test_scratch / cti-ATT-CK-v13.1 /mobile-attack /x-mitre-tactic /x-mitre-tactic--9eb4c21e-4fa8-44c9-b167-dbfc455f9210.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.63 kB
{
"type": "bundle",
"id": "bundle--81031e9d-fff8-4a4d-8910-f277a9bc8ff0",
"spec_version": "2.0",
"objects": [
{
"modified": "2022-11-07T21:01:17.781Z",
"name": "Network Effects",
"description": "The adversary is trying to intercept or manipulate network traffic to or from a device.\n\nThis category refers to network-based techniques that an adversary may be able to use to fulfill his or her objectives without access to the mobile device itself. These include techniques to intercept or manipulate network traffic to and from the mobile device.",
"x_mitre_deprecated": true,
"x_mitre_domains": [
"mobile-attack"
],
"x_mitre_version": "1.0",
"x_mitre_shortname": "network-effects",
"type": "x-mitre-tactic",
"id": "x-mitre-tactic--9eb4c21e-4fa8-44c9-b167-dbfc455f9210",
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/tactics/TA0038",
"external_id": "TA0038"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "3.0.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}