DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40.json
2023-09-28 17:38:48 -04:00

40 lines
1.6 KiB
JSON

{
"type": "bundle",
"id": "bundle--a07c8ff9-d999-4940-9987-1481c4674073",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2023-09-28T21:25:13.299559Z",
"modified": "2023-09-28T21:25:13.299559Z",
"name": "Intimidate",
"description": "Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "plan-objectives"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0140.002.md",
"external_id": "T0140.002"
}
],
"object_marking_refs": [
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
],
"x_mitre_is_subtechnique": true,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "2.1"
}
]
}