Auto-Generated Documentation
This set of documentation is automatically generated from source, and will help ensure any change to functionality will always be documented and available on release.
Software¶
Information about the software used by this threat.
Field | Type | Description | Required | Default |
---|---|---|---|---|
alias | List [Keyword] | The alias(es) of the software for a set of related intrusion activity that are tracked by a common name in the security community. | Optional | None |
id | Keyword | The id of the software used by this threat to conduct behavior commonly modeled using MITRE ATT&CK®. | Optional | None |
name | Keyword | The name of the software used by this threat to conduct behavior commonly modeled using MITRE ATT&CK®. | Optional | None |
platform | List [Keyword] | The platforms of the software used by this threat to conduct behavior commonly modeled using MITRE ATT&CK®. | Optional | None |
reference | Keyword | The reference URL of the software used by this threat to conduct behavior commonly modeled using MITRE ATT&CK®. | Optional | None |
type | Keyword | The type of software used by this threat to conduct behavior commonly modeled using MITRE ATT&CK®. | Optional | None |