You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

22 KiB

1Phase numberPhasePathway startPathway endCritical ControlTechnique (CERT NZ)Software (CERT NZ)Technique
21Initial accessPhishingValid credentialsPassword managerT1078 Valid AccountsS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1566 Phishing,T1566.001 Spearphishing Attachment,T1566.002 Spearphishing Link,T1566.003 Spearphishing via Service,T1598 Phishing for Information,T1598.001 Spearphishing Service,T1598.002 Spearphishing Attachment,T1598.003 Spearphishing Link
31Initial accessPassword guessingValid credentialsT1110 Brute ForceS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1110.001 Password Guessing
41Initial accessExploit vulnerabilityInternet-exposed servicePatching, Internet-exposed services, Logging and alertingT1133 External Remote ServicesS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1190 Exploit Public-Facing Application
51Initial accessEmailMalicious documentS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1087.003 Email Account,T1098.002 Exchange Email Delegate Permissions,T1114 Email Collection,T1114.001 Local Email Collection,T1114.002 Remote Email Collection,T1114.003 Email Forwarding Rule,T1564.008 Email Hiding Rules,T1585.002 Email Accounts,T1586.002 Email Accounts,T1589.002 Email Addresses
61Initial accessValid credentialsInternet-exposed serviceInternet-exposed services, MFA, Logging and alertingT1078 Valid Accounts,T1133 External Remote ServicesS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1078 Valid Accounts,T1078.001 Default Accounts,T1078.002 Domain Accounts,T1078.003 Local Accounts,T1078.004 Cloud Accounts
71Initial accessMalicious documentMalwareLogging and alerting, Application allowlisting, Disable macrosS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1204 User Execution,T1204.001 Malicious Link,T1204.002 Malicious File,T1204.003 Malicious Image
81Initial accessInternet-exposed serviceCommand and controlLogging and alerting, Application allowlistingS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1133 External Remote Services
91Initial accessMalwareCommand and controlLogging and alerting, Application allowlistingS0266 Trickbot,Qakbot,S0483 IcedID,S0534 BazarT1587.001 Malware,T1588.001 Malware,T1608.001 Upload Malware
102Consolidation and preparationCommand and controlLateral movementPatching, Network segmentation, Principle of least privilege, Logging and alerting, MFAT1573 Encrypted ChannelS0154 Cobalt StrikeT1001 Data Obfuscation,T1001.001 Junk Data,T1001.002 Steganography,T1001.003 Protocol Impersonation,T1008 Fallback Channels,T1071 Application Layer Protocol,T1071.001 Web Protocols,T1071.002 File Transfer Protocols,T1071.003 Mail Protocols,T1071.004 DNS,T1090 Proxy,T1090.001 Internal Proxy,T1090.002 External Proxy,T1090.003 Multi-hop Proxy,T1090.004 Domain Fronting,T1092 Communication Through Removable Media,T1095 Non-Application Layer Protocol,T1102 Web Service,T1102.001 Dead Drop Resolver,T1102.002 Bidirectional Communication,T1102.003 One-Way Communication,T1104 Multi-Stage Channels,T1105 Ingress Tool Transfer,T1132 Data Encoding,T1132.001 Standard Encoding,T1132.002 Non-Standard Encoding,T1205 Traffic Signaling,T1205.001 Port Knocking,T1219 Remote Access Software,T1568 Dynamic Resolution,T1568.001 Fast Flux DNS,T1568.002 Domain Generation Algorithms,T1568.003 DNS Calculation,T1571 Non-Standard Port,T1572 Protocol Tunneling,T1573 Encrypted Channel,T1573.001 Symmetric Cryptography,T1573.002 Asymmetric Cryptography
