Stored Application Data (T1409)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Stored Application Data

Associated Tactics

  • Collection

Collection (TA0035)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate.

View on ATT&CK

Procedure Examples

Description Source(s)
Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019. SWB Exodus March 2019
NIST Mobile Threat Catalogue