test_scratch
/
cti-ATT-CK-v13.1
/enterprise-attack
/tool
/tool--96fd6cc4-a693-4118-83ec-619e5352d07d.json
{ | |
"type": "bundle", | |
"id": "bundle--ba57f615-d36b-421d-806c-f521fb362461", | |
"spec_version": "2.0", | |
"objects": [ | |
{ | |
"labels": [ | |
"tool" | |
], | |
"x_mitre_domains": [ | |
"enterprise-attack" | |
], | |
"object_marking_refs": [ | |
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" | |
], | |
"id": "tool--96fd6cc4-a693-4118-83ec-619e5352d07d", | |
"type": "tool", | |
"created": "2018-04-18T17:59:24.739Z", | |
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", | |
"external_references": [ | |
{ | |
"source_name": "mitre-attack", | |
"url": "https://attack.mitre.org/software/S0191", | |
"external_id": "S0191" | |
}, | |
{ | |
"source_name": "Winexe", | |
"description": "(Citation: Winexe Github Sept 2013) (Citation: \u00dcberwachung APT28 Forfiles June 2015)" | |
}, | |
{ | |
"source_name": "Winexe Github Sept 2013", | |
"description": "Skalkotos, N. (2013, September 20). WinExe. Retrieved January 22, 2018.", | |
"url": "https://github.com/skalkoto/winexe/" | |
}, | |
{ | |
"source_name": "\u00dcberwachung APT28 Forfiles June 2015", | |
"description": "Guarnieri, C. (2015, June 19). Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag. Retrieved January 22, 2018.", | |
"url": "https://netzpolitik.org/2015/digital-attack-on-german-parliament-investigative-report-on-the-hack-of-the-left-party-infrastructure-in-bundestag/" | |
} | |
], | |
"modified": "2018-10-17T00:14:20.652Z", | |
"name": "Winexe", | |
"description": "[Winexe](https://attack.mitre.org/software/S0191) is a lightweight, open source tool similar to [PsExec](https://attack.mitre.org/software/S0029) designed to allow system administrators to execute commands on remote servers. (Citation: Winexe Github Sept 2013) [Winexe](https://attack.mitre.org/software/S0191) is unique in that it is a GNU/Linux based client. (Citation: \u00dcberwachung APT28 Forfiles June 2015)", | |
"x_mitre_version": "1.0", | |
"x_mitre_attack_spec_version": "2.1.0", | |
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" | |
} | |
] | |
} |