112Consolidation and preparationCommand and controlPrivilege escalationPatching, Network segmentation, Principle of least privilege, Logging and alerting, MFAT1573 Encrypted ChannelS0154 Cobalt StrikeT1001 Data Obfuscation,T1001.001 Junk Data,T1001.002 Steganography,T1001.003 Protocol Impersonation,T1008 Fallback Channels,T1071 Application Layer Protocol,T1071.001 Web Protocols,T1071.002 File Transfer Protocols,T1071.003 Mail Protocols,T1071.004 DNS,T1090 Proxy,T1090.001 Internal Proxy,T1090.002 External Proxy,T1090.003 Multi-hop Proxy,T1090.004 Domain Fronting,T1092 Communication Through Removable Media,T1095 Non-Application Layer Protocol,T1102 Web Service,T1102.001 Dead Drop Resolver,T1102.002 Bidirectional Communication,T1102.003 One-Way Communication,T1104 Multi-Stage Channels,T1105 Ingress Tool Transfer,T1132 Data Encoding,T1132.001 Standard Encoding,T1132.002 Non-Standard Encoding,T1205 Traffic Signaling,T1205.001 Port Knocking,T1219 Remote Access Software,T1568 Dynamic Resolution,T1568.001 Fast Flux DNS,T1568.002 Domain Generation Algorithms,T1568.003 DNS Calculation,T1571 Non-Standard Port,T1572 Protocol Tunneling,T1573 Encrypted Channel,T1573.001 Symmetric Cryptography,T1573.002 Asymmetric Cryptography
122Consolidation and preparationLateral movementPrivilege escalationT1078 Account Discovery, T1018 Remote System Discovery, T1046 Network Service ScanningS0154 Cobalt StrikeT1021 Remote Services,T1021.001 Remote Desktop Protocol,T1021.002 SMB/Windows Admin Shares,T1021.003 Distributed Component Object Model,T1021.004 SSH,T1021.005 VNC,T1021.006 Windows Remote Management,T1072 Software Deployment Tools,T1080 Taint Shared Content,T1091 Replication Through Removable Media,T1210 Exploitation of Remote Services,T1534 Internal Spearphishing,T1550 Use Alternate Authentication Material,T1550.001 Application Access Token,T1550.002 Pass the Hash,T1550.003 Pass the Ticket,T1550.004 Web Session Cookie,T1563 Remote Service Session Hijacking,T1563.001 SSH Hijacking,T1563.002 RDP Hijacking,T1570 Lateral Tool Transfer
132Consolidation and preparationPrivilege escalationLateral movementS0154 Cobalt StrikeT1037 Boot or Logon Initialization Scripts,T1037.001 Logon Script (Windows),T1037.002 Logon Script (Mac),T1037.003 Network Logon Script,T1037.004 RC Scripts,T1037.005 Startup Items,T1053 Scheduled Task/Job,T1053.001 At (Linux),T1053.002 At (Windows),T1053.003 Cron,T1053.004 Launchd,T1053.005 Scheduled Task,T1053.006 Systemd Timers,T1053.007 Container Orchestration Job,T1055 Process Injection,T1055.001 Dynamic-link Library Injection,T1055.002 Portable Executable Injection,T1055.003 Thread Execution Hijacking,T1055.004 Asynchronous Procedure Call,T1055.005 Thread Local Storage,T1055.008 Ptrace System Calls,T1055.009 Proc Memory,T1055.011 Extra Window Memory Injection,T1055.012 Process Hollowing,T1055.013 Process Doppelganging,T1055.014 VDSO Hijacking,T1068 Exploitation for Privilege Escalation,T1078 Valid Accounts,T1078.001 Default Accounts,T1078.002 Domain Accounts,T1078.003 Local Accounts,T1078.004 Cloud Accounts,T1134 Access Token Manipulation,T1134.001 Token Impersonation/Theft,T1134.002 Create Process with Token,T1134.003 Make and Impersonate Token,T1134.004 Parent PID Spoofing,T1134.005 SID-History Injection,T1484 Domain Policy Modification,T1484.001 Group Policy Modification,T1484.002 Domain Trust Modification,T1543 Create or Modify System Process,T1543.001 Launch Agent,T1543.002 Systemd Service,T1543.003 Windows Service,T1543.004 Launch Daemon,T1546 Event Triggered Execution,T1546.001 Change Default File Association,T1546.002 Screensaver,T1546.003 Windows Management Instrumentation Event Subscription,T1546.004 Unix Shell Configuration Modification,T1546.005 Trap,T1546.006 LC_LOAD_DYLIB Addition,T1546.007 Netsh Helper DLL,T1546.008 Accessibility Features,T1546.009 AppCert DLLs,T1546.010 AppInit DLLs,T1546.011 Application Shimming,T1546.012 Image File Execution Options Injection,T1546.013 PowerShell Profile,T1546.014 Emond,T1546.015 Component Object Model Hijacking,T1547 Boot or Logon Autostart Execution,T1547.001 Registry Run Keys / Startup Folder,T1547.002 Authentication Package,T1547.003 Time Providers,T1547.004 Winlogon Helper DLL,T1547.005 Security Support Provider,T1547.006 Kernel Modules and Extensions,T1547.007 Re-opened Applications,T1547.008 LSASS Driver,T1547.009 Shortcut Modification,T1547.010 Port Monitors,T1547.011 Plist Modification,T1547.012 Print Processors,T1547.013 XDG Autostart Entries,T1547.014 Active Setup,T1547.015 Login Items,T1548 Abuse Elevation Control Mechanism,T1548.001 Setuid and Setgid,T1548.002 Bypass User Account Control,T1548.003 Sudo and Sudo Caching,T1548.004 Elevated Execution with Prompt,T1574 Hijack Execution Flow,T1574.001 DLL Search Order Hijacking,T1574.002 DLL Side-Loading,T1574.004 Dylib Hijacking,T1574.005 Executable Installer File Permissions Weakness,T1574.006 Dynamic Linker Hijacking,T1574.007 Path Interception by PATH Environment Variable,T1574.008 Path Interception by Search Order Hijacking,T1574.009 Path Interception by Unquoted Path,T1574.010 Services File Permissions Weakness,T1574.011 Services Registry Permissions Weakness,T1574.012 COR_PROFILER,T1611 Escape to Host
142Consolidation and preparationLateral movementData exfiltrationLogging and alertingT1078 Account Discovery, T1018 Remote System Discovery, T1046 Network Service ScanningS0154 Cobalt StrikeT1021 Remote Services,T1021.001 Remote Desktop Protocol,T1021.002 SMB/Windows Admin Shares,T1021.003 Distributed Component Object Model,T1021.004 SSH,T1021.005 VNC,T1021.006 Windows Remote Management,T1072 Software Deployment Tools,T1080 Taint Shared Content,T1091 Replication Through Removable Media,T1210 Exploitation of Remote Services,T1534 Internal Spearphishing,T1550 Use Alternate Authentication Material,T1550.001 Application Access Token,T1550.002 Pass the Hash,T1550.003 Pass the Ticket,T1550.004 Web Session Cookie,T1563 Remote Service Session Hijacking,T1563.001 SSH Hijacking,T1563.002 RDP Hijacking,T1570 Lateral Tool Transfer
152Consolidation and preparationPrivilege escalationData exfiltrationLogging and alertingS0154 Cobalt StrikeT1037 Boot or Logon Initialization Scripts,T1037.001 Logon Script (Windows),T1037.002 Logon Script (Mac),T1037.003 Network Logon Script,T1037.004 RC Scripts,T1037.005 Startup Items,T1053 Scheduled Task/Job,T1053.001 At (Linux),T1053.002 At (Windows),T1053.003 Cron,T1053.004 Launchd,T1053.005 Scheduled Task,T1053.006 Systemd Timers,T1053.007 Container Orchestration Job,T1055 Process Injection,T1055.001 Dynamic-link Library Injection,T1055.002 Portable Executable Injection,T1055.003 Thread Execution Hijacking,T1055.004 Asynchronous Procedure Call,T1055.005 Thread Local Storage,T1055.008 Ptrace System Calls,T1055.009 Proc Memory,T1055.011 Extra Window Memory Injection,T1055.012 Process Hollowing,T1055.013 Process Doppelganging,T1055.014 VDSO Hijacking,T1068 Exploitation for Privilege Escalation,T1078 Valid Accounts,T1078.001 Default Accounts,T1078.002 Domain Accounts,T1078.003 Local Accounts,T1078.004 Cloud Accounts,T1134 Access Token Manipulation,T1134.001 Token Impersonation/Theft,T1134.002 Create Process with Token,T1134.003 Make and Impersonate Token,T1134.004 Parent PID Spoofing,T1134.005 SID-History Injection,T1484 Domain Policy Modification,T1484.001 Group Policy Modification,T1484.002 Domain Trust Modification,T1543 Create or Modify System Process,T1543.001 Launch Agent,T1543.002 