| Tactic | Ecosystem | Core Rules ★ | Cousin / Adjacent | MITRE Techniques |
|---|---|---|---|---|
| Initial Access |
Phishing & ClickFix Chain
SafeLinks + Clipboard Injection
|
|
HTML Smuggling Macro Execution Chain QR Code Phish OneNote Attachment AitM Proxy Phish | T1566.002 Spearphish Link T1204.002 User Exec T1059.007 JS/VBS T1566.001 Attachment |
| C2 |
C2 Full Ecosystem
HTTPS · Named Pipe · Blockchain · RMM
|
|
DNS Tunnelling C2 ICMP C2 Domain Fronting FastFlux Beacon Slack/Teams C2 WebDAV C2 | T1071.001 Web Protocols T1559.001 Named Pipes T1102 Web Service T1571 Non-Std Port T1219 Remote Access T1090 Proxy |
| Execution |
LOLBins + PowerShell Full Pack
9 sub-packs · Rare LOLBins · Rundll32 · PS Hunter
|
|
MSHTA Execution Certutil Download Regsvr32 Proxy BitsAdmin Transfer Wscript/Cscript Compiled HTML (CHM) Electron App Abuse | T1218 Sys Binary Proxy T1059.001 PowerShell T1105 Ingress Transfer T1036.003 Renamed Binary T1218.011 Rundll32 T1218.005 Mshta |
| Persistence |
Registry Persistence Ecosystem
Boot · LSA · Payload Stash · Drift
|
|
TaskCache (silent) Service ImagePath Hijack COM Object Hijack AppInit DLL Winlogon Helper Time Provider DLL | T1547.001 Run Keys T1112 Modify Registry T1547.005 Security Support T1553.004 Code Signing T1548.002 UAC Bypass T1027 Obfuscated Files |
| Persistence |
Scheduled Task Ecosystem
TaskCache · AT · BITS
|
|
TaskCache (no schtasks.exe) AT Job Legacy BITS Job Persistence Winlogon Helper | T1053.005 Scheduled Task T1053.002 AT Job T1197 BITS Jobs T1547.004 Winlogon |
| Def Evasion |
BYOVD / LOLDriver Ecosystem
Kernel · Delayed/Staged · Combined
|
|
ProcExp Driver Abuse EDR Kill via Vulnerable Driver HVCI Bypass Attempt Driver Signature Spoof | T1014 Rootkit T1562.001 Impair Defences T1068 Privilege Escalation T1543.003 Windows Service |
| Def Evasion |
DLL Sideloading Chain
MDE · Sentinel · BYOVD Combo
|
|
Search Order Hijack Phantom DLL Known DLL Override SxS DLL Hijack | T1574.002 DLL Sideloading T1574.001 DLL Search Order T1574.006 Dynamic Linker |
| Def Evasion |
In-Memory Injection + Obfuscation
Process Injection · AMSI Bypass · Polymorphic
|
|
Reflective DLL Injection Process Hollowing Heaven's Gate ETW Patching WSL Linux Binary Proxy | T1055 Process Injection T1562.001 Impair Defences T1027.010 Command Obfusc T1497 Virtualization Evasion T1202 Indirect Cmd Exec |
| Cred Access |
LSASS + NTDS + Secrets
DC Attack · Staging · Recon
|
|
SAM Hive Dump DCSync Credential Manager GPP Password LSASS Non-Dump Access Mimikatz Sekurlsa | T1003.001 LSASS Memory T1003.003 NTDS T1552 Unsecured Creds T1003.002 SAM T1087 Account Discovery |
| Cred Access |
Kerberos Attack Ecosystem
Kerberoasting · AS-REP · PTH/PTT
|
|
AS-REP Roasting Golden Ticket Silver Ticket Diamond Ticket ADCS ESC1-8 | T1558.003 Kerberoasting T1558.004 AS-REP Roast T1550.003 Pass-the-Ticket T1558.001 Golden Ticket T1649 Steal Cert |
| Lateral |
SMB / RPC Lateral Movement
PsExec · TaskExec · Critical Shares
|
|
DCOM Lateral WinRM Exec Pass-the-Hash via SMB SSH Lateral (Linux) Impacket Tooling | T1021.002 SMB/Admin T1569.002 Service Exec T1543.003 Windows Svc T1570 Lateral Transfer T1550.002 PTH |
| Lateral + Exec |
WMI Ecosystem
Fileless · Permanent Sub · Atomic
|
|
DCOM via WMI MOF File Abuse WMI Provider Host Masq WMI via PS Remoting | T1047 WMI T1546.003 WMI Event Sub T1059.001 PowerShell T1021.003 DCOM |
| Lateral |
RDP Ecosystem
Post-Access File Drop
|
|
RDP Session Hijack Sticky Keys Backdoor RDP Tunnel xFreeRDP / SharpRDP | T1021.001 RDP T1546.008 Accessibility T1563.002 RDP Hijack |
| Identity / Cloud |
OAuth / Token Abuse + Azure
Consent · Token Theft · SP Backdoor · Azure RunCommand
|
|
Device Code Phishing Refresh Token Abuse SAML Golden Ticket Managed Identity Abuse App Impersonation Conditional Access Bypass | T1528 Steal App Token T1550.001 App Access Token T1078.004 Cloud Accounts T1606.002 SAML Token T1578 Modify Cloud Compute T1136.003 Cloud Account |
| Discovery |
AD Recon + Browser Artefacts
Cert Attack Vectors · Browser Extensions
|
|
BloodHound Collector Detection LDAP Enumeration Net Commands ShareFinder | T1087.002 Domain Account T1482 Domain Trust T1518.001 Security Software T1176 Browser Extensions |
| Exfiltration |
Clipboard + Data Exfil
Clipboard Intercept · Credential Keyword Hunt
|
|
Staging + Archive + Outbound Cloud Sync Exfil (OneDrive/Box) DNS Exfil HTTPS Upload to Paste Sites | T1115 Clipboard Data T1041 Exfil over C2 T1048 Exfil over Alt Protocol T1567 Exfil to Web Service |
| RMM / Access |
RMM Abuse Ecosystem
LOLRMM · VPN First Use · Suspicious Drop
|
|
AnyDesk/TeamViewer Silent Install ScreenConnect Abuse Atera Agent Deploy VPN Split Tunnel Abuse | T1219 Remote Access Software T1133 External Remote Svcs T1021 Remote Services |
| Impact |
Ransomware Cousin Ecosystem
Encryption · Shadow Delete · Service Stop
|
|
Backup Deletion (wbadmin) Firewall Disable Pre-Encrypt Network Share Encryption MBR Wipe Ransom Note Drop | T1486 Data Encrypted T1490 Inhibit Recovery T1489 Service Stop T1485 Data Destruction |
| Control Plane |
Rogue / Unmanaged Device
3 rule variants + strict mode
|
|
Shadow IT Cloud Resource Unauthorised Network Device Unmanaged Endpoint Enrol NAC Bypass | T1200 Hardware Additions T1078 Valid Accounts T1133 External Remote Svcs |