We're updating the issue view to help you get more done. 

Scheduled Transfer

Description

Data exfiltration may be performed only at certain times of day or at certain intervals. This could be done to blend traffic patterns with normal activity or availability.

When scheduled exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as Exfiltration Over Command and Control Channel and Exfiltration Over Alternative Protocol.

id

T1029

tactic

exfiltration

datasources

Process monitoring
Netflow/Enclave netflow
Process use of network

maturity

Not Tracked

Assignee

Unassigned
Configure