{ "type": "bundle", "id": "bundle--1f671a55-f788-4a4d-9006-a7a5cc1be11d", "spec_version": "2.0", "objects": [ { "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "relationship--00038d0e-7fc7-41c3-9055-edb4d87ea912", "type": "relationship", "created": "2021-04-27T01:56:35.810Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "source_name": "CheckPoint Volatile Cedar March 2015", "url": "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2015/03/20082004/volatile-cedar-technical-report.pdf", "description": "Threat Intelligence and Research. (2015, March 30). VOLATILE CEDAR. Retrieved February 8, 2021." } ], "modified": "2021-04-27T01:56:35.810Z", "description": " [Explosive](https://attack.mitre.org/software/S0569) has collected the MAC address from the victim's machine.(Citation: CheckPoint Volatile Cedar March 2015) ", "relationship_type": "uses", "source_ref": "malware--6a21e3a4-5ffe-4581-af9a-6a54c7536f44", "target_ref": "attack-pattern--707399d6-ab3e-4963-9315-d9d3818cd6a0", "x_mitre_version": "1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }