| Initial Access | Gain initial access to a system or network |
| Execution | Execute code on a victim system |
| Persistence | Establish persistence within a system to access later |
| Privilege Escalation | Attempt to obtain higher privileges on a system |
| Defense Evasion | Evade detection and deceive defenders |
| Credential Access | Gain access to credentials |
| Discovery | Gather information about the system or network to move laterally |
| Lateral Movement | Move laterally within a network to achieve their objectives |
| Collection | Collect data from compromised systems |
| Collection | Collect data from compromised systems |
| Command and Control (C2) | Maintain communication channels with compromised systems. |
| Exfiltration | Collect data from compromised systems |
| Impact | Take actions that affect the availability, integrity, or confidentiality of systems or data |