tactic-vocab
Access (1)
Insider uses an organizational account or access path to take an action related to the incident
Recruitment (2)
Insider recruits or is recruited by others
Financial Transaction (3)
Insider or colluding outsider makes a financial transaction related to the incident
Malware (4)
Malicious software is used
Malicous Action (5)
An intentionally malicious action not included in the other tactics
Concealment (6)
Insider or colluding outsider takes an action that conceals or attempts to conceal their activity
Data Exfiltration (7)
Data (or copies of data) is removed from the organization without permission or explicitly against permission to use in an unauthorized way
Data Impact (8)
Harmful action involving the organization’s data which compromises the organization in some way
Safety Impact (9)
Harmful action involving the organization’s personnel that compromises the safety of one or more individuals in the organization