T1020Exfiltration
Automated Exfiltration
Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.
Description
Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.
Quick Info
- Technique ID
- T1020
- Tactic
- Exfiltration
- Sub-Techniques
- 1
- Mitigations
- 0