Systemd Service,T1543.003 Windows Service,T1543.004 Launch Daemon,T1546 Event Triggered Execution,T1546.001 Change Default File Association,T1546.002 Screensaver,T1546.003 Windows Management Instrumentation Event Subscription,T1546.004 Unix Shell Configuration Modification,T1546.005 Trap,T1546.006 LC_LOAD_DYLIB Addition,T1546.007 Netsh Helper DLL,T1546.008 Accessibility Features,T1546.009 AppCert DLLs,T1546.010 AppInit DLLs,T1546.011 Application Shimming,T1546.012 Image File Execution Options Injection,T1546.013 PowerShell Profile,T1546.014 Emond,T1546.015 Component Object Model Hijacking,T1547 Boot or Logon Autostart Execution,T1547.001 Registry Run Keys / Startup Folder,T1547.002 Authentication Package,T1547.003 Time Providers,T1547.004 Winlogon Helper DLL,T1547.005 Security Support Provider,T1547.006 Kernel Modules and Extensions,T1547.007 Re-opened Applications,T1547.008 LSASS Driver,T1547.009 Shortcut Modification,T1547.010 Port Monitors,T1547.011 Plist Modification,T1547.012 Print Processors,T1547.013 XDG Autostart Entries,T1547.014 Active Setup,T1547.015 Login Items,T1548 Abuse Elevation Control Mechanism,T1548.001 Setuid and Setgid,T1548.002 Bypass User Account Control,T1548.003 Sudo and Sudo Caching,T1548.004 Elevated Execution with Prompt,T1574 Hijack Execution Flow,T1574.001 DLL Search Order Hijacking,T1574.002 DLL Side-Loading,T1574.004 Dylib Hijacking,T1574.005 Executable Installer File Permissions Weakness,T1574.006 Dynamic Linker Hijacking,T1574.007 Path Interception by PATH Environment Variable,T1574.008 Path Interception by Search Order Hijacking,T1574.009 Path Interception by Unquoted Path,T1574.010 Services File Permissions Weakness,T1574.011 Services Registry Permissions Weakness,T1574.012 COR_PROFILER,T1611 Escape to Host
162Consolidation and preparationLateral movementDestroy backupsBackupsT1078 Account Discovery, T1018 Remote System Discovery, T1046 Network Service ScanningS0154 Cobalt StrikeT1021 Remote Services,T1021.001 Remote Desktop Protocol,T1021.002 SMB/Windows Admin Shares,T1021.003 Distributed Component Object Model,T1021.004 SSH,T1021.005 VNC,T1021.006 Windows Remote Management,T1072 Software Deployment Tools,T1080 Taint Shared Content,T1091 Replication Through Removable Media,T1210 Exploitation of Remote Services,T1534 Internal Spearphishing,T1550 Use Alternate Authentication Material,T1550.001 Application Access Token,T1550.002 Pass the Hash,T1550.003 Pass the Ticket,T1550.004 Web Session Cookie,T1563 Remote Service Session Hijacking,T1563.001 SSH Hijacking,T1563.002 RDP Hijacking,T1570 Lateral Tool Transfer
172Consolidation and preparationPrivilege escalationDestroy backupsBackupsS0154 Cobalt StrikeT1037 Boot or Logon Initialization Scripts,T1037.001 Logon Script (Windows),T1037.002 Logon Script (Mac),T1037.003 Network Logon Script,T1037.004 RC Scripts,T1037.005 Startup Items,T1053 Scheduled Task/Job,T1053.001 At (Linux),T1053.002 At (Windows),T1053.003 Cron,T1053.004 Launchd,T1053.005 Scheduled Task,T1053.006 Systemd Timers,T1053.007 Container Orchestration Job,T1055 Process Injection,T1055.001 Dynamic-link Library Injection,T1055.002 Portable Executable Injection,T1055.003 Thread Execution Hijacking,T1055.004 Asynchronous Procedure Call,T1055.005 Thread Local Storage,T1055.008 Ptrace System Calls,T1055.009 Proc Memory,T1055.011 Extra Window Memory Injection,T1055.012 Process Hollowing,T1055.013 Process Doppelganging,T1055.014 VDSO Hijacking,T1068 Exploitation for Privilege Escalation,T1078 Valid Accounts,T1078.001 Default Accounts,T1078.002 Domain Accounts,T1078.003 Local Accounts,T1078.004 Cloud Accounts,T1134 Access Token Manipulation,T1134.001 Token