value stringlengths 25 18k ⌀ | subtecnique int64 0 1 | answer stringclasses 2
values | id stringlengths 5 9 | name stringlengths 3 102 |
|---|---|---|---|---|
Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features would include a program b... | 0 | reject | T1553 | Subvert Trust Controls |
Adversaries may modify client software binaries to establish persistent access to systems. Client software enables users to access services provided by a server. Common client software types are SSH clients, FTP clients, email clients, and web browsers.
Adversaries may make modifications to client software binaries to... | 0 | reject | T1554 | Compromise Client Software Binary |
Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users manage and maintain... | 0 | reject | T1555 | Credentials from Password Stores |
Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggabl... | 0 | reject | T1556 | Modify Authentication Process |
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](T1040) or [Transmitted Data Manipulation](T1565.002). By abusing features of common networking protocols that can determine the... | 0 | reject | T1557 | Adversary-in-the-Middle |
Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](T1550.003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realmsâ€, there are three basic participants: ... | 0 | reject | T1558 | Steal or Forge Kerberos Tickets |
Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyc... | 0 | reject | T1559 | Inter-Process Communication |
An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network. Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspi... | 0 | reject | T1560 | Archive Collected Data |
Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources. With direct write access to a disk, adversaries may attempt to overwrite portions of disk data. Adversaries may opt to wipe arbitrary portions of disk data and/or... | 0 | reject | T1561 | Disk Wipe |
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. Th... | 0 | reject | T1562 | Impair Defenses |
Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a user logs into a service, a session will be established that will ... | 0 | reject | T1563 | Remote Service Session Hijacking |
Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on t... | 0 | reject | T1564 | Hide Artifacts |
Adversaries may insert, delete, or manipulate data in order to manipulate external outcomes or hide activity. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.
The type of modification and the impact it will have depends on the target applicat... | 0 | reject | T1565 | Data Manipulation |
Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries c... | 0 | reject | T1566 | Phishing |
Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them... | 0 | reject | T1567 | Exfiltration Over Web Service |
Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to ... | 0 | reject | T1568 | Dynamic Resolution |
Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence ([Create or Modify System Process](T1543)), but ad... | 0 | reject | T1569 | System Services |
Adversaries may transfer tools or other files between systems in a compromised environment. Files may be copied from one system to another to stage adversary tools or other files over the course of an operation. Adversaries may copy files laterally between internal victim systems to support lateral movement using inher... | 0 | reject | T1570 | Lateral Tool Transfer |
Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a ... | 0 | reject | T1571 | Non-Standard Port |
Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. Tunneling involves explicitly encapsulating a protocol within another. This behavior may conceal malicious traffic by blending ... | 0 | reject | T1572 | Protocol Tunneling |
Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generat... | 0 | reject | T1573 | Encrypted Channel |
Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as appli... | 0 | reject | T1574 | Hijack Execution Flow |
An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots.
Permissions gained from t... | 0 | reject | T1578 | Modify Cloud Compute Infrastructure |
An adversary may attempt to discover resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services.
Cloud providers offe... | 0 | reject | T1580 | Cloud Infrastructure Discovery |
Adversaries may buy, lease, or rent infrastructure that can be used during targeting. A wide variety of infrastructure exists for hosting and orchestrating adversary operations. Infrastructure solutions include physical or cloud servers, domains, and third-party web services.(Citation: TrendmicroHideoutsLease) Addition... | 0 | reject | T1583 | Acquire Infrastructure |
Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions include physical or cloud servers, domains, and third-party web services. Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it during other phases of t... | 0 | reject | T1584 | Compromise Infrastructure |
Adversaries may create and cultivate accounts with services that can be used during targeting. Adversaries can create accounts that can be used to build a persona to further operations. Persona development consists of the development of public information, presence, history and appropriate affiliations. This developmen... | 0 | reject | T1585 | Establish Accounts |
Adversaries may compromise accounts with services that can be used during targeting. For operations incorporating social engineering, the utilization of an online persona may be important. Rather than creating and cultivating accounts (i.e. [Establish Accounts](T1585)), adversaries may compromise existing accounts. Uti... | 0 | reject | T1586 | Compromise Accounts |
Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely downloading, or stealing capabilities, adversaries may develop their own capabilities in-house. This is the process of identifying development requirements and building solutions such as malware, exploits, and self-sign... | 0 | reject | T1587 | Develop Capabilities |
Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than developing their own capabilities in-house, adversaries may purchase, freely download, or steal them. Activities may include the acquisition of malware, software (including licenses), exploits, certificates, and information rel... | 0 | reject | T1588 | Obtain Capabilities |
Adversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include a variety of details, including the names of divisions/departments, specifics of business operations, as well as the roles and responsibilities of key employees.
