This will be updated in time but for now I will list out the different phases that attackers will typically follow during their attack lifecycle. Be aware that this isn't always a step through list when
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact