Enterprise Tactics

Enterprise Tactics: 14
ID Name Description
VTA0014 Reconnaissance The adversary is trying to gather information they can use to plan future operations.
VTA0013 Resource Development The adversary is trying to establish resources they can use to support operations.
VTA0001 Initial Access The adversary is trying to get into your network.
VTA0002 Execution The adversary is trying to run malicious code.
VTA0003 Persistence The adversary is trying to maintain their foothold.
VTA0004 Privilege Escalation The adversary is trying to gain higher-level permissions.
VTA0005 Defense Evasion The adversary is trying to avoid being detected.
VTA0006 Credential Access The adversary is trying to steal account names and passwords.
VTA0007 Discovery The adversary is trying to figure out your environment.
VTA0008 Lateral Movement The adversary is trying to move through your environment.
VTA0009 Collection The adversary is trying to gather data of interest to their goal.
VTA0011 Command and Control The adversary is trying to communicate with compromised systems to control them.
VTA0010 Exfiltration The adversary is trying to steal data.
VTA0012 Impact The adversary is trying to manipulate, interrupt, or destroy your systems and data.