DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e74d51d4-1408-4bb6-a6dc-1ff8aaa17e2d.json

40 lines
1.6 KiB
JSON
Raw Normal View History

2024-11-22 13:37:54 -05:00
{
"type": "bundle",
"id": "bundle--484301bd-55df-41eb-b9a2-4285494227dc",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--e74d51d4-1408-4bb6-a6dc-1ff8aaa17e2d",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2024-11-22T16:43:58.219182Z",
"modified": "2024-11-22T16:43:58.219182Z",
"name": "Intimidate",
"description": "Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "plan-objectives"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0140.002.md",
"external_id": "T0140.002"
}
],
"object_marking_refs": [
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
],
"x_mitre_is_subtechnique": true,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "2.1"
}
]
}