Attack Tactics

Information about attack tactics

An attack tactic object represents a MITRE ATT&CK's adversary tactic.
The ID of these objects are equivalent to their corresponding ATT&CK Tactic's ID (e.g. TA0043)

Object attributes

An Attack Tactic object contains the following attributes:

  • creation_date: <integer> creation date of the tactic (UTC timestamp).
  • description: <string> tactic's description.
  • last_modification_date: <integer> date when the tactic was last updated (UTC timestamp).
  • link: <string>: URL of the tactic on MITRE's website.
  • name: <string>: Tactic's name.
  • stix_id: <string>: Tactic's STIX ID.
{
  "data": {
    "attributes": {
      "description": <string>,
      "creation_date": <int:timestamp>,
      "link": <string>,
      "stix_id": <string>,
      "last_modification_date": <int:timestamp>,
      "name": <string>
    },
    "type": "attack_tactic",
    "id": <string>,
    "links": {
      "self": "https://www.virustotal.com/api/v3/attack_tactics/{id}"
    }
  }
}
{
  "data": {
    "attributes": {
      "description": " The adversary is trying to gain higher-level permissions.\n\nPrivilege escalation includes techniques that allow an attacker to obtain a higher level of permissions on the mobile device. Attackers may enter the mobile device with very limited privileges and may be required to take advantage of a device weakness to obtain higher privileges necessary to successfully carry out their mission objectives.",
      "creation_date": 1539735260,
      "link": "https://attack.mitre.org/tactics/TA0029/",
      "stix_id": "x-mitre-tactic--3e962de5-3280-43b7-bc10-334fbc1d6fa8",
      "last_modification_date": 1580133829,
      "name": "Privilege Escalation"
    },
    "type": "attack_tactic",
    "id": "TA0029",
    "links": {
      "self": "https://www.virustotal.com/api/v3/attack_tactics/TA0029"
    }
  }
}

Relationships

In addition to the previously described attributes, attack tactic objects contain relationships with other objects in our dataset that can be retrieved as explained in the Relationships section.

The following table shows a summary of available relationships.

RelationshipsReturn object type
attack_techniquesList of Attack Techniques