test_scratch / cti-ATT-CK-v13.1 /mobile-attack /x-mitre-tactic /x-mitre-tactic--d418cdeb-1b9f-4a6b-a15d-2f89f549f8c1.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.75 kB
{
"type": "bundle",
"id": "bundle--40759d9d-4a98-4b9d-9e3b-65feb5311124",
"spec_version": "2.0",
"objects": [
{
"x_mitre_domains": [
"mobile-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "x-mitre-tactic--d418cdeb-1b9f-4a6b-a15d-2f89f549f8c1",
"type": "x-mitre-tactic",
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"external_id": "TA0032",
"url": "https://attack.mitre.org/tactics/TA0032",
"source_name": "mitre-attack"
}
],
"modified": "2020-01-27T16:09:00.466Z",
"name": "Discovery",
"description": "The adversary is trying to figure out your environment.\n\nDiscovery consists of techniques that allow the adversary to gain knowledge about the characteristics of the mobile device and potentially other networked systems. When adversaries gain access to a new system, they must orient themselves to what they now have control of and what benefits operating from that system give to their current objective or overall goals during the intrusion. The operating system may provide capabilities that aid in this post-compromise information-gathering phase.",
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_shortname": "discovery"
}
]
}