DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a0ccaf21-5cb3-4c06-a158-6b9e21e2c56c.json

40 lines
1.6 KiB
JSON
Raw Normal View History

{
"type": "bundle",
"id": "bundle--3e9043e5-5231-4484-81aa-afca2befb603",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--a0ccaf21-5cb3-4c06-a158-6b9e21e2c56c",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2023-09-25T14:19:03.557856Z",
"modified": "2023-09-25T14:19:03.557856Z",
"name": "Subvert",
"description": "Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of \u201cactive measures\u201d involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "plan-objectives"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0135.003.md",
"external_id": "T0135.003"
}
],
"object_marking_refs": [
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
],
"x_mitre_is_subtechnique": true,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "2.1"
}
]
}