test_scratch / cti-ATT-CK-v13.1 /mobile-attack /relationship /relationship--04530307-22d8-4a06-9056-55eea225fabb.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.56 kB
{
"type": "bundle",
"id": "bundle--e56f2a06-1106-446c-bd87-c5db2dbc53b1",
"spec_version": "2.0",
"objects": [
{
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "relationship--04530307-22d8-4a06-9056-55eea225fabb",
"type": "relationship",
"created": "2019-07-10T15:35:43.710Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"url": "https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf",
"description": "Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.",
"source_name": "Lookout Dark Caracal Jan 2018"
}
],
"modified": "2019-08-09T18:06:11.842Z",
"description": "[Pallas](https://attack.mitre.org/software/S0399) retrieves messages and decryption keys for popular messaging applications and other accounts stored on the device.(Citation: Lookout Dark Caracal Jan 2018)",
"relationship_type": "uses",
"source_ref": "malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878",
"target_ref": "attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160",
"x_mitre_version": "1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}