{ "type": "bundle", "id": "bundle--e9f56564-292a-4db4-9c7b-5ef26e84e012", "spec_version": "2.0", "objects": [ { "x_mitre_domains": [ "mobile-attack" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "x-mitre-tactic--6ebce653-294a-444a-bffb-14c04c8d137e", "type": "x-mitre-tactic", "created": "2018-10-17T00:14:20.652Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "external_id": "TA0034", "url": "https://attack.mitre.org/tactics/TA0034", "source_name": "mitre-attack" } ], "modified": "2020-01-27T16:09:15.308Z", "name": "Impact", "description": "The adversary is trying to manipulate, interrupt, or destroy your devices and data.\n\nThe impact tactic consists of techniques used by the adversary to execute his or her mission objectives but that do not cleanly fit into another category such as Collection. Mission objectives vary based on each adversary's goals, but examples include toll fraud, destruction of device data, or locking the user out of his or her device until a ransom is paid.", "x_mitre_version": "1.0", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "x_mitre_shortname": "impact" } ] }