We're updating the issue view to help you get more done. 

Data Transfer Size Limits

Description

An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used to avoid triggering network data transfer threshold alerts.

id

T1030

tactic

exfiltration

datasources

Process monitoring
Netflow/Enclave netflow
Process use of network
Packet capture

maturity

Not Tracked

Assignee

Unassigned
Configure