KnownTechniques enum
Known values of Techniques that the service accepts.
Fields
| AbuseElevationControlMechanism | AbuseElevationControlMechanism |
| AccessTokenManipulation | AccessTokenManipulation |
| AccountDiscovery | AccountDiscovery |
| AccountManipulation | AccountManipulation |
| ActiveScanning | ActiveScanning |
| ApplicationLayerProtocol | ApplicationLayerProtocol |
| AudioCapture | AudioCapture |
| BootOrLogonAutostartExecution | BootOrLogonAutostartExecution |
| BootOrLogonInitializationScripts | BootOrLogonInitializationScripts |
| BruteForce | BruteForce |
| CloudInfrastructureDiscovery | CloudInfrastructureDiscovery |
| CloudServiceDashboard | CloudServiceDashboard |
| CloudServiceDiscovery | CloudServiceDiscovery |
| CommandAndScriptingInterpreter | CommandAndScriptingInterpreter |
| CompromiseClientSoftwareBinary | CompromiseClientSoftwareBinary |
| CompromiseInfrastructure | CompromiseInfrastructure |
| ContainerAndResourceDiscovery | ContainerAndResourceDiscovery |
| CreateAccount | CreateAccount |
| CreateOrModifySystemProcess | CreateOrModifySystemProcess |
| CredentialsFromPasswordStores | CredentialsFromPasswordStores |
| DataDestruction | DataDestruction |
| DataEncryptedForImpact | DataEncryptedForImpact |
| DataFromCloudStorageObject | DataFromCloudStorageObject |
| DataFromConfigurationRepository | DataFromConfigurationRepository |
| DataFromInformationRepositories | DataFromInformationRepositories |
| DataFromLocalSystem | DataFromLocalSystem |
| DataManipulation | DataManipulation |
| DataStaged | DataStaged |
| Defacement | Defacement |
| DeobfuscateDecodeFilesOrInformation | DeobfuscateDecodeFilesOrInformation |
| DiskWipe | DiskWipe |
| DomainTrustDiscovery | DomainTrustDiscovery |
| DriveByCompromise | DriveByCompromise |
| DynamicResolution | DynamicResolution |
| EndpointDenialOfService | EndpointDenialOfService |
| EventTriggeredExecution | EventTriggeredExecution |
| ExfiltrationOverAlternativeProtocol | ExfiltrationOverAlternativeProtocol |
| ExploitationForClientExecution | ExploitationForClientExecution |
| ExploitationForCredentialAccess | ExploitationForCredentialAccess |
| ExploitationForDefenseEvasion | ExploitationForDefenseEvasion |
| ExploitationForPrivilegeEscalation | ExploitationForPrivilegeEscalation |
| ExploitationOfRemoteServices | ExploitationOfRemoteServices |
| ExploitPublicFacingApplication | ExploitPublicFacingApplication |
| ExternalRemoteServices | ExternalRemoteServices |
| FallbackChannels | FallbackChannels |
| FileAndDirectoryDiscovery | FileAndDirectoryDiscovery |
| FileAndDirectoryPermissionsModification | FileAndDirectoryPermissionsModification |
| GatherVictimNetworkInformation | GatherVictimNetworkInformation |
| HideArtifacts | HideArtifacts |
| HijackExecutionFlow | HijackExecutionFlow |
| ImpairDefenses | ImpairDefenses |
| ImplantContainerImage | ImplantContainerImage |
| IndicatorRemovalOnHost | IndicatorRemovalOnHost |
| IndirectCommandExecution | IndirectCommandExecution |
| IngressToolTransfer | IngressToolTransfer |
| InputCapture | InputCapture |
| InterProcessCommunication | InterProcessCommunication |
| LateralToolTransfer | LateralToolTransfer |
| ManInTheMiddle | ManInTheMiddle |
| Masquerading | Masquerading |
| ModifyAuthenticationProcess | ModifyAuthenticationProcess |
| ModifyRegistry | ModifyRegistry |
| NetworkDenialOfService | NetworkDenialOfService |
| NetworkServiceScanning | NetworkServiceScanning |
| NetworkSniffing | NetworkSniffing |
| NonApplicationLayerProtocol | NonApplicationLayerProtocol |
| NonStandardPort | NonStandardPort |
| ObfuscatedFilesOrInformation | ObfuscatedFilesOrInformation |
| ObtainCapabilities | ObtainCapabilities |
| OfficeApplicationStartup | OfficeApplicationStartup |
| OSCredentialDumping | OSCredentialDumping |
| PermissionGroupsDiscovery | PermissionGroupsDiscovery |
| Phishing | Phishing |
| PreOSBoot | PreOSBoot |
| ProcessDiscovery | ProcessDiscovery |
| ProcessInjection | ProcessInjection |
| ProtocolTunneling | ProtocolTunneling |
| Proxy | Proxy |
| QueryRegistry | QueryRegistry |
| RemoteAccessSoftware | RemoteAccessSoftware |
| RemoteServices | RemoteServices |
| RemoteServiceSessionHijacking | RemoteServiceSessionHijacking |
| RemoteSystemDiscovery | RemoteSystemDiscovery |
| ResourceHijacking | ResourceHijacking |
| ScheduledTaskJob | ScheduledTaskJob |
| ScreenCapture | ScreenCapture |
| SearchVictimOwnedWebsites | SearchVictimOwnedWebsites |
| ServerSoftwareComponent | ServerSoftwareComponent |
| ServiceStop | ServiceStop |
| SignedBinaryProxyExecution | SignedBinaryProxyExecution |
| SoftwareDeploymentTools | SoftwareDeploymentTools |
| SQLStoredProcedures | SQLStoredProcedures |
| StealOrForgeKerberosTickets | StealOrForgeKerberosTickets |
| SubvertTrustControls | SubvertTrustControls |
| SupplyChainCompromise | SupplyChainCompromise |
| SystemInformationDiscovery | SystemInformationDiscovery |
| TaintSharedContent | TaintSharedContent |
| TrafficSignaling | TrafficSignaling |
| TransferDataToCloudAccount | TransferDataToCloudAccount |
| TrustedRelationship | TrustedRelationship |
| UnsecuredCredentials | UnsecuredCredentials |
| UserExecution | UserExecution |
| ValidAccounts | ValidAccounts |
| WindowsManagementInstrumentation | WindowsManagementInstrumentation |