Impersonation/Theft,T1134.002 Create Process with Token,T1134.003 Make and Impersonate Token,T1134.004 Parent PID Spoofing,T1134.005 SID-History Injection,T1484 Domain Policy Modification,T1484.001 Group Policy Modification,T1484.002 Domain Trust Modification,T1543 Create or Modify System Process,T1543.001 Launch Agent,T1543.002 Systemd Service,T1543.003 Windows Service,T1543.004 Launch Daemon,T1546 Event Triggered Execution,T1546.001 Change Default File Association,T1546.002 Screensaver,T1546.003 Windows Management Instrumentation Event Subscription,T1546.004 Unix Shell Configuration Modification,T1546.005 Trap,T1546.006 LC_LOAD_DYLIB Addition,T1546.007 Netsh Helper DLL,T1546.008 Accessibility Features,T1546.009 AppCert DLLs,T1546.010 AppInit DLLs,T1546.011 Application Shimming,T1546.012 Image File Execution Options Injection,T1546.013 PowerShell Profile,T1546.014 Emond,T1546.015 Component Object Model Hijacking,T1547 Boot or Logon Autostart Execution,T1547.001 Registry Run Keys / Startup Folder,T1547.002 Authentication Package,T1547.003 Time Providers,T1547.004 Winlogon Helper DLL,T1547.005 Security Support Provider,T1547.006 Kernel Modules and Extensions,T1547.007 Re-opened Applications,T1547.008 LSASS Driver,T1547.009 Shortcut Modification,T1547.010 Port Monitors,T1547.011 Plist Modification,T1547.012 Print Processors,T1547.013 XDG Autostart Entries,T1547.014 Active Setup,T1547.015 Login Items,T1548 Abuse Elevation Control Mechanism,T1548.001 Setuid and Setgid,T1548.002 Bypass User Account Control,T1548.003 Sudo and Sudo Caching,T1548.004 Elevated Execution with Prompt,T1574 Hijack Execution Flow,T1574.001 DLL Search Order Hijacking,T1574.002 DLL Side-Loading,T1574.004 Dylib Hijacking,T1574.005 Executable Installer File Permissions Weakness,T1574.006 Dynamic Linker Hijacking,T1574.007 Path Interception by PATH Environment Variable,T1574.008 Path Interception by Search Order Hijacking,T1574.009 Path Interception by Unquoted Path,T1574.010 Services File Permissions Weakness,T1574.011 Services Registry Permissions Weakness,T1574.012 COR_PROFILER,T1611 Escape to Host
182Consolidation and preparationLateral movementEncrypt dataApplication allowlisting, Logging and alertingT1078 Account Discovery, T1018 Remote System Discovery, T1046 Network Service ScanningS0154 Cobalt StrikeT1021 Remote Services,T1021.001 Remote Desktop Protocol,T1021.002 SMB/Windows Admin Shares,T1021.003 Distributed Component Object Model,T1021.004 SSH,T1021.005 VNC,T1021.006 Windows Remote Management,T1072 Software Deployment Tools,T1080 Taint Shared Content,T1091 Replication Through Removable Media,T1210 Exploitation of Remote Services,T1534 Internal Spearphishing,T1550 Use Alternate Authentication Material,T1550.001 Application Access Token,T1550.002 Pass the Hash,T1550.003 Pass the Ticket,T1550.004 Web Session Cookie,T1563 Remote Service Session Hijacking,T1563.001 SSH Hijacking,T1563.002 RDP Hijacking,T1570 Lateral Tool Transfer
192Consolidation and preparationPrivilege escalationEncrypt dataApplication allowlisting, Logging and alertingS0154 Cobalt StrikeT1037 Boot or Logon Initialization Scripts,T1037.001 Logon Script (Windows),T1037.002 Logon Script (Mac),T1037.003 Network Logon Script,T1037.004 RC Scripts,T1037.005 Startup Items,T1053 Scheduled Task/Job,T1053.001 At (Linux),T1053.002 At (Windows),T1053.003 Cron,T1053.004 Launchd,T1053.005 Scheduled Task,T1053.006 Systemd Timers,T1053.007 Container Orchestration Job,T1055 Process Injection,T1055.001 Dynamic-link Library Injection,T1055.002 Portable Executable Injection,T1055.003 Thread Execution Hijacking,T1055.004 Asynchronous Procedure Call,T1055.005 Thread Local Storage,T1055.008 