{ "type": "bundle", "id": "bundle--81031e9d-fff8-4a4d-8910-f277a9bc8ff0", "spec_version": "2.0", "objects": [ { "modified": "2022-11-07T21:01:17.781Z", "name": "Network Effects", "description": "The adversary is trying to intercept or manipulate network traffic to or from a device.\n\nThis category refers to network-based techniques that an adversary may be able to use to fulfill his or her objectives without access to the mobile device itself. These include techniques to intercept or manipulate network traffic to and from the mobile device.", "x_mitre_deprecated": true, "x_mitre_domains": [ "mobile-attack" ], "x_mitre_version": "1.0", "x_mitre_shortname": "network-effects", "type": "x-mitre-tactic", "id": "x-mitre-tactic--9eb4c21e-4fa8-44c9-b167-dbfc455f9210", "created": "2018-10-17T00:14:20.652Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "revoked": false, "external_references": [ { "source_name": "mitre-attack", "url": "https://attack.mitre.org/tactics/TA0038", "external_id": "TA0038" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "x_mitre_attack_spec_version": "3.0.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }