The step-by-step plan for how an attacker would proceed through a threat scenario. E.g:

  • Reconnaissance
  • Delivery
  • Exploitation
  • Peristence
  • Action on objectives