Ptrace System Calls,T1055.009 Proc Memory,T1055.011 Extra Window Memory Injection,T1055.012 Process Hollowing,T1055.013 Process Doppelganging,T1055.014 VDSO Hijacking,T1068 Exploitation for Privilege Escalation,T1078 Valid Accounts,T1078.001 Default Accounts,T1078.002 Domain Accounts,T1078.003 Local Accounts,T1078.004 Cloud Accounts,T1134 Access Token Manipulation,T1134.001 Token Impersonation/Theft,T1134.002 Create Process with Token,T1134.003 Make and Impersonate Token,T1134.004 Parent PID Spoofing,T1134.005 SID-History Injection,T1484 Domain Policy Modification,T1484.001 Group Policy Modification,T1484.002 Domain Trust Modification,T1543 Create or Modify System Process,T1543.001 Launch Agent,T1543.002 Systemd Service,T1543.003 Windows Service,T1543.004 Launch Daemon,T1546 Event Triggered Execution,T1546.001 Change Default File Association,T1546.002 Screensaver,T1546.003 Windows Management Instrumentation Event Subscription,T1546.004 Unix Shell Configuration Modification,T1546.005 Trap,T1546.006 LC_LOAD_DYLIB Addition,T1546.007 Netsh Helper DLL,T1546.008 Accessibility Features,T1546.009 AppCert DLLs,T1546.010 AppInit DLLs,T1546.011 Application Shimming,T1546.012 Image File Execution Options Injection,T1546.013 PowerShell Profile,T1546.014 Emond,T1546.015 Component Object Model Hijacking,T1547 Boot or Logon Autostart Execution,T1547.001 Registry Run Keys / Startup Folder,T1547.002 Authentication Package,T1547.003 Time Providers,T1547.004 Winlogon Helper DLL,T1547.005 Security Support Provider,T1547.006 Kernel Modules and Extensions,T1547.007 Re-opened Applications,T1547.008 LSASS Driver,T1547.009 Shortcut Modification,T1547.010 Port Monitors,T1547.011 Plist Modification,T1547.012 Print Processors,T1547.013 XDG Autostart Entries,T1547.014 Active Setup,T1547.015 Login Items,T1548 Abuse Elevation Control Mechanism,T1548.001 Setuid and Setgid,T1548.002 Bypass User Account Control,T1548.003 Sudo and Sudo Caching,T1548.004 Elevated Execution with Prompt,T1574 Hijack Execution Flow,T1574.001 DLL Search Order Hijacking,T1574.002 DLL Side-Loading,T1574.004 Dylib Hijacking,T1574.005 Executable Installer File Permissions Weakness,T1574.006 Dynamic Linker Hijacking,T1574.007 Path Interception by PATH Environment Variable,T1574.008 Path Interception by Search Order Hijacking,T1574.009 Path Interception by Unquoted Path,T1574.010 Services File Permissions Weakness,T1574.011 Services Registry Permissions Weakness,T1574.012 COR_PROFILER,T1611 Escape to Host
203Impact on targetData exfiltrationT1005 Data from Local System, T1039 Data from Network Shared Drive, T1560 Archive Collected Data, T1567 Exfiltration over Web ServiceT1011 Exfiltration Over Other Network Medium,T1011.001 Exfiltration Over Bluetooth,T1020 Automated Exfiltration,T1020.001 Traffic Duplication,T1029 Scheduled Transfer,T1030 Data Transfer Size Limits,T1041 Exfiltration Over C2 Channel,T1048 Exfiltration Over Alternative Protocol,T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol,T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,T1048.003 Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol,T1052 Exfiltration Over Physical Medium,T1052.001 Exfiltration over USB,T1537 Transfer Data to Cloud Account,T1567 Exfiltration Over Web Service,T1567.001 Exfiltration to Code Repository,T1567.002 Exfiltration to Cloud Storage
213Impact on targetDestroy backupsT1490 Inhibit System Recovery, T1486 Encrypt Data for ImpactT1485 Data Destruction,T1561 Disk Wipe,T1561.001 Disk Content Wipe,T1561.002 Disk Structure Wipe
223Impact on targetEncrypt dataT1490 Inhibit System Recovery, T1486 Encrypt Data for ImpactT1486 Data Encrypted for Impact