AbuseElevationControlMechanism
|
|
AccessTokenManipulation
|
|
AccountDiscovery
|
|
AccountManipulation
|
|
ActiveScanning
|
|
ApplicationLayerProtocol
|
|
AudioCapture
|
|
BootOrLogonAutostartExecution
|
|
BootOrLogonInitializationScripts
|
|
BruteForce
|
|
CloudInfrastructureDiscovery
|
|
CloudServiceDashboard
|
|
CloudServiceDiscovery
|
|
CommandAndScriptingInterpreter
|
|
CompromiseClientSoftwareBinary
|
|
CompromiseInfrastructure
|
|
ContainerAndResourceDiscovery
|
|
CreateAccount
|
|
CreateOrModifySystemProcess
|
|
CredentialsFromPasswordStores
|
|
DataDestruction
|
|
DataEncryptedForImpact
|
|
DataFromCloudStorageObject
|
|
DataFromConfigurationRepository
|
|
DataFromInformationRepositories
|
|
DataFromLocalSystem
|
|
DataManipulation
|
|
DataStaged
|
|
Defacement
|
|
DeobfuscateDecodeFilesOrInformation
|
|
DiskWipe
|
|
DomainTrustDiscovery
|
|
DriveByCompromise
|
|
DynamicResolution
|
|
EndpointDenialOfService
|
|
EventTriggeredExecution
|
|
ExfiltrationOverAlternativeProtocol
|
|
ExploitationForClientExecution
|
|
ExploitationForCredentialAccess
|
|
ExploitationForDefenseEvasion
|
|
ExploitationForPrivilegeEscalation
|
|
ExploitationOfRemoteServices
|
|
ExploitPublicFacingApplication
|
|
ExternalRemoteServices
|
|
FallbackChannels
|
|
FileAndDirectoryDiscovery
|
|
FileAndDirectoryPermissionsModification
|
|
GatherVictimNetworkInformation
|
|
HideArtifacts
|
|
HijackExecutionFlow
|
|
ImpairDefenses
|
|
ImplantContainerImage
|
|
IndicatorRemovalOnHost
|
|
IndirectCommandExecution
|
|
IngressToolTransfer
|
|
InputCapture
|
|
InterProcessCommunication
|
|
LateralToolTransfer
|
|
ManInTheMiddle
|
|
Masquerading
|
|
ModifyAuthenticationProcess
|
|
ModifyRegistry
|
|
NetworkDenialOfService
|
|
NetworkServiceScanning
|
|
NetworkSniffing
|
|
NonApplicationLayerProtocol
|
|
NonStandardPort
|
|
ObfuscatedFilesOrInformation
|
|
ObtainCapabilities
|
|
OfficeApplicationStartup
|
|
OSCredentialDumping
|
|
PermissionGroupsDiscovery
|
|
Phishing
|
|
PreOSBoot
|
|
ProcessDiscovery
|
|
ProcessInjection
|
|
ProtocolTunneling
|
|
Proxy
|
|
QueryRegistry
|
|
RemoteAccessSoftware
|
|
RemoteServices
|
|
RemoteServiceSessionHijacking
|
|
RemoteSystemDiscovery
|
|
ResourceHijacking
|
|
ScheduledTaskJob
|
|
ScreenCapture
|
|
SearchVictimOwnedWebsites
|
|
ServerSoftwareComponent
|
|
ServiceStop
|
|
SignedBinaryProxyExecution
|
|
SoftwareDeploymentTools
|
|
SQLStoredProcedures
|
|
StealOrForgeKerberosTickets
|
|
SubvertTrustControls
|
|
SupplyChainCompromise
|
|
SystemInformationDiscovery
|
|
TaintSharedContent
|
|
TrafficSignaling
|
|
TransferDataToCloudAccount
|
|
TrustedRelationship
|
|
UnsecuredCredentials
|
|
UserExecution
|
|
ValidAccounts
|
|
WindowsManagementInstrumentation
|
|