{ "type": "bundle", "id": "bundle--2f6f3d8f-d018-442e-8f78-3dccfd6ecb1e", "spec_version": "2.0", "objects": [ { "x_mitre_platforms": [ "Linux", "macOS" ], "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_contributors": [ "Center for Threat-Informed Defense (CTID)" ], "x_mitre_collection_layers": [ "Host" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "x-mitre-data-source--8765a845-dea1-4cd1-a56f-f54939b7ab9e", "type": "x-mitre-data-source", "created": "2021-10-20T15:05:19.272Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "source_name": "mitre-attack", "url": "https://attack.mitre.org/datasources/DS0008", "external_id": "DS0008" }, { "source_name": "STIG Audit Kernel Modules", "description": "Unified Compliance Framework. (2016, December 20). The audit system must be configured to audit the loading and unloading of dynamic kernel modules.. Retrieved September 28, 2021.", "url": "https://www.stigviewer.com/stig/oracle_linux_5/2016-12-20/finding/V-22383" }, { "source_name": "Init Man Page", "description": "Kerrisk, M. (2021, March 22). INIT_MODULE(2). Retrieved September 28, 2021.", "url": "https://man7.org/linux/man-pages/man2/init_module.2.html" } ], "modified": "2021-11-10T09:30:48.696Z", "name": "Kernel", "description": "A computer program, at the core of a computer OS, that resides in memory and facilitates interactions between hardware and software components(Citation: STIG Audit Kernel Modules)(Citation: Init Man Page)", "x_mitre_version": "1.0", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }