test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /x-mitre-tactic /x-mitre-tactic--f72804c5-f15a-449e-a5da-2eecd181f813.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.69 kB
{
"type": "bundle",
"id": "bundle--3faf1d15-885f-428e-8b95-405a68aedfce",
"spec_version": "2.0",
"objects": [
{
"x_mitre_domains": [
"enterprise-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "x-mitre-tactic--f72804c5-f15a-449e-a5da-2eecd181f813",
"type": "x-mitre-tactic",
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"external_id": "TA0011",
"url": "https://attack.mitre.org/tactics/TA0011",
"source_name": "mitre-attack"
}
],
"modified": "2019-07-19T17:45:30.644Z",
"name": "Command and Control",
"description": "The adversary is trying to communicate with compromised systems to control them.\n\nCommand and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim\u2019s network structure and defenses.",
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_shortname": "command-and-control"
}
]
}