Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Impact

Id Name
7 Account Access Removal
20 Application Exhaustion Flood
24 Application or System Exploitation
117 Data Destruction
119 Data Encrypted for Impact
120 Data Manipulation
131 Defacement
141 Direct Network Flood
149 Disk Content Wipe
150 Disk Structure Wipe
151 Disk Wipe
184 Endpoint Denial of Service
212 External Defacement
223 Firmware Corruption
257 Inhibit System Recovery
263 Internal Defacement
324 Network Denial of Service
340 OS Exhaustion Flood
399 Reflection Amplification
412 Resource Hijacking
419 Runtime Data Manipulation
450 Service Exhaustion Flood
451 Service Stop
485 Stored Data Manipulation
499 System Shutdown/Reboot
517 Transmitted Data Manipulation