Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Collection

Id Name
2 ARP Cache Poisoning
25 Archive Collected Data
26 Archive via Custom Method
27 Archive via Library
28 Archive via Utility
33 Audio Capture
35 Automated Collection
61 Clipboard Data
89 Confluence
100 Credential API Hooking
122 Data Staged
124 Data from Cloud Storage Object
125 Data from Configuration Repository
126 Data from Information Repositories
127 Data from Local System
128 Data from Network Shared Drive
129 Data from Removable Media
179 Email Collection
180 Email Forwarding Rule
226 GUI Input Capture
258 Input Capture
273 Keylogging
276 LLMNR/NBT-NS Poisoning and SMB Relay
290 Local Data Staging
291 Local Email Collection
303 Man in the Browser
304 Man-in-the-Middle
327 Network Device Configuration Dump
404 Remote Data Staging
406 Remote Email Collection
424 SNMP (MIB Dump)
434 Screen Capture
457 Sharepoint
537 Video Capture
547 Web Portal Capture