Text this: A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation