Research Article

EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning

Table 3

The number of sentences regarding to different techniques in CTI reports.

TechniquesCTISentences

Initial access11166
Execution35737
Persistence38376
Privilege escalation17165
Defense evasion36780
Credential access16264
Discovery221048
Lateral movement14308
Collection13386
Command and control20654
Exfiltration658
Impact15194
Total2435136