Which attack methodology framework categorizes cyber intrusions into steps such as reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives?
Cyber kill chain
Open Source Security Testing Methodology Manual
MITRE ATT&CK
Diamond Model of Intrusion Analysis