defense-evasion
command-and-control
impact
privilege-escalation
lateral-movement
execution
collection
credential-access
resource-development
discovery
exfiltration
initial-access
persistence
reconnaissance
