ID STIX ID name description url createdlast modifieddomain version
TA0009 x-mitre-ta Collection Collection consists
https://attack.mitre.org/tactics/TA0009
of 17
techniques
October05 adversaries
Septementerprise-1.1
may use to gather information and the sources i
TA0011 x-mitre-ta Command Command
a https://attack.mitre.org/tactics/TA0011
and Control17consists
October19of techniques
July 20 enterprise-1.0
that adversaries may use to communicate with
TA0006 x-mitre-ta Credential Credential https://attack.mitre.org/tactics/TA0006
17 October19
Access consists July 20
of techniques forenterprise-1.0
stealing credentials like account names and passw
TA0005 x-mitre-ta Defense EvDefense Evasion
https://attack.mitre.org/tactics/TA0005
17 October19
consists July that
of techniques 20 enterprise-1.0
adversaries use to avoid detection throughout th
TA0007 x-mitre-ta Discovery Discovery consists
https://attack.mitre.org/tactics/TA0007
17 October19
of techniques anJuly 20 enterprise-1.0
adversary may use to gain knowledge about the system a
TA0002 x-mitre-ta Execution Execution consists
https://attack.mitre.org/tactics/TA0002
17 October19
of techniques July
that 20 enterprise-1.0
result in adversary-controlled code running on a local or
TA0010 x-mitre-ta ExfiltrationExfiltrationhttps://attack.mitre.org/tactics/TA0010
consists of17 October19that
techniques Julyadversaries
20 enterprise-1.0
may use to steal data from your network. O
TA0040 x-mitre-ta Impact https://attack.mitre.org/tactics/TA0040
Impact consists 14 Marchthat
of techniques 25adversaries
July 20 enterprise-1.0
use to disrupt availability or compromise integ
TA0001 x-mitre-ta Initial AcceInitial Access
https://attack.mitre.org/tactics/TA0001
consists 17 October19 July
of techniques that20useenterprise-1.0
various entry vectors to gain their initial foothold
TA0008 x-mitre-ta Lateral M Lateral Movement
https://attack.mitre.org/tactics/TA0008
17 October19
consists July 20that
of techniques enterprise-1.0
adversaries use to enter and control remote sy
TA0003 x-mitre-ta Persistenc Persistencehttps://attack.mitre.org/tactics/TA0003
consists of17techniques
October19thatJuly adversaries use to keep access to systems across resta
20 enterprise-1.0
TA0004 x-mitre-ta Privilege E These techniques often
17overlap withJanuaryenterprise-1.0
Persistence techniques, as OS features that let an advers
https://attack.mitre.org/tactics/TA0004
October06
TA0043 x-mitre-ta ReconnaissReconnaissance consists of techniques that involve adversaries actively or passively gathering
https://attack.mitre.org/tactics/TA0043
02 October18 Octoberenterprise-1.0
TA0042 x-mitre-ta Resource Resource Development 30consists of techniques
https://attack.mitre.org/tactics/TA0042
Septem30 that involve adversaries creating, purchasing, o
Septementerprise-1.0