Adversari... | 0 | reject | T1591 | Gather Victim Org Information |
Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc.).
Ad... | 0 | reject | T1592 | Gather Victim Host Information |
Adversaries may search freely available websites and/or domains for information about victims that can be used during targeting. Information about victims may be available in various online sites, such as social media, new sites, or those hosting information about business operations such as hiring or requested/rewarde... | 0 | reject | T1593 | Search Open Websites/Domains |
Adversaries may search websites owned by the victim for information that can be used during targeting. Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: [Email Addresses](T1589.00... | 0 | reject | T1594 | Search Victim-Owned Websites |
Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to other forms of reconnaissance that do not involve direct interaction.
Adversaries may perform different... | 0 | reject | T1595 | Active Scanning |
Adversaries may search freely available technical databases for information about victims that can be used during targeting. Information about victims may be available in online databases and repositories, such as registrations of domains/certificates as well as public collections of network data/artifacts gathered fro... | 0 | reject | T1596 | Search Open Technical Databases |
Adversaries may search and gather information about victims from closed sources that can be used during targeting. Information about victims may be available for purchase from reputable private sources and databases, such as paid subscriptions to feeds of technical/threat intelligence data.(Citation: D3Secutrity CTI Fe... | 0 | reject | T1597 | Search Closed Sources |
Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from [Phishing](T1566) in that the o... | 0 | reject | T1598 | Phishing for Information |
Adversaries may bridge network boundaries by compromising perimeter network devices. Breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks.
Devices such as routers and firewalls can be used to create boundaries between trusted a... | 0 | reject | T1599 | Network Boundary Bridging |
Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution)
Encryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disc... | 0 | reject | T1600 | Weaken Encryption |
Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves. On such devices, the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file.
To change the opera... | 0 | reject | T1601 | Modify System Image |
Adversaries may collect data related to managed devices from configuration repositories. Configuration repositories are used by management systems in order to configure, manage, and control data on remote systems. Configuration repositories may also facilitate remote access and administration of devices.
Adversaries m... | 0 | reject | T1602 | Data from Configuration Repository |
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services. Web applications and services (hosted in cloud SaaS environments or on-premise servers) often use session cookies, tokens, or other materials to authenticate and authorize user access.
Adversaries may g... | 0 | reject | T1606 | Forge Web Credentials |
Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](T1587)) or obtained ([Obtain Capabilities](T1588)) and stage them on infrastructure under their control. The... | 0 | reject | T1608 | Stage Capabilities |
Adversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API server, or the kubelet may allow remote management of containers within an environment.(Citation: Docker Daemon CLI)(Citation: Kubernetes API)... | 0 | reject | T1609 | Container Administration Command |
Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new cont... | 0 | reject | T1610 | Deploy Container |
Adversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the hos... | 0 | reject | T1611 | Escape to Host |
Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote `build` request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and ... | 0 | reject | T1612 | Build Image on Host |
Adversaries may attempt to discover containers and other resources that are available within a containers environment. Other resources may include images, deployments, pods, nodes, and other information such as the status of a cluster.
