MoTIF Tactics

Browse all tactics in the Mobile Threat Intelligence Framework (MoTIF) for telecom security.

Reconnaissance
MOTA3001
The adversary is trying to gather information they can use to plan future operations
Phase: N/A
5 Techniques
View Details →
Resource Development
MOTA3002
The adversary is trying to establish resources they can use to support operations
Phase: N/A
3 Techniques
View Details →
Initial Access
MOTA3003
The adversary is trying to get into your network
Phase: N/A
6 Techniques
View Details →
Execution
MOTA3004
The adversary is trying to run malicious code
Phase: N/A
2 Techniques
View Details →
Persistence
MOTA3005
The adversary is trying to maintain their foothold
Phase: N/A
3 Techniques
View Details →
Privilege Escalation
MOTA3006
The adversary is trying to gain higher-level permissions
Phase: N/A
2 Techniques
View Details →
Defense Evasion
MOTA3007
The adversary is trying to avoid being detected
Phase: N/A
3 Techniques
View Details →
Credential Access
MOTA3008
The adversary is trying to steal account names and passwords
Phase: N/A
3 Techniques
View Details →
Discovery
MOTA3009
The adversary is trying to figure out your environment
Phase: N/A
4 Techniques
View Details →
Lateral Movement
MOTA3010
The adversary is trying to move through your environment
Phase: N/A
2 Techniques
View Details →
Collection
MOTA3011
The adversary is trying to gather data of interest
Phase: N/A
5 Techniques
View Details →
Command and Control
MOTA3012
The adversary is trying to communicate with compromised systems to control them
Phase: N/A
2 Techniques
View Details →
Exfiltration
MOTA3013
The adversary is trying to steal data
Phase: N/A
2 Techniques
View Details →
Impact
MOTA3014
The adversary is trying to manipulate, interrupt, or destroy your systems and data
Phase: N/A
3 Techniques
View Details →