Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Discovery

Id Name
8 Account Discovery
23 Application Window Discovery
46 Browser Bookmark Discovery
63 Cloud Account
65 Cloud Groups
66 Cloud Infrastructure Discovery
68 Cloud Service Dashboard
69 Cloud Service Discovery
93 Container and Resource Discovery
154 Domain Account
159 Domain Groups
162 Domain Trust Discovery
175 Email Account
220 File and Directory Discovery
266 Internet Connection Discovery
288 Local Account
292 Local Groups
330 Network Service Scanning
332 Network Share Discovery
333 Network Sniffing
358 Password Policy Discovery
365 Peripheral Device Discovery
366 Permission Groups Discovery
381 Process Discovery
392 Query Registry
409 Remote System Discovery
443 Security Software Discovery
467 Software Discovery
490 System Checks
492 System Information Discovery
493 System Location Discovery
494 System Network Configuration Discovery
495 System Network Connections Discovery
496 System Owner/User Discovery
497 System Service Discovery
500 System Time Discovery
509 Time Based Evasion
530 User Activity Based Checks
540 Virtualization/Sandbox Evasion