DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7.json
2023-09-28 17:38:48 -04:00

40 lines
1.6 KiB
JSON

{
"type": "bundle",
"id": "bundle--088dde27-e6c9-4941-9440-e41867e9288c",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2023-09-28T21:25:13.291305Z",
"modified": "2023-09-28T21:25:13.291305Z",
"name": "Subvert",
"description": "Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of \u201cactive measures\u201d involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "plan-objectives"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0135.003.md",
"external_id": "T0135.003"
}
],
"object_marking_refs": [
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
],
"x_mitre_is_subtechnique": true,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "2.1"
}
]
}