PERSISTENCE
23
Maintaining foothold across system reboots
PRIVILEGE ESCALATION
14
Gaining higher-level permissions
DEFENSE EVASION
47
Avoiding detection by security controls