TA0027
|
Initial Access
|
The adversary is trying to get into your device.
|
TA0041
|
Execution
|
The adversary is trying to run malicious code.
|
TA0028
|
Persistence
|
The adversary is trying to maintain their foothold.
|
TA0029
|
Privilege Escalation
|
The adversary is trying to gain higher-level permissions.
|
TA0030
|
Defense Evasion
|
The adversary is trying to avoid being detected.
|
TA0031
|
Credential Access
|
The adversary is trying to steal account names, passwords, or other secrets that enable access to resources.
|
TA0032
|
Discovery
|
The adversary is trying to figure out your environment.
|
TA0033
|
Lateral Movement
|
The adversary is trying to move through your environment.
|
TA0035
|
Collection
|
The adversary is trying to gather data of interest to their goal.
|
TA0037
|
Command and Control
|
The adversary is trying to communicate with compromised devices to control them.
|
TA0036
|
Exfiltration
|
The adversary is trying to steal data.
|
TA0034
|
Impact
|
The adversary is trying to manipulate, interrupt, or destroy your devices and data.
|
TA0038
|
Network Effects
|
The adversary is trying to intercept or manipulate network traffic to or from a device.
|
TA0039
|
Remote Service Effects
|
The adversary is trying to control or monitor the device using remote services.
|