test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /x-mitre-tactic /x-mitre-tactic--d108ce10-2419-4cf9-a774-46161d6c6cfe.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.71 kB
{
"type": "bundle",
"id": "bundle--9bbfc092-ab08-43a8-a961-63fd204a3d3f",
"spec_version": "2.0",
"objects": [
{
"x_mitre_domains": [
"enterprise-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "x-mitre-tactic--d108ce10-2419-4cf9-a774-46161d6c6cfe",
"type": "x-mitre-tactic",
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"external_id": "TA0009",
"url": "https://attack.mitre.org/tactics/TA0009",
"source_name": "mitre-attack"
}
],
"modified": "2019-07-19T17:44:53.176Z",
"name": "Collection",
"description": "The adversary is trying to gather data of interest to their goal.\n\nCollection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to steal (exfiltrate) the data. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.",
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_shortname": "collection"
}
]
}