36
|
Automated Exfiltration
|
123
|
Data Transfer Size Limits
|
192
|
Exfiltration Over Alternative Protocol
|
193
|
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
|
194
|
Exfiltration Over Bluetooth
|
195
|
Exfiltration Over C2 Channel
|
196
|
Exfiltration Over Other Network Medium
|
197
|
Exfiltration Over Physical Medium
|
198
|
Exfiltration Over Symmetric Encrypted Non-C2 Protocol
|
199
|
Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
|
200
|
Exfiltration Over Web Service
|
201
|
Exfiltration over USB
|
202
|
Exfiltration to Cloud Storage
|
203
|
Exfiltration to Code Repository
|
433
|
Scheduled Transfer
|
514
|
Traffic Duplication
|
516
|
Transfer Data to Cloud Account
|