These resources can be viewed within web applications such as the Kubernetes dashbo... | 0 | reject | T1613 | Container and Resource Discovery |
Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in domain objects that can be manipulated or used to blend in the environment. Group Policy allows for centralized management of user and computer s... | 0 | reject | T1615 | Group Policy Discovery |
Adversaries may enumerate objects in cloud storage infrastructure. Adversaries may use this information during automated discovery to shape follow-on behaviors, including requesting all or specific objects from cloud storage. Similar to [File and Directory Discovery](T1083) on a local host, after identifying available... | 0 | reject | T1619 | Cloud Storage Object Discovery |
Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflective loading involves allocating then executing payloads directly within the memory of the process, vice creating a thread or process backed by a file path on disk. Reflectively loaded payloads may be co... | 0 | reject | T1620 | Reflective Code Loading |
Astaroth has been delivered via malicious e-mail attachments. | 1 | accept | T1598.002 | Phishing for Information: Spearphishing Attachment |
Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites. | 1 | accept | T1598.002 | Phishing for Information: Spearphishing Attachment |
A phishing campaign has been observed by researchers from Trend Micro that contain a macro-enabled document that exploits the legitimate script engine, “AutoHotKey.” | 1 | accept | T1598.002 | Phishing for Information: Spearphishing Attachment |
Researchers have discovered a wave of emails with malicious attachments orchestrated by Russian Advanced Persistent Threat (APT) group APT29. | 1 | accept | T1598.002 | Phishing for Information: Spearphishing Attachment |
Using attached HTML files containing JavaScript, the email will write an ISO file to disk; this contains a Cobalt Strike beacon that will activate on completion. | 1 | accept | T1598.002 | Phishing for Information: Spearphishing Attachment |
Strrat, a Java-based malware, is currently being delivered as an attached PDF document via a phishing campaign using compromised email accounts. | 1 | accept | T1598.002 | Phishing for Information: Spearphishing Attachment |
Although the email may look official and legitimate, if you have no reason to receive such an email or if the content is questionable, you should not open any attached files. | 1 | accept | T1598.002 | Phishing for Information: Spearphishing Attachment |
Some spam lists are selected to target a specific business role, for example identified sales representatives. | 1 | accept | T1591.004 | Gather Victim Org Information: Identify Roles |
Through reading the extracted emails, threat actors identified that fund transfers were originating in the accounting department by person A and approved by manager B. | 1 | accept | T1591.004 | Gather Victim Org Information: Identify Roles |
RestorePrivacy, an information site about privacy, examined the proof the seller put out and found the following information, scraped from LinkedIn user profiles: Email addresses, Full names, Phone numbers, Physical addresses, LinkedIn username and profile URL, Personal and professional experience/background. | 1 | accept | T1591.004 | Gather Victim Org Information: Identify Roles |
Targets are identified, groomed, and then deceived by quite sophisticated email techniques into wiring funds to 'burner' bank accounts, and thinking that the email request comes from the CEO, the victim willingly sends the money. | 1 | accept | T1591.004 | Gather Victim Org Information: Identify Roles |
This threat group instructs its affiliates to parse companies’ websites and social media to identify leadership, HR, and accounting staff for following targeted spear phishing attacks. | 1 | accept | T1591.004 | Gather Victim Org Information: Identify Roles |
Threat actors identified that long holiday weekend in the US will be the best time to lunch a cyber attack against this company. | 1 | accept | T1591.003 | Gather Victim Org Information: Identify Business Tempo |
The federal advisory makes note of "recent holiday targeting," stating that "cyber actors have conducted increasingly impactful attacks against U.S. entities on or around holiday weekends." Neither FBI nor CISA has information about a cyberattack "coinciding with upcoming holidays and weekends," per the advisory, but ... | 1 | accept | T1591.003 | Gather Victim Org Information: Identify Business Tempo |
Whether you celebrate Christmas, Hanukkah, or Thanksgiving, your chances of being the victim of a cyber attack increase. The vacation season is yet another perfect period for cyber attacks. If a hacker had a choice between attacking your organization when your IT security team is fully staffed or when it isn’t- what ... | 1 | accept | T1591.003 | Gather Victim Org Information: Identify Business Tempo |
Many times, organizations are overburdened, and cyberattacks during the holidays are the last thing on their minds. The current pandemic heightened the threat, which has resulted in many firms operating with significant cybersecurity flaws resulting from the rapid shift to working from home. Cybercriminals exploit the... | 1 | accept | T1591.003 | Gather Victim Org Information: Identify Business Tempo |
Once they had infected the computers of the personnel in charge of cash transfer systems or ATMs, the attackers collected snapshots of victims’ screens and studied their daily activities in the bank. | 1 | accept | T1591.003 | Gather Victim Org Information: Identify Business Tempo |
REvil was previously known as GandCrab, and one of the many things GandCrab had in common with REvil was that both programs barred affiliates from infecting victims in Syria. | 1 | accept | T1591.001 | Gather Victim Org Information: Determine Physical Locations |
As we can see from the chart above, Syria is also exempted from infections by DarkSide ransomware. | 1 | accept | T1591.001 | Gather Victim Org Information: Determine Physical Locations |
However, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of France. | 1 | accept | T1591.001 | Gather Victim Org Information: Determine Physical Locations |
The majority of the actors behind the ransomware are likely based outside of the CIS, for example, ransomware Fonix won’t run if IP geolocation is Iranian. | 1 | accept | T1591.001 | Gather Victim Org Information: Determine Physical Locations |
DarkSide, like a great many other malware strains, has a hard-coded do-not-install list of countries which are the principal members of the Commonwealth of Independent States (CIS) — former Soviet satellites that mostly have favorable relations with the Kremlin. | 1 | accept | T1591.001 | Gather Victim Org Information: Determine Physical Locations |
REvil was previously known as GandCrab, and one of the many things GandCrab had in common with REvil was that both programs barred affiliates from infecting victims in Syria. | 1 | accept | T1591.001 | Gather Victim Org Information: Determine Physical Locations |
As we can see from the chart above, Syria is also exempted from infections by DarkSide ransomware. ;; However, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of France. | 1 | accept | T1591.001 | Gather Victim Org Information: Determine Physical Locations |
In preparation for its attack against the 2018 Winter Olympics Sandworm Team conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site. | 1 | accept | T1591.002 | Gather Victim Org Information: Business Relationships |
Generally, supply chain attacks on information systems begin with an advanced persistent threat (APT) that determines a member of the supply network with the weakest cyber security in order to affect the target organization. | 1 | accept | T1591.002 | Gather Victim Org Information: Business Relationships |
It also found that hackers can steal sensitive data, including information about partners. | 1 | accept | T1591.002 | Gather Victim Org Information: Business Relationships |
The attackers were after Facebook’s information about partners. | 1 | accept | T1591.002 | Gather Victim Org Information: Business Relationships |
Clues about business partners can provide a hacker with other potential avenues of attack.
