{ "type": "bundle", "id": "bundle--a6613e71-6917-4ebd-82a3-67089ca67edc", "spec_version": "2.0", "objects": [ { "x_mitre_domains": [ "mobile-attack" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "x-mitre-tactic--6fcb36b8-3776-483b-8699-42215714fb10", "type": "x-mitre-tactic", "created": "2018-10-17T00:14:20.652Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "external_id": "TA0031", "url": "https://attack.mitre.org/tactics/TA0031", "source_name": "mitre-attack" } ], "modified": "2020-01-27T14:05:02.718Z", "name": "Credential Access", "description": "The adversary is trying to steal account names, passwords, or other secrets that enable access to resources.\n\nCredential access represents techniques that can be used by adversaries to obtain access to or control over passwords, tokens, cryptographic keys, or other values that could be used by an adversary to gain unauthorized access to resources. Credential access allows the adversary to assume the identity of an account, with all of that account's permissions on the system and network, and makes it harder for defenders to detect the adversary. With sufficient access within a network, an adversary can create accounts for later use within the environment.", "x_mitre_version": "1.0", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "x_mitre_shortname": "credential-access" } ] }