Attack Pattern: Bootkit - T1067
Attack Pattern: Create Account - T1136
Attack Pattern: Data Encrypted for Impact - T1486
Attack Pattern: Data from Local System - T1005
Attack Pattern: Disable or Modify Tools - T1562.001
Attack Pattern: Domain Account - T1087.002
Attack Pattern: Exfiltration Over C2 Channel - T1041
Attack Pattern: Exfiltration Over Unencrypted Non-C2 Protocol - T1048.003
Attack Pattern: Exploit Public-Facing Application - T1190
Attack Pattern: External Remote Services - T1133
Attack Pattern: Impair Command History Logging - T1562.003
Attack Pattern: Lateral Tool Transfer - T1570
Attack Pattern: Modify Registry - T1112
Attack Pattern: PowerShell - T1059.001
Attack Pattern: Query Registry - T1012
Attack Pattern: Remote Desktop Protocol - T1021.001
Attack Pattern: Remote System Discovery - T1018
Attack Pattern: SMB/Windows Admin Shares - T1021.002
Attack Pattern: Scheduled Task - T1053.005
Attack Pattern: Scheduled Task/Job - T1053
Attack Pattern: Service Execution - T1569.002
Attack Pattern: Service Stop - T1489
Attack Pattern: Services Registry Permissions Weakness - T1574.011
Attack Pattern: Valid Accounts - T1078
Attack Pattern: Windows Service - T1543.003
Identity: Agriculture
Identity: Automotive
Identity: Construction
Identity: Energy
Identity: Financial-services
Identity: Government
Identity: Healthcare
Identity: Manufacturing
Identity: Mining
Identity: Retail
Identity: Technology
Identity: Utilities
Location: Americas
Location: Angola
Location: Bangladesh
Location: Brazil
Location: Canada
Location: Chile
Location: Colombia
Location: Ecuador
Location: Egypt
Location: Germany
Location: Greece
Location: India
Location: Indonesia
Location: Malaysia
Location: Mexico
Location: Peru
Location: Poland
Location: Romania
Location: Spain
Location: Thailand
Location: Turkey
Location: United Arab Emirates
Location: United States of America
Location: Viet Nam
Malware: Empire
Malware: MimiKatz
Malware: Play ransomware
Malware: PsExec
Malware: SystemBC
Malware: neshta
Threat Actor: RECESS SPIDER
Tool: BloodHound - S0521
Tool: Empire - S0363
Tool: Mimikatz - S0002
Tool: Nltest - S0359
Tool: PsExec - S0029