You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
16 lines
2.1 KiB
16 lines
2.1 KiB
id,name,shortname,external_id,description
|
|
x-mitre-tactic--2558fd61-8c75-4730-94c4-11926db2a263,Credential Access,credential_access,TA0006,The adversary is trying to steal account names and passwords.
|
|
x-mitre-tactic--4ca45d45-df4d-4613-8980-bac22d278fa5,Execution,execution,TA0002,The adversary is trying to run malicious code.
|
|
x-mitre-tactic--5569339b-94c2-49ee-afb3-2222936582c8,Impact,impact,TA0040,"The adversary is trying to manipulate, interrupt, or destroy your systems and data."
|
|
x-mitre-tactic--5bc1d813-693e-4823-9961-abf9af4b0e92,Persistence,persistence,TA0003,The adversary is trying to maintain their foothold.
|
|
x-mitre-tactic--5e29b093-294e-49e9-a803-dab3d73b77dd,Privilege Escalation,privilege_escalation,TA0004,The adversary is trying to gain higher-level permissions.
|
|
x-mitre-tactic--7141578b-e50b-4dcc-bfa4-08a8dd689e9e,Lateral Movement,lateral_movement,TA0008,The adversary is trying to move through your environment.
|
|
x-mitre-tactic--78b23412-0651-46d7-a540-170a1ce8bd5a,Defense Evasion,defense_evasion,TA0005,The adversary is trying to avoid being detected.
|
|
x-mitre-tactic--9a4e74ab-5008-408c-84bf-a10dfbc53462,Exfiltration,exfiltration,TA0010,The adversary is trying to steal data.
|
|
x-mitre-tactic--c17c5845-175e-4421-9713-829d0573dbc9,Discovery,discovery,TA0007,The adversary is trying to figure out your environment.
|
|
x-mitre-tactic--d108ce10-2419-4cf9-a774-46161d6c6cfe,Collection,collection,TA0009,The adversary is trying to gather data of interest to their goal.
|
|
x-mitre-tactic--d679bca2-e57d-4935-8650-8031c87a4400,Resource Development,resource_development,TA0042,The adversary is trying to establish resources they can use to support operations.
|
|
x-mitre-tactic--daa4cbb1-b4f4-4723-a824-7f1efd6e0592,Reconnaissance,reconnaissance,TA0043,The adversary is trying to gather information they can use to plan future operations.
|
|
x-mitre-tactic--f72804c5-f15a-449e-a5da-2eecd181f813,Command and Control,command_and_control,TA0011,The adversary is trying to communicate with compromised systems to control them.
|
|
x-mitre-tactic--ffd5bcee-6e16-4dd2-8eca-7b3beedf33ca,Initial Access,initial_access,TA0001,The adversary is trying to get into your network.
|