pub enum MitreTactics {
Show 28 variants TA0043, TA0042, TA0001, TA0002, TA0003, TA0004, TA0005, TA0006, TA0007, TA0008, TA0009, TA0011, TA0010, TA0040, TA0027, TA0041, TA0028, TA0029, TA0030, TA0031, TA0032, TA0033, TA0035, TA0037, TA0036, TA0034, TA0038, TA0039,
}

Variants

TA0043

Reconnaissance: The adversary is trying to gather information they can use to plan future operations. https://attack.mitre.org/tactics/TA0043

TA0042

Resource: Development The adversary is trying to establish resources they can use to support operations. https://attack.mitre.org/tactics/TA0042

TA0001

Initial: Access The adversary is trying to get into your network. https://attack.mitre.org/tactics/TA0001

TA0002

Execution: The adversary is trying to run malicious code. https://attack.mitre.org/tactics/TA0002

TA0003

Persistence: The adversary is trying to maintain their foothold. https://attack.mitre.org/tactics/TA0003

TA0004

Privilege: Escalation The adversary is trying to gain higher-level permissions. https://attack.mitre.org/tactics/TA0004

TA0005

Defense: Evasion The adversary is trying to avoid being detected. https://attack.mitre.org/tactics/TA0005

TA0006

Credential: Access The adversary is trying to steal account names and passwords. https://attack.mitre.org/tactics/TA0006

TA0007

Discovery: The adversary is trying to figure out your environment. https://attack.mitre.org/tactics/TA0007

TA0008

Lateral: Movement The adversary is trying to move through your environment. https://attack.mitre.org/tactics/TA0008

TA0009

Collection: The adversary is trying to gather data of interest to their goal. https://attack.mitre.org/tactics/TA0009

TA0011

Command: and Control The adversary is trying to communicate with compromised systems to control them. https://attack.mitre.org/tactics/TA0011

TA0010

Exfiltration: The adversary is trying to steal data. https://attack.mitre.org/tactics/TA0010

TA0040

Impact: The adversary is trying to manipulate, interrupt, or destroy your systems and data. https://attack.mitre.org/tactics/TA0040

TA0027

Initial: Access The adversary is trying to get into your device. https://attack.mitre.org/tactics/TA0027

TA0041

Execution: The adversary is trying to run malicious code. https://attack.mitre.org/tactics/TA0041

TA0028

Persistence: The adversary is trying to maintain their foothold. https://attack.mitre.org/tactics/TA0028

TA0029

Privilege: Escalation The adversary is trying to gain higher-level permissions. https://attack.mitre.org/tactics/TA0029

TA0030

Defense: Evasion The adversary is trying to avoid being detected. https://attack.mitre.org/tactics/TA0030

TA0031

Credential: Access The adversary is trying to steal account names, passwords, or other secrets that enable access to resources. https://attack.mitre.org/tactics/TA0031

TA0032

Discovery: The adversary is trying to figure out your environment. https://attack.mitre.org/tactics/TA0032

TA0033

Lateral: Movement The adversary is trying to move through your environment. https://attack.mitre.org/tactics/TA0033

TA0035

Collection: The adversary is trying to gather data of interest to their goal. https://attack.mitre.org/tactics/TA0035

TA0037

Command: and Control The adversary is trying to communicate with compromised devices to control them. https://attack.mitre.org/tactics/TA0037

TA0036

Exfiltration: The adversary is trying to steal data. https://attack.mitre.org/tactics/TA0036

TA0034

Impact: The adversary is trying to manipulate, interrupt, or destroy your devices and data. https://attack.mitre.org/tactics/TA0034

TA0038

Network: Effects The adversary is trying to intercept or manipulate network traffic to or from a device. https://attack.mitre.org/tactics/TA0038

TA0039

Remote: Service Effects The adversary is trying to control or monitor the device using remote services. https://attack.mitre.org/tactics/TA0039

Trait Implementations

Returns a copy of the value. Read more
Performs copy-assignment from source. Read more
Formats the value using the given formatter. Read more
Serialize this value into the given Serde serializer. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more
Immutably borrows from an owned value. Read more
Mutably borrows from an owned value. Read more

Returns the argument unchanged.

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

The resulting type after obtaining ownership.
Creates owned data from borrowed data, usually by cloning. Read more
Uses borrowed data to replace owned data, usually by cloning. Read more
The type returned in the event of a conversion error.
Performs the conversion.
The type returned in the event of a conversion error.
Performs the conversion.