| 1 | accept | T1591.002 | Gather Victim Org Information: Business Relationships |
Attackers identified and impersonated the company’s foreign supplier in a Bogus Invoice Scheme attack. | 1 | accept | T1591.002 | Gather Victim Org Information: Business Relationships |
Attackers are looking for IT service providers that have privileged access to their clients’ networks.
| 1 | accept | T1590.003 | Gather Victim Network Information: Network Trust Dependencies |
Nation-state sponsored hackers are targeting IT service providers and discovering network trust relationships with their client organizations from government and military sectors.
| 1 | accept | T1590.003 | Gather Victim Network Information: Network Trust Dependencies |
The threat actors were looking for MSPs and MSSPs managing IT and security within the target organization.
| 1 | accept | T1590.003 | Gather Victim Network Information: Network Trust Dependencies |
In all of the cases, attackers enumerated network trust relationships, hijacked the managed service providers’ internal management tools to distribute Sodinokibi ransomware to their customers.
| 1 | accept | T1590.003 | Gather Victim Network Information: Network Trust Dependencies |
A hacker can make one strategic breach into an MSP, discover network access to their clients, and gain access to multiple customers’ information across multiple industries. | 1 | accept | T1590.003 | Gather Victim Network Information: Network Trust Dependencies |
The group utilizes active scanning to collect information on the victim network.
| 1 | accept | T1590.004 | Gather Victim Network Information: Network Topology |
After the initial foothold the actors were scanning to map the local network devices and plan the lateral movement.
| 1 | accept | T1590.004 | Gather Victim Network Information: Network Topology |
During the exfiltration stage, attackers were identifying documents related to local accounts, network security and topology.
| 1 | accept | T1590.004 | Gather Victim Network Information: Network Topology |
Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network devices used by the organization (gateways, routers, etc.)
| 1 | accept | T1590.004 | Gather Victim Network Information: Network Topology |
All the graphs, mind maps, presentations including the physical and/or logical arrangement of both external-facing and internal network environments should be treated as sensitive information.
| 1 | accept | T1590.004 | Gather Victim Network Information: Network Topology |
This firewall company had a few large customers listed on their website thus providing the attackers with convenient targets. | 1 | accept | T1590.006 | Gather Victim Network Information: Network Security Appliances |
Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network security appliances used by the organization (firewalls, content filters, NIDS, etc.)
| 1 | accept | T1590.006 | Gather Victim Network Information: Network Security Appliances |
Following the intrusion, actors were scanning to identify firewalls and other deployed security appliances.
| 1 | accept | T1590.006 | Gather Victim Network Information: Network Security Appliances |
This group phishes for information trying to identify deployed security appliances and leverage it for initial access.
| 1 | accept | T1590.006 | Gather Victim Network Information: Network Security Appliances |
This APT group was identifying the use of proxies and company VPN and then utilizing these security appliances for stealthy lateral movement. | 1 | accept | T1590.006 | Gather Victim Network Information: Network Security Appliances |
HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers. | 1 | accept | T1590.005 | Gather Victim Network Information: Ip Addresses |
Andariel has limited its watering hole attacks to specific IP address ranges.
| 1 | accept | T1590.005 | Gather Victim Network Information: Ip Addresses |
Initially the attackers research the victim’s IP ranges and scan them for open ports and opportunities for the initial access.
| 1 | accept | T1590.005 | Gather Victim Network Information: Ip Addresses |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.