1. Collection
  2. Command And Control
  3. Credential Access
  4. Defense Evasion
  5. Discovery
  6. Execution
  7. Exfiltration
  8. Impact
  9. Initial Access
  10. Lateral Movement
  11. Persistence
  12. Privilege Escalation
  13. Reconnaissance
  14. Resource Development