You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Splunk_Deploiement/apps/sandfly_security/lookups/mitre_tactics.csv

2.1 KiB

1idnameshortnameexternal_iddescription
2x-mitre-tactic--2558fd61-8c75-4730-94c4-11926db2a263Credential Accesscredential_accessTA0006The adversary is trying to steal account names and passwords.
3x-mitre-tactic--4ca45d45-df4d-4613-8980-bac22d278fa5ExecutionexecutionTA0002The adversary is trying to run malicious code.
4x-mitre-tactic--5569339b-94c2-49ee-afb3-2222936582c8ImpactimpactTA0040The adversary is trying to manipulate, interrupt, or destroy your systems and data.
5x-mitre-tactic--5bc1d813-693e-4823-9961-abf9af4b0e92PersistencepersistenceTA0003The adversary is trying to maintain their foothold.
6x-mitre-tactic--5e29b093-294e-49e9-a803-dab3d73b77ddPrivilege Escalationprivilege_escalationTA0004The adversary is trying to gain higher-level permissions.
7x-mitre-tactic--7141578b-e50b-4dcc-bfa4-08a8dd689e9eLateral Movementlateral_movementTA0008The adversary is trying to move through your environment.
8x-mitre-tactic--78b23412-0651-46d7-a540-170a1ce8bd5aDefense Evasiondefense_evasionTA0005The adversary is trying to avoid being detected.
9x-mitre-tactic--9a4e74ab-5008-408c-84bf-a10dfbc53462ExfiltrationexfiltrationTA0010The adversary is trying to steal data.
10x-mitre-tactic--c17c5845-175e-4421-9713-829d0573dbc9DiscoverydiscoveryTA0007The adversary is trying to figure out your environment.
11x-mitre-tactic--d108ce10-2419-4cf9-a774-46161d6c6cfeCollectioncollectionTA0009The adversary is trying to gather data of interest to their goal.
12x-mitre-tactic--d679bca2-e57d-4935-8650-8031c87a4400Resource Developmentresource_developmentTA0042The adversary is trying to establish resources they can use to support operations.
13x-mitre-tactic--daa4cbb1-b4f4-4723-a824-7f1efd6e0592ReconnaissancereconnaissanceTA0043The adversary is trying to gather information they can use to plan future operations.
14x-mitre-tactic--f72804c5-f15a-449e-a5da-2eecd181f813Command and Controlcommand_and_controlTA0011The adversary is trying to communicate with compromised systems to control them.
15x-mitre-tactic--ffd5bcee-6e16-4dd2-8eca-7b3beedf33caInitial Accessinitial_accessTA0001The adversary is trying to get into your network.