{ "type": "bundle", "id": "bundle--0abac62c-b35f-4377-8ac9-c7e4ebb91a51", "spec_version": "2.0", "objects": [ { "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "relationship--00a88d6f-fa8c-48bf-a028-fb75ca04e000", "type": "relationship", "created": "2020-11-10T16:49:13.291Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "source_name": "DFIR Ryuk 2 Hour Speed Run November 2020", "url": "https://thedfirreport.com/2020/11/05/ryuk-speed-run-2-hours-to-ransom/", "description": "The DFIR Report. (2020, November 5). Ryuk Speed Run, 2 Hours to Ransom. Retrieved November 6, 2020." } ], "modified": "2020-11-10T16:49:13.291Z", "description": "[Wizard Spider](https://attack.mitre.org/groups/G0102) obtained a code signing certificate signed by Digicert for some of its malware.(Citation: DFIR Ryuk 2 Hour Speed Run November 2020)", "relationship_type": "uses", "source_ref": "intrusion-set--dd2d9ca6-505b-4860-a604-233685b802c7", "target_ref": "attack-pattern--e7cbc1de-1f79-48ee-abfd-da1241c65a15", "x_mitre_version": "1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }