a scan, such as running services or ports
1623DetectionT1584.003Virtual Private ServerResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1624DetectionT1497Virtualization/Sandbox EvasionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1625DetectionT1497Virtualization/Sandbox EvasionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1626DetectionT1497Virtualization/Sandbox EvasionOS API ExecutionOperating system function/method calls executed by a process
1627DetectionT1059.005Visual BasicCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1628DetectionT1059.005Visual BasicProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1629DetectionT1059.005Visual BasicModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1630DetectionT1059.005Visual BasicScript ExecutionLaunching a list of commands through a script file (ex: Windows EID 4104)
1631DetectionT1595.002Vulnerability ScanningNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1632DetectionT1595.002Vulnerability ScanningNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1633DetectionT1600Weaken EncryptionFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1634DetectionT1606.001Web CookiesLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1635DetectionT1606.001Web CookiesWeb Credential CreationInitial construction of new web credential material (ex: Windows EID 1200 or 4769)
1636DetectionT1606.001Web CookiesWeb Credential UsageAn attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)
1637DetectionT1056.003Web Portal CaptureFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1638DetectionT1071.001Web ProtocolsNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1639DetectionT1071.001Web ProtocolsNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1640DetectionT1102Web ServiceNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1641DetectionT1102Web ServiceNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1642DetectionT1102Web ServiceNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1643DetectionT1583.006Web ServicesResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1644DetectionT1584.006Web ServicesResponse ContentLogged network traffic in response to a scan showing both protocol header and body values
1645DetectionT1550.004Web Session CookieWeb Credential UsageAn attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)
1646DetectionT1550.004Web Session CookieApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1647DetectionT1505.003Web ShellFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1648DetectionT1505.003Web ShellFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1649DetectionT1505.003Web ShellProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1650DetectionT1505.003Web ShellNetwork Traffic ContentLogged network traffic data showing both protocol header and body values (ex: PCAP)
1651DetectionT1505.003Web ShellNetwork Traffic FlowSummarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)
1652DetectionT1505.003Web ShellApplication Log ContentLogging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)
1653DetectionT1059.003Windows Command ShellCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1654DetectionT1059.003Windows Command ShellProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1655DetectionT1555.004Windows Credential ManagerProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1656DetectionT1555.004Windows Credential ManagerCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1657DetectionT1555.004Windows Credential ManagerOS API ExecutionOperating system function/method calls executed by a process
1658DetectionT1555.004Windows Credential ManagerFile AccessOpening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)
1659DetectionT1222.001Windows File and Directory Permissions ModificationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1660DetectionT1222.001Windows File and Directory Permissions ModificationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1661DetectionT1222.001Windows File and Directory Permissions ModificationActive Directory Object ModificationChanges made to an active directory object (ex: Windows EID 5163 or 5136)
1662DetectionT1222.001Windows File and Directory Permissions ModificationFile MetadataContextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.
1663DetectionT1047Windows Management InstrumentationCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1664DetectionT1047Windows Management InstrumentationProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1665DetectionT1047Windows Management InstrumentationNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1666DetectionT1546.003Windows Management Instrumentation Event SubscriptionCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1667DetectionT1546.003Windows Management Instrumentation Event SubscriptionProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1668DetectionT1546.003Windows Management Instrumentation Event SubscriptionWMI CreationInitial construction of a WMI object, such as a filter, consumer, subscription, binding, or provider (ex: Sysmon EIDs 19-21)
1669DetectionT1021.006Windows Remote ManagementService MetadataContextual data about a service/daemon, which may include information such as name, service executable, start type, etc.
1670DetectionT1021.006Windows Remote ManagementProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1671DetectionT1021.006Windows Remote ManagementNetwork Connection CreationInitial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)
1672DetectionT1021.006Windows Remote ManagementLogon Session CreationInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
1673DetectionT1021.006Windows Remote ManagementCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1674DetectionT1543.003Windows ServiceService CreationInitial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)
1675DetectionT1543.003Windows ServiceService ModificationChanges made to a service/daemon, such as changes to name, description, and/or start type (ex: Windows EID 7040 or /var/log daemon logs)
1676DetectionT1543.003Windows ServiceProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1677DetectionT1543.003Windows ServiceOS API ExecutionOperating system function/method calls executed by a process
1678DetectionT1543.003Windows ServiceCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1679DetectionT1543.003Windows ServiceWindows Registry Key CreationInitial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
1680DetectionT1543.003Windows ServiceWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1681DetectionT1547.004Winlogon Helper DLLWindows Registry Key ModificationChanges made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
1682DetectionT1547.004Winlogon Helper DLLModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)
1683DetectionT1547.004Winlogon Helper DLLCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1684DetectionT1547.013XDG Autostart EntriesFile CreationInitial construction of a new file (ex: Sysmon EID 11)
1685DetectionT1547.013XDG Autostart EntriesFile ModificationChanges made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)
1686DetectionT1547.013XDG Autostart EntriesProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1687DetectionT1547.013XDG Autostart EntriesCommand ExecutionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)
1688DetectionT1220XSL Script ProcessingProcess CreationBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)
1689DetectionT1220XSL Script ProcessingModule LoadAttaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)