{ "type": "bundle", "id": "bundle--f79f5681-7b39-4dda-97b9-4fb64583a337", "spec_version": "2.0", "objects": [ { "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "relationship--0058d5dd-bf42-4a09-94ff-dfb024b949df", "type": "relationship", "created": "2020-07-01T18:23:25.245Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "modified": "2022-03-11T18:31:24.082Z", "description": "Mitigation of some variants of this technique could be achieved through the use of stateful firewalls, depending upon how it is implemented.", "relationship_type": "mitigates", "source_ref": "course-of-action--20f6a9df-37c4-4e20-9e47-025983b1b39d", "target_ref": "attack-pattern--8868cb5b-d575-4a60-acb2-07d37389a2fd", "x_mitre_version": "1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }