test_scratch
/
cti-ATT-CK-v13.1
/enterprise-attack
/x-mitre-data-source
/x-mitre-data-source--8765a845-dea1-4cd1-a56f-f54939b7ab9e.json
{ | |
"type": "bundle", | |
"id": "bundle--2f6f3d8f-d018-442e-8f78-3dccfd6ecb1e", | |
"spec_version": "2.0", | |
"objects": [ | |
{ | |
"x_mitre_platforms": [ | |
"Linux", | |
"macOS" | |
], | |
"x_mitre_domains": [ | |
"enterprise-attack" | |
], | |
"x_mitre_contributors": [ | |
"Center for Threat-Informed Defense (CTID)" | |
], | |
"x_mitre_collection_layers": [ | |
"Host" | |
], | |
"object_marking_refs": [ | |
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" | |
], | |
"id": "x-mitre-data-source--8765a845-dea1-4cd1-a56f-f54939b7ab9e", | |
"type": "x-mitre-data-source", | |
"created": "2021-10-20T15:05:19.272Z", | |
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", | |
"external_references": [ | |
{ | |
"source_name": "mitre-attack", | |
"url": "https://attack.mitre.org/datasources/DS0008", | |
"external_id": "DS0008" | |
}, | |
{ | |
"source_name": "STIG Audit Kernel Modules", | |
"description": "Unified Compliance Framework. (2016, December 20). The audit system must be configured to audit the loading and unloading of dynamic kernel modules.. Retrieved September 28, 2021.", | |
"url": "https://www.stigviewer.com/stig/oracle_linux_5/2016-12-20/finding/V-22383" | |
}, | |
{ | |
"source_name": "Init Man Page", | |
"description": "Kerrisk, M. (2021, March 22). INIT_MODULE(2). Retrieved September 28, 2021.", | |
"url": "https://man7.org/linux/man-pages/man2/init_module.2.html" | |
} | |
], | |
"modified": "2021-11-10T09:30:48.696Z", | |
"name": "Kernel", | |
"description": "A computer program, at the core of a computer OS, that resides in memory and facilitates interactions between hardware and software components(Citation: STIG Audit Kernel Modules)(Citation: Init Man Page)", | |
"x_mitre_version": "1.0", | |
"x_mitre_attack_spec_version": "2.1.0", | |
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" | |
} | |
] | |
} |