test_scratch
/
cti-ATT-CK-v13.1
/capec
/2.0
/attack-pattern
/attack-pattern--0d249bf9-13b3-4c13-9423-bcb1ea73c067.json
{ | |
"id": "bundle--fdfdc2b9-1600-4cde-b9e8-6a591b35740f", | |
"objects": [ | |
{ | |
"created": "2014-06-23T00:00:00.000Z", | |
"created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", | |
"description": "Adversary creates duplicates of legitimate websites. When users visit a counterfeit site, the site can gather information or upload malware.", | |
"external_references": [ | |
{ | |
"external_id": "CAPEC-543", | |
"source_name": "capec", | |
"url": "https://capec.mitre.org/data/definitions/543.html" | |
}, | |
{ | |
"description": "Masquerading: Match Legitimate Name or Location", | |
"external_id": "T1036.005", | |
"source_name": "ATTACK", | |
"url": "https://attack.mitre.org/wiki/Technique/T1036/005" | |
} | |
], | |
"id": "attack-pattern--0d249bf9-13b3-4c13-9423-bcb1ea73c067", | |
"modified": "2022-09-29T00:00:00.000Z", | |
"name": "Counterfeit Websites", | |
"object_marking_refs": [ | |
"marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" | |
], | |
"type": "attack-pattern", | |
"x_capec_abstraction": "Detailed", | |
"x_capec_can_follow_refs": [ | |
"attack-pattern--a69b641a-dff7-4dad-b9b1-e00f80b083a2", | |
"attack-pattern--b6f0fd7e-6068-4557-976c-fd34914b11bf", | |
"attack-pattern--a2cad567-3a04-4ef3-8b62-25924c93b53f", | |
"attack-pattern--c4e18b3f-0445-49e8-9bf1-d47a23082501", | |
"attack-pattern--a00c2cc2-bd4f-4594-9ec1-b021b62ac896" | |
], | |
"x_capec_can_precede_refs": [ | |
"attack-pattern--5dec633b-7b10-4bfe-9270-e68b98112285" | |
], | |
"x_capec_child_of_refs": [ | |
"attack-pattern--862d18f1-a87c-4f1b-acc2-882697d5d6e5" | |
], | |
"x_capec_domains": [ | |
"Social Engineering" | |
], | |
"x_capec_prerequisites": [ | |
"None" | |
], | |
"x_capec_status": "Draft", | |
"x_capec_typical_severity": "High", | |
"x_capec_version": "3.9" | |
} | |
], | |
"spec_version": "2.0", | |
"type": "bundle" | |
} |