test_scratch
/
cti-ATT-CK-v13.1
/capec
/2.1
/attack-pattern
/attack-pattern--1809fa36-f249-4e55-80ab-26570fd24cab.json
{ | |
"id": "bundle--63b6d632-c794-42a7-b46d-dc5a75e7b1ab", | |
"objects": [ | |
{ | |
"created": "2014-06-23T00:00:00.000Z", | |
"created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", | |
"description": "Data Interchange Protocols are used to transmit structured data between entities. These protocols are often specific to a particular domain (B2B: purchase orders, invoices, transport logistics and waybills, medical records). They are often, but not always, XML-based. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.", | |
"external_references": [ | |
{ | |
"external_id": "CAPEC-277", | |
"source_name": "capec", | |
"url": "https://capec.mitre.org/data/definitions/277.html" | |
}, | |
{ | |
"external_id": "CWE-707", | |
"source_name": "cwe", | |
"url": "http://cwe.mitre.org/data/definitions/707.html" | |
} | |
], | |
"id": "attack-pattern--1809fa36-f249-4e55-80ab-26570fd24cab", | |
"modified": "2019-04-04T00:00:00.000Z", | |
"name": "Data Interchange Protocol Manipulation", | |
"object_marking_refs": [ | |
"marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" | |
], | |
"spec_version": "2.1", | |
"type": "attack-pattern", | |
"x_capec_abstraction": "Standard", | |
"x_capec_child_of_refs": [ | |
"attack-pattern--2166d3c5-baec-4f42-8284-c1b5b649ad34" | |
], | |
"x_capec_domains": [ | |
"Communications", | |
"Software" | |
], | |
"x_capec_status": "Draft", | |
"x_capec_version": "3.9" | |
} | |
], | |
"type": "bundle" | |
} |