Is this reverse-engineering or "just" data exfiltration

Reverse engineering means understanding how a system works internally. So it is reverse engineering of a kind, just very different (and admittedly simpler) than e.g. decompiling execs