| A1013 | Certificate authority | Certificate authority is an entity that stores, signs and issues certificates | 
| A3004 | Object File | This artifact describes object entity | 
| A5006 | Credential | This artifact describes credential entity | 
| A3007 | Login Session | This artifact describes login session entity | 
| A1008 | Log | Chronology | 
| A1010 | Authentication service | This artifact describes authentication service | 
| A5011 | RPC Network Traffic | This artifact describes service entity | 
| A5010 | Service Application | This artifact describes service entity | 
| A1015 | Directory Service object attribute | This artifact describes Directory Service object attribute | 
| A4001 | Process | This artifact describes process entity | 
| A3005 | Executable Binary | This artifact describes executable binary entity | 
| A1006 | OWA Web Token | This artifact describes Outlook Web Access web token entity | 
| A5005 | Encrypted Credential | This artifact describes encrypted credential entity | 
| A3002 | File | This artifact describes file entity | 
| A5003 | Pipe | This artifact describes pipeline entity | 
| A1017 | URL | This artifact describes URL entity | 
| A1009 | Kerberos Network Traffic | This artifact describes Kerberos Network Traffic entity | 
| A1004 | Linux Local Account | This artifact describes Local Linux Account entity | 
| A1012 | Private key | This artifact describes private key | 
| A1001 | Active Directory Account | This artifact describes Windows Active Directory user account entity | 
| A5012 | Remote Procedure Call | This artifact describes RPC entity | 
| A3006 | The Component Object Model | This artifact describes COM object entity | 
| A5008 | Password | This artifact describes password entity | 
| A5001 | Executable Script | This artifact describes executable script entity | 
| A1011 | Certificate | Certificate is a electronic document used to prove the ownership of a public key | 
| A4003 | Remote Session | This artifact describes remote session entity | 
| A5002 | Windows Registry | This artifact describes windows registry entity | 
| A1002 | DNS Network Traffic | This artifact describes user DNS Network Traffic entity | 
| A3001 | Email Message | This artifact describes email message entity | 
| A5004 | Access Token | This artifact describes access token entity | 
| A5009 | Password file | This artifact describes password file entity | 
| A1007 | IP Address | This artifact describes IP Address entity | 
| A1016 | Kerberos Ticket Granting Tickets | This artifact describes Kerberos Ticket Granting Tickets | 
| A1003 | Local Windows Account | This artifact describes Local Windows Account entity | 
| A4002 | Process Image | This artifact describes process entity | 
| A1005 | Host | This artifact describes host entity | 
| A1014 | Access right | This artifact describes Access right entity | 
| A5007 | Remote Session | This artifact describes remote session entity | 
| A3003 | Operating System Executable File | This artifact describes executable files (exe, dll, etc) |