DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877.json

40 lines
1.6 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
"id": "bundle--a1a1ca61-1375-4e4a-bb5b-58ddbfc42589",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-03 19:59:09 -04:00
"id": "attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2023-09-28T21:25:13.227892Z",
"modified": "2023-09-28T21:25:13.227892Z",
2022-06-30 23:30:18 -04:00
"name": "Reuse Existing Content",
"description": "When an operation recycles content from its own previous operations or plagiarises from external operations. An operation may launder information to conserve resources that would have otherwise been utilised to develop new content.",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "develop-content"
}
],
"external_references": [
{
2022-07-03 19:59:09 -04:00
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0084.md",
2022-06-30 23:30:18 -04:00
"external_id": "T0084"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-03 19:59:09 -04:00
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
2022-07-03 19:59:09 -04:00
"x_mitre_version": "2.1"
2022-02-20 15:37:38 -05:00
}
]
}