DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--acb35a90-5c38-42f4-a32e-5e96bacf0e33.json

40 lines
1.6 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
2022-07-02 16:01:17 -04:00
"id": "bundle--72f38df6-0714-4f84-b5bc-11b014f776c0",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-02 16:01:17 -04:00
"id": "attack-pattern--acb35a90-5c38-42f4-a32e-5e96bacf0e33",
"created_by_ref": "identity--ab023978-2067-49be-9e74-7f0c42fdca15",
"created": "2022-07-02T19:59:12.650147Z",
"modified": "2022-07-02T19:59:12.650147Z",
2022-06-30 23:30:18 -04:00
"name": "Reuse Existing Content",
2022-07-02 16:01:17 -04:00
"description": "When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. ",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "develop-content"
}
],
"external_references": [
{
"source_name": "DISARM",
2022-06-30 23:30:18 -04:00
"url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0084.md",
"external_id": "T0084"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-02 16:01:17 -04:00
"marking-definition--84551930-9961-4062-8a9f-57d4cdc42233"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "1.0"
2022-02-20 15:37:38 -05:00
}
]
}