The step-by-step plan for how an attacker would proceed through a threat scenario. E.g: Reconnaissance Delivery Exploitation Peristence Action on objectives