TA0010 Exfiltration Mappings

The adversary is trying to steal data. Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1030 Data Transfer Size Limits 7 0
T1048 Exfiltration Over Alternative Protocol 23 3
T1041 Exfiltration Over C2 Channel 18 0
T1011 Exfiltration Over Other Network Medium 4 1
T1052 Exfiltration Over Physical Medium 19 1
T1567 Exfiltration Over Web Service 17 2
T1029 Scheduled Transfer 7 0
T1537 Transfer Data to Cloud Account 20 0