test_scratch
/
cti-ATT-CK-v13.1
/capec
/2.0
/attack-pattern
/attack-pattern--0123fa83-2d47-4398-85f1-30ce114abb9a.json
{ | |
"id": "bundle--fe6f08e4-c5b7-46a8-bcba-74e070e9a67f", | |
"objects": [ | |
{ | |
"created": "2014-06-23T00:00:00.000Z", | |
"created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", | |
"description": "An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack.", | |
"external_references": [ | |
{ | |
"external_id": "CAPEC-185", | |
"source_name": "capec", | |
"url": "https://capec.mitre.org/data/definitions/185.html" | |
}, | |
{ | |
"external_id": "CWE-494", | |
"source_name": "cwe", | |
"url": "http://cwe.mitre.org/data/definitions/494.html" | |
} | |
], | |
"id": "attack-pattern--0123fa83-2d47-4398-85f1-30ce114abb9a", | |
"modified": "2022-09-29T00:00:00.000Z", | |
"name": "Malicious Software Download", | |
"object_marking_refs": [ | |
"marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" | |
], | |
"type": "attack-pattern", | |
"x_capec_abstraction": "Standard", | |
"x_capec_can_follow_refs": [ | |
"attack-pattern--d16af13f-5e0f-4a6b-bc1f-23f733d2229b" | |
], | |
"x_capec_can_precede_refs": [ | |
"attack-pattern--558870ad-9433-4e39-a0b0-d9b5c4691862" | |
], | |
"x_capec_child_of_refs": [ | |
"attack-pattern--582f33d6-0aa7-4f34-a91e-d767a65adad1" | |
], | |
"x_capec_domains": [ | |
"Software" | |
], | |
"x_capec_status": "Draft", | |
"x_capec_typical_severity": "Very High", | |
"x_capec_version": "3.9" | |
} | |
], | |
"spec_version": "2.0", | |
"type": "bundle" | |
} |