File size: 1,639 Bytes
5fe70fd |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 |
{
"id": "bundle--5de8b51a-ccba-4280-8857-78a0801bea90",
"objects": [
{
"created": "2014-06-23T00:00:00.000Z",
"created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd",
"description": "",
"external_references": [
{
"external_id": "CAPEC-435",
"source_name": "capec",
"url": "https://capec.mitre.org/data/definitions/435.html"
},
{
"description": "The Official Social Engineering Portal, Social-Engineer.org, Tick Tock Computers, LLC",
"external_id": "REF-348",
"source_name": "reference_from_CAPEC",
"url": "http://www.social-engineer.org"
}
],
"id": "attack-pattern--0618a68a-c6e1-4370-82d3-c76fa2745905",
"modified": "2014-06-23T00:00:00.000Z",
"name": "Target Influence via Instant Rapport",
"object_marking_refs": [
"marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d"
],
"spec_version": "2.1",
"type": "attack-pattern",
"x_capec_abstraction": "Detailed",
"x_capec_child_of_refs": [
"attack-pattern--9e487767-c1e6-45f9-ae01-1fb1e2d6f030"
],
"x_capec_domains": [
"Social Engineering"
],
"x_capec_status": "Draft",
"x_capec_typical_severity": "Low",
"x_capec_version": "3.9"
}
],
"type": "bundle"
} |