0% found this document useful (0 votes)
150 views1 page

Enterprise Attack v16.1 Tactics

Uploaded by

Smart's Vids
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
150 views1 page

Enterprise Attack v16.1 Tactics

Uploaded by

Smart's Vids
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

ID STIX ID name description url createdlast modifieddomain version

TA0009 x-mitre-ta Collection Collection consists


https://attack.mitre.org/tactics/TA0009
of 17
techniques
October05 adversaries
Septementerprise-1.1
may use to gather information and the sources i
TA0011 x-mitre-ta Command Command
a https://attack.mitre.org/tactics/TA0011
and Control17consists
October19of techniques
July 20 enterprise-1.0
that adversaries may use to communicate with
TA0006 x-mitre-ta Credential Credential https://attack.mitre.org/tactics/TA0006
17 October19
Access consists July 20
of techniques forenterprise-1.0
stealing credentials like account names and passw
TA0005 x-mitre-ta Defense EvDefense Evasion
https://attack.mitre.org/tactics/TA0005
17 October19
consists July that
of techniques 20 enterprise-1.0
adversaries use to avoid detection throughout th
TA0007 x-mitre-ta Discovery Discovery consists
https://attack.mitre.org/tactics/TA0007
17 October19
of techniques anJuly 20 enterprise-1.0
adversary may use to gain knowledge about the system a
TA0002 x-mitre-ta Execution Execution consists
https://attack.mitre.org/tactics/TA0002
17 October19
of techniques July
that 20 enterprise-1.0
result in adversary-controlled code running on a local or
TA0010 x-mitre-ta ExfiltrationExfiltrationhttps://attack.mitre.org/tactics/TA0010
consists of17 October19that
techniques Julyadversaries
20 enterprise-1.0
may use to steal data from your network. O
TA0040 x-mitre-ta Impact https://attack.mitre.org/tactics/TA0040
Impact consists 14 Marchthat
of techniques 25adversaries
July 20 enterprise-1.0
use to disrupt availability or compromise integ
TA0001 x-mitre-ta Initial AcceInitial Access
https://attack.mitre.org/tactics/TA0001
consists 17 October19 July
of techniques that20useenterprise-1.0
various entry vectors to gain their initial foothold
TA0008 x-mitre-ta Lateral M Lateral Movement
https://attack.mitre.org/tactics/TA0008
17 October19
consists July 20that
of techniques enterprise-1.0
adversaries use to enter and control remote sy
TA0003 x-mitre-ta Persistenc Persistencehttps://attack.mitre.org/tactics/TA0003
consists of17techniques
October19thatJuly adversaries use to keep access to systems across resta
20 enterprise-1.0
TA0004 x-mitre-ta Privilege E These techniques often
17overlap withJanuaryenterprise-1.0
Persistence techniques, as OS features that let an advers
https://attack.mitre.org/tactics/TA0004
October06
TA0043 x-mitre-ta ReconnaissReconnaissance consists of techniques that involve adversaries actively or passively gathering
https://attack.mitre.org/tactics/TA0043
02 October18 Octoberenterprise-1.0
TA0042 x-mitre-ta Resource Resource Development 30consists of techniques
https://attack.mitre.org/tactics/TA0042
Septem30 that involve adversaries creating, purchasing, o
Septementerprise-1.0

You might also like