mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-27 17:27:18 +00:00
c174f613c5
Fix #566
2774 lines
89 KiB
JSON
2774 lines
89 KiB
JSON
{
|
|
"authors": [
|
|
"Koen Van Impe"
|
|
],
|
|
"category": "sod-matrix",
|
|
"description": "SOD Matrix",
|
|
"name": "SoD Matrix",
|
|
"source": "https://github.com/cudeso/SoD-Matrix",
|
|
"type": "sod-matrix",
|
|
"uuid": "f0b6036d-020d-414b-9761-ee5a972d2362",
|
|
"values": [
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "8c30b853-c0ea-4640-9f67-9ca4c0b38fe7",
|
|
"value": "Delivering training - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "180911a0-4d5c-4bc2-ae72-6d47cb815bb8",
|
|
"value": "Delivering training - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "c7b1fdba-da02-4cf3-9edf-4b5b63856e89",
|
|
"value": "Delivering training - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "3d3c0afb-c774-4b01-8cc1-b73e18a75817",
|
|
"value": "Delivering training - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "a9af8207-d291-43df-932c-fa1440f48606",
|
|
"value": "Delivering training - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "36b5a3b1-6d47-4e69-8dbb-f8c68305ec4d",
|
|
"value": "Delivering training - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "82b2d439-2a8b-4a04-b157-c14894d9f7fa",
|
|
"value": "Delivering training - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "7a61c74c-821e-4181-b1af-4af0d82fdbac",
|
|
"value": "Delivering training - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "e05a2dd4-e7d5-4ba3-8671-591f978528f5",
|
|
"value": "Delivering training - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "6e953394-c1af-4dd7-b23b-0a01f623b5d6",
|
|
"value": "Delivering training - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "b7669c04-c25b-42af-b059-2d7e32b0a02d",
|
|
"value": "Delivering training - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "af9a18a7-b055-42dd-b524-19764b107e50",
|
|
"value": "Delivering training - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "b12e1ac4-2768-4e92-8dd7-a09227bac2b3",
|
|
"value": "Delivering training - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "7f368bea-5495-412d-a0cd-9da9bff935a2",
|
|
"value": "Delivering training - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "a249e3a1-9080-4670-b4f8-32b440880f0c",
|
|
"value": "Delivering training - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "2b9f7fd0-b307-4d62-b8ae-a9fdc06239be",
|
|
"value": "Delivering training - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "dfb62596-07a3-4e35-aed9-e3114154fc2f",
|
|
"value": "Participating in training - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "c5375ebd-4f74-4edd-a26d-ca2e7a896abc",
|
|
"value": "Participating in training - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "180c9172-f3a3-4375-b19a-5e2a410dcdff",
|
|
"value": "Participating in training - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "a10e189c-9170-4902-b5d4-6731cc9c4344",
|
|
"value": "Participating in training - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "6b340ada-7485-4239-830d-1b47f6e19193",
|
|
"value": "Participating in training - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "fafb4fc5-0aa8-45f1-ab5f-5d1096a008d1",
|
|
"value": "Participating in training - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "50a48e7f-7dcd-4a96-b52f-c7b245397b12",
|
|
"value": "Participating in training - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "36847172-681a-49ce-be3c-81a3dbc0c3a5",
|
|
"value": "Participating in training - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "50530e3e-599d-4313-89ab-23f2ed98ad50",
|
|
"value": "Participating in training - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "40806186-5d7f-47db-a4a5-c1800a20821e",
|
|
"value": "Participating in training - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "ff0f2f44-015f-4431-a3fe-ae26bb0815c8",
|
|
"value": "Participating in training - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "b26b5e22-1a91-402c-9788-a0eea389359c",
|
|
"value": "Participating in training - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "d1b35b87-94ae-4664-a20e-d19cef887c3a",
|
|
"value": "Participating in training - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "ab8a772b-c081-4181-987b-e3e1e2f3ac3a",
|
|
"value": "Participating in training - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "f696b321-4aa7-425a-818c-04432a5e5b2d",
|
|
"value": "Participating in training - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Problem-solving and critical thinking skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "7b474c19-f2a5-47e9-b117-f9d1d69be234",
|
|
"value": "Participating in training - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "400cf278-521d-4a42-a126-211434a22dbc",
|
|
"value": "Collecting cyber threat intelligence - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "bf8ff54b-b0a6-4289-9609-e8c2ee16007f",
|
|
"value": "Collecting cyber threat intelligence - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "512a4e56-6b7b-4895-baa6-fd179d8177f9",
|
|
"value": "Collecting cyber threat intelligence - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "0e61fc28-ba4a-4735-8e18-db1c332c32e2",
|
|
"value": "Collecting cyber threat intelligence - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "f0c51663-0009-4b18-a4a0-b1709a414229",
|
|
"value": "Collecting cyber threat intelligence - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "98f06142-1ecc-47a8-a521-caba55e388f5",
|
|
"value": "Collecting cyber threat intelligence - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "7f98d766-7bbd-415b-a92a-ebc3775bde6b",
|
|
"value": "Collecting cyber threat intelligence - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "2ce4fa46-26b2-41a7-872a-d0a6c6d7525b",
|
|
"value": "Collecting cyber threat intelligence - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "459222fd-e61b-4b5b-a4f1-085b17172e03",
|
|
"value": "Collecting cyber threat intelligence - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "6e4fbf4c-f9b3-4652-b10a-ec7131b89346",
|
|
"value": "Collecting cyber threat intelligence - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "5a508f6c-ece3-415b-9e3b-018e69dce25e",
|
|
