credentail_access_file_access_to_sam_database.yml
credential_access_credential_access_from_backups_via_rundll32.yml
credential_access_credential_discovery_via_vaultcmd.yml
credential_access_lsass_memory_dump_preparation_via_silent_process_exit.yml
credential_access_lsass_memory_dump_via_wer.yml
credential_access_lsass_memory_dumping.yml
credential_access_potential_sam_hive_dumping.yml
credential_access_remote_thread_creation_into_lsass.yml
credential_access_suspicious_access_to_active_directory_domain_database.yml
credential_access_suspicious_access_to_unattended_panther_files.yml
credential_access_suspicious_access_to_windows_dpapi_master_keys.yml
credential_access_suspicious_access_to_windows_manager_files.yml
credential_access_suspicious_access_to_windows_vault_files.yml
credential_access_suspicious_security_package_loaded_by_lsass.yml
credential_access_unusual_access_to_ssh_keys.yml
credential_access_unusual_access_to_web_browser_credential_stores.yml
credential_access_unusual_access_to_windows_credential_history.yml
defense_evasion_appdomain_manager_injection_via_clr_search_order_hijacking.yml
defense_evasion_clear_eventlog.yml
defense_evasion_dll_loaded_via_apc_queue.yml
defense_evasion_dll_loaded_via_callback_function.yml
defense_evasion_dll_sideloading_via_copied_binary.yml
defense_evasion_dotnet_assembly_loaded_by_unmanaged_process.yml
defense_evasion_hidden_registry_key_creation.yml
defense_evasion_image_load_via_ntfs_transaction.yml
defense_evasion_potential_injection_via_dotnet_debugging.yml
defense_evasion_potential_process_doppelganging_injection.yml
defense_evasion_potential_process_hollowing_injection.yml
defense_evasion_potential_process_injection_via_tainted_memory_section.yml
defense_evasion_potential_thread_execution_hijacking.yml
defense_evasion_process_execution_from_self_deleting_binary.yml
defense_evasion_process_spawned_via_remote_thread.yml
defense_evasion_regsvr32_scriptlet_execution.yml
defense_evasion_suspicious_dll_loaded_via_memory_section_mapping.yml
defense_evasion_system_binary_proxy_execution_via_rundll32.yml
defense_evasion_thread_context_set_from_unbacked_memory.yml
defense_evasion_unsigned_dll_injection_via_remote_thread.yml
initial_access_executable_file_creation_from_macro_enabled_microsoft_office_document.yml
initial_access_execution_via_microsoft_office_process.yml
initial_access_macro_execution_via_script_interpreter.yml
initial_access_process_spawned_from_macro_enabled_microsoft_office_document.yml
initial_access_suspicious_dll_loaded_by_microsoft_office_process.yml
initial_access_suspicious_microsoft_office_embedded_object.yml
persistence_hidden_local_account_creation.yml
persistence_network_connection_via_startup_folder_executable_or_script.yml
persistence_rid_hijacking.yml
persistence_script_interpreter_or_untrusted_process_persistence.yml
persistence_suspicious_microsoft_office_template.yml
persistence_suspicious_persistence_via_registry_modification.yml
persistence_suspicious_port_monitor_loaded.yml
persistence_suspicious_startup_shell_folder_modification.yml
persistence_unusual_file_written_in_startup_folder.yml
persistence_unusual_process_modified_registry_run_key.yml
privilege_escalation_potential_privilege_escalation_via_phantom_dll_hijacking.yml
privilege_escalation_vulnerable_or_malicious_driver_dropped.yml
privilege_escalation_vulnerable_or_malicious_driver_loaded.yml
You can’t perform that action at this time.