DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--953eae58-ea98-44c1-a4ea-ade622224db0.json
2022-07-02 16:01:17 -04:00

40 lines
1.8 KiB
JSON

{
"type": "bundle",
"id": "bundle--3884125d-5827-4905-acee-2f696159241d",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--953eae58-ea98-44c1-a4ea-ade622224db0",
"created_by_ref": "identity--875c4f47-bae7-4c40-a92f-e6169a840b57",
"created": "2022-07-02T19:59:12.646566Z",
"modified": "2022-07-02T19:59:12.646566Z",
"name": "Identify Social and Technical Vulnerabilities",
"description": "Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. \nIdentifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "target-audience-analysis"
}
],
"external_references": [
{
"source_name": "DISARM",
"url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0081.md",
"external_id": "T0081"
}
],
"object_marking_refs": [
"marking-definition--db94b503-922d-4110-a7e5-4fe556f70858"
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "1.0"
}
]
}