Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Exfiltration

Id Name
36 Automated Exfiltration
123 Data Transfer Size Limits
192 Exfiltration Over Alternative Protocol
193 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
194 Exfiltration Over Bluetooth
195 Exfiltration Over C2 Channel
196 Exfiltration Over Other Network Medium
197 Exfiltration Over Physical Medium
198 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
199 Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
200 Exfiltration Over Web Service
201 Exfiltration over USB
202 Exfiltration to Cloud Storage
203 Exfiltration to Code Repository
433 Scheduled Transfer
514 Traffic Duplication
516 Transfer Data to Cloud Account