KnownTechniques enum
Campos
| AbuseElevationControlMechanism | Mecanismo de AbusoElevationControl |
| AccessTokenManipulation | AccessTokenManipulation |
| AccountDiscovery | Descoberta de conta |
| AccountManipulation | Manipulação de conta |
| ActiveScanning | ActiveScanning |
| ApplicationLayerProtocol | Protocolo de Camada de Aplicação |
| AudioCapture | Captura de áudio |
| BootOrLogonAutostartExecution | BootOrLogonAutostartExecution |
| BootOrLogonInitializationScripts | BootOrLogonInitializationScripts |
| BruteForce | Força Bruta |
| CloudInfrastructureDiscovery | CloudInfrastructureDiscovery |
| CloudServiceDashboard | CloudServiceDashboard |
| CloudServiceDiscovery | CloudServiceDiscovery |
| CommandAndScriptingInterpreter | Interpretador CommandAndScriptingInterpreter |
| CompromiseClientSoftwareBinary | CompromissoClienteSoftwareBinário |
| CompromiseInfrastructure | CompromiseInfrastructure |
| ContainerAndResourceDiscovery | ContainerAndResourceDiscovery |
| CreateAccount | CreateAccount |
| CreateOrModifySystemProcess | CreateOrModifySystemProcess |
| CredentialsFromPasswordStores | CredentialsFromPasswordStores |
| DataDestruction | Destruição de dados |
| DataEncryptedForImpact | DataEncryptedForImpact |
| DataFromCloudStorageObject | DataFromCloudStorageObject |
| DataFromConfigurationRepository | DataFromConfigurationRepository |
| DataFromInformationRepositories | Repositórios DataFromInformationRepositories |
| DataFromLocalSystem | DataFromLocalSystem |
| DataManipulation | Manipulação de dados |
| DataStaged | DataStaged |
| Defacement | Desfiguração |
| DeobfuscateDecodeFilesOrInformation | DesofuscaçãoDecodeFilesOrInformation |
| DiskWipe | Limpeza de disco |
| DomainTrustDiscovery | DomainTrustDiscovery |
| DriveByCompromise | DriveByCompromise |
| DynamicResolution | Resolução Dinâmica |
| EndpointDenialOfService | EndpointDenialOfService |
| EventTriggeredExecution | Execução acionada por eventos |
| ExfiltrationOverAlternativeProtocol | ExfiltraçãoOverAlternativeProtocol |
| ExploitationForClientExecution | ExploraçãoParaClientExecution |
| ExploitationForCredentialAccess | ExploitationForCredentialAccess |
| ExploitationForDefenseEvasion | ExploraçãoParaEvasão de Defesa |
| ExploitationForPrivilegeEscalation | ExploitationForPrivilegeEscalation |
| ExploitationOfRemoteServices | ExploraçãoDeRemoteServices |
| ExploitPublicFacingApplication | ExploitPublicFacingApplication |
| ExternalRemoteServices | Serviços Remotos Externos |
| FallbackChannels | Canais de fallback |
| FileAndDirectoryDiscovery | FileAndDirectoryDiscovery |
| FileAndDirectoryPermissionsModification | FileAndDirectoryPermissionsModification |
| GatherVictimNetworkInformation | GatherVictimNetworkInformation |
| HideArtifacts | Artefatos de Ocultação |
| HijackExecutionFlow | Fluxo de execução de seqüestro |
| ImpairDefenses | Defesas Prejudicadas |
| ImplantContainerImage | Imagem do ImplantContainer |
| IndicatorRemovalOnHost | IndicatorRemovalOnHost |
| IndirectCommandExecution | Execução de Comando Indireto |
| IngressToolTransfer | Transferência de ferramentas de entrada |
| InputCapture | Captura de entrada |
| InterProcessCommunication | Comunicação InterProcesso |
| LateralToolTransfer | LateralToolTransfer |
| ManInTheMiddle | HomemNoMeio |
| Masquerading | Masquerading |
| ModifyAuthenticationProcess | Processo de Modificação de Autenticação |
| ModifyRegistry | Modificar Registro |
| NetworkDenialOfService | NetworkDenialOfService |
| NetworkServiceScanning | NetworkServiceScanning |
| NetworkSniffing | Detecção de rede |
| NonApplicationLayerProtocol | Protocolo NonApplicationLayer |
| NonStandardPort | Porta não padrão |
| ObfuscatedFilesOrInformation | ObfuscatedFilesOrInformation |
| ObtainCapabilities | Obter recursos |
| OfficeApplicationStartup | OfficeApplicationStartup |
| OSCredentialDumping | OSCredentialDumping |
| PermissionGroupsDiscovery | PermissionGroupsDiscovery |
| Phishing | Phishing |
| PreOSBoot | PreOSBoot |
| ProcessDiscovery | Descoberta de processos |
| ProcessInjection | Injeção de processo |
| ProtocolTunneling | ProtocolTunneling |
| Proxy | Proxy |
| QueryRegistry | QueryRegistry |
| RemoteAccessSoftware | Software de acesso remoto |
| RemoteServices | Serviços remotos |
| RemoteServiceSessionHijacking | RemoteServiceSessionHijacking |
| RemoteSystemDiscovery | Descoberta do Sistema Remoto |
| ResourceHijacking | Sequestro de recursos |
| ScheduledTaskJob | ScheduledTaskJob |
| ScreenCapture | ScreenCapture |
| SearchVictimOwnedWebsites | SearchVictimOwnedWebsites |
| ServerSoftwareComponent | Componente de software de servidor |
| ServiceStop | Parada de serviço |
| SignedBinaryProxyExecution | Execução de proxy binário assinado |
| SoftwareDeploymentTools | SoftwareDeploymentTools |
| SQLStoredProcedures | SQLStoredProcedures |
| StealOrForgeKerberosTickets | StealOrForgeKerberosTickets |
| SubvertTrustControls | SubvertTrustControls |
| SupplyChainCompromise | Comprometimento da cadeia de suprimentos |
| SystemInformationDiscovery | SystemInformationDiscovery |
| TaintSharedContent | TaintSharedContent |
| TrafficSignaling | Sinalização de tráfego |
| TransferDataToCloudAccount | TransferDataToCloudAccount |
| TrustedRelationship | Relacionamento Confiável |
| UnsecuredCredentials | Credenciais não seguras |
| UserExecution | UserExecution |
| ValidAccounts | Contas válidas |
| WindowsManagementInstrumentation | WindowsManagementInstrumentation |