Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Command and Control

Id Name
21 Application Layer Protocol
29 Asymmetric Cryptography
39 Bidirectional Communication
75 Commonly Used Port
76 Communication Through Removable Media
111 DNS
113 DNS Calculation
118 Data Encoding
121 Data Obfuscation
130 Dead Drop Resolver
157 Domain Fronting
158 Domain Generation Algorithms
172 Dynamic Resolution
183 Encrypted Channel
213 External Proxy
216 Fallback Channels
217 Fast Flux DNS
219 File Transfer Protocols
256 Ingress Tool Transfer
264 Internal Proxy
269 Junk Data
296 Mail Protocols
315 Multi-Stage Channels
316 Multi-hop Proxy
317 Multiband Communication
336 Non-Application Layer Protocol
337 Non-Standard Encoding
338 Non-Standard Port
347 One-Way Communication
371 Port Knocking
385 Protocol Impersonation
386 Protocol Tunneling
387 Proxy
403 Remote Access Software
478 Standard Encoding
484 Steganography
489 Symmetric Cryptography
515 Traffic Signaling
548 Web Protocols
549 Web Service