mirror of
https://github.com/DISARMFoundation/DISARMframeworks.git
synced 2024-12-12 09:24:21 -05:00
40 lines
1.6 KiB
JSON
40 lines
1.6 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--2af85ac9-d5a5-4184-870b-0a83db5501df",
|
|
"objects": [
|
|
{
|
|
"type": "attack-pattern",
|
|
"spec_version": "2.1",
|
|
"id": "attack-pattern--8dfd9cba-190e-4e4c-8923-12dcc7818734",
|
|
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
|
"created": "2023-09-25T14:19:03.599987Z",
|
|
"modified": "2023-09-25T14:19:03.599987Z",
|
|
"name": "Intimidate",
|
|
"description": "Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. ",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "mitre-attack",
|
|
"phase_name": "plan-objectives"
|
|
}
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "mitre-attack",
|
|
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0140.002.md",
|
|
"external_id": "T0140.002"
|
|
}
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
|
|
],
|
|
"x_mitre_is_subtechnique": true,
|
|
"x_mitre_platforms": [
|
|
"Windows",
|
|
"Linux",
|
|
"Mac"
|
|
],
|
|
"x_mitre_version": "2.1"
|
|
}
|
|
]
|
|
}
|