Defines values for Techniques. KnownTechniques can be used interchangeably with Techniques,
this enum contains the known values that the service supports.
Abuse Elevation Control Mechanism Access Token Manipulation Account Discovery Account Manipulation Active Scanning Application Layer Protocol Audio Capture Boot or Logon Autostart Execution Boot or Logon Initialization Scripts Brute Force Cloud Infrastructure Discovery Cloud Service Dashboard Cloud Service Discovery Command and Scripting Interpreter Compromise Client Software Binary Compromise Infrastructure Container and Resource Discovery Create Account Create or Modify System Process Credentials from Password Stores Data Destruction Data Encrypted for Impact Data from Cloud Storage Object Data from Configuration Repository Data from Information Repositories Data from Local System Data Manipulation Data Staged Defacement Deobfuscate/Decode Files or Information Disk Wipe Domain Trust Discovery Drive-by Compromise Dynamic Resolution Endpoint Denial of Service Event Triggered Execution Exfiltration Over Alternative Protocol Exploit Public-Facing Application Exploitation for Client Execution Exploitation for Credential Access Exploitation for Defense Evasion Exploitation for Privilege Escalation Exploitation of Remote Services External Remote Services Fallback Channels File and Directory Discovery Gather Victim Network Information Hide Artifacts Hijack Execution Flow Impair Defenses Implant Container Image Indicator Removal on Host Indirect Command Execution Ingress Tool Transfer Input Capture Inter-Process Communication Lateral Tool Transfer Man-in-the-Middle Masquerading Modify Authentication Process Modify Registry Network Denial of Service Network Service Scanning Network Sniffing Non-Application Layer Protocol Non-Standard Port Obtain Capabilities Obfuscated Files or Information Office Application Startup OS Credential Dumping Permission Groups Discovery Phishing Pre-OS Boot Process Discovery Process Injection Protocol Tunneling Proxy Query Registry Remote Access Software Remote Service Session Hijacking Remote Services Remote System Discovery Resource Hijacking Scheduled Task/Job Screen Capture Search Victim-Owned Websites Server Software Component Service Stop Signed Binary Proxy Execution Software Deployment Tools SQL Stored Procedures Steal or Forge Kerberos Tickets Subvert Trust Controls Supply Chain Compromise System Information Discovery Taint Shared Content Traffic Signaling Transfer Data to Cloud Account Trusted Relationship Unsecured Credentials User Execution Valid Accounts Windows Management Instrumentation File and Directory Permissions Modification
Defines values for Techniques.
KnownTechniques can be used interchangeably with Techniques, this enum contains the known values that the service supports.
Known values supported by the service
Abuse Elevation Control Mechanism
Access Token Manipulation
Account Discovery
Account Manipulation
Active Scanning
Application Layer Protocol
Audio Capture
Boot or Logon Autostart Execution
Boot or Logon Initialization Scripts
Brute Force
Cloud Infrastructure Discovery
Cloud Service Dashboard
Cloud Service Discovery
Command and Scripting Interpreter
Compromise Client Software Binary
Compromise Infrastructure
Container and Resource Discovery
Create Account
Create or Modify System Process
Credentials from Password Stores
Data Destruction
Data Encrypted for Impact
Data from Cloud Storage Object
Data from Configuration Repository
Data from Information Repositories
Data from Local System
Data Manipulation
Data Staged
Defacement
Deobfuscate/Decode Files or Information
Disk Wipe
Domain Trust Discovery
Drive-by Compromise
Dynamic Resolution
Endpoint Denial of Service
Event Triggered Execution
Exfiltration Over Alternative Protocol
Exploit Public-Facing Application
Exploitation for Client Execution
Exploitation for Credential Access
Exploitation for Defense Evasion
Exploitation for Privilege Escalation
Exploitation of Remote Services
External Remote Services
Fallback Channels
File and Directory Discovery
Gather Victim Network Information
Hide Artifacts
Hijack Execution Flow
Impair Defenses
Implant Container Image
Indicator Removal on Host
Indirect Command Execution
Ingress Tool Transfer
Input Capture
Inter-Process Communication
Lateral Tool Transfer
Man-in-the-Middle
Masquerading
Modify Authentication Process
Modify Registry
Network Denial of Service
Network Service Scanning
Network Sniffing
Non-Application Layer Protocol
Non-Standard Port
Obtain Capabilities
Obfuscated Files or Information
Office Application Startup
OS Credential Dumping
Permission Groups Discovery
Phishing
Pre-OS Boot
Process Discovery
Process Injection
Protocol Tunneling
Proxy
Query Registry
Remote Access Software
Remote Service Session Hijacking
Remote Services
Remote System Discovery
Resource Hijacking
Scheduled Task/Job
Screen Capture
Search Victim-Owned Websites
Server Software Component
Service Stop
Signed Binary Proxy Execution
Software Deployment Tools
SQL Stored Procedures
Steal or Forge Kerberos Tickets
Subvert Trust Controls
Supply Chain Compromise
System Information Discovery
Taint Shared Content
Traffic Signaling
Transfer Data to Cloud Account
Trusted Relationship
Unsecured Credentials
User Execution
Valid Accounts
Windows Management Instrumentation
File and Directory Permissions Modification