Access Contact List - T1432 (4e6620ac-c30c-4f6d-918e-fa20cae7c1ce)
An adversary could call standard operating system APIs from a malicious application to gather contact list (i.e., address book) data, or with escalated privileges could directly access files containing contact list data.