"value": "Collecting cyber threat intelligence - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threat intelligence landscape",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "798bd8e9-c3dc-409e-a500-b5cdc45d0612",
|
|
"value": "Collecting cyber threat intelligence - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "5aa53ea1-5e00-4537-b25f-2fcd74601cd9",
|
|
"value": "Analysis of vulnerabilities and threats - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "70437783-b605-4721-9cdb-97083f99d8c1",
|
|
"value": "Analysis of vulnerabilities and threats - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "b8d41ed3-ac9b-4081-a62f-96bd4a326481",
|
|
"value": "Analysis of vulnerabilities and threats - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "4827a847-aa5b-4d42-aad3-541a3b09a016",
|
|
"value": "Analysis of vulnerabilities and threats - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "1d188a9d-a651-4a53-897b-5c40b37cd6b7",
|
|
"value": "Analysis of vulnerabilities and threats - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "b96ff6ca-cd07-42b9-9a94-e75344cb9ffa",
|
|
"value": "Analysis of vulnerabilities and threats - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "d40de8b6-e30c-4049-a4b5-2301e168eadc",
|
|
"value": "Analysis of vulnerabilities and threats - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "8b3d60eb-6d65-4fd9-9a16-1e5641dfbfd9",
|
|
"value": "Analysis of vulnerabilities and threats - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "6d0a0290-2c39-440b-ae94-5150e06cbebf",
|
|
"value": "Analysis of vulnerabilities and threats - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "1bb9b2bb-1400-4f78-b814-62ae386d6d37",
|
|
"value": "Analysis of vulnerabilities and threats - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "1a140e3e-dd18-48fc-b23b-fbefd210ce50",
|
|
"value": "Analysis of vulnerabilities and threats - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Development and distribution of tools for preventive and reactive mitigation",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "722fa70e-b582-471b-924c-a3959f9311ad",
|
|
"value": "Analysis of vulnerabilities and threats - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Dealing with specific types of threats and vulnerabilities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "fa648ede-2483-4c21-a51d-4def2c981800",
|
|
"value": "Issuing recommendations for new vulnerabilities and threats - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Dealing with specific types of threats and vulnerabilities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "f9d0da9b-0511-42f8-93fb-14717bc1e97e",
|
|
"value": "Issuing recommendations for new vulnerabilities and threats - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Dealing with specific types of threats and vulnerabilities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "e2b9b2c0-7013-4635-9b83-aa5ab99452e1",
|
|
"value": "Issuing recommendations for new vulnerabilities and threats - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Dealing with specific types of threats and vulnerabilities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "5ce3e730-d8c8-44e4-b5ca-a74154f712ad",
|
|
"value": "Issuing recommendations for new vulnerabilities and threats - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "c3459328-369f-4c83-b1d2-257c652c0372",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "88c65272-ba8f-4371-ac53-4d3bc6ffa09f",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "9812cb5f-b651-4046-934a-6738131fd34a",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "25ac0387-4816-49fa-a1ae-b52466e06eb9",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "9b10d25f-ed40-4ba1-a3c4-5208f981ebe4",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "1e8ccddd-9234-4857-b6dd-6d245662d70d",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "9747a0f1-a8b8-41b2-8085-a34a9a29fe90",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Raising awareness on preventive measures against cybercrime",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"prior-to-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "9757c359-53e1-47b0-ad64-926ebccba260",
|
|
"value": "Advising potential victims on preventive measures against cybercrime - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "12fede00-a1f6-402d-a6f9-90c6f31a2fcd",
|
|
"value": "Discovery of the cyber security incident/crime - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "123609b4-f1f0-4595-93f7-c08f37f0c5f1",
|
|
"value": "Discovery of the cyber security incident/crime - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "ac81dd66-ffb1-420e-882f-8be190345cc7",
|
|
"value": "Discovery of the cyber security incident/crime - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "18f8f85b-9e2a-49d0-98f9-61e9ec96410a",
|
|
"value": "Discovery of the cyber security incident/crime - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "084e2f0c-7f52-4765-93eb-c8e940918917",
|
|
"value": "Discovery of the cyber security incident/crime - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "71ae2a57-0897-4ef2-85d0-d90cf024919c",
|
|
"value": "Discovery of the cyber security incident/crime - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "9749776c-1a6a-47aa-94bd-79463e78e0b4",
|
|
"value": "Discovery of the cyber security incident/crime - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools; penetration testing; vulnerability scanning; flow analysis",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "af200b0e-ea46-4897-aa61-a7fe1194d994",
|
|
"value": "Discovery of the cyber security incident/crime - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "12e70dce-b3e4-49f9-9ffe-9c3974e08e00",
|
|
"value": "Identification and classification of the cyber security incident/crime - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "887ec547-4dad-4209-80b5-ae6867c81601",
|
|
"value": "Identification and classification of the cyber security incident/crime - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "5e53d254-b1ca-4938-8724-75ca781c4940",
|
|
"value": "Identification and classification of the cyber security incident/crime - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "a78bbadf-48ad-4834-8c77-3a59ed76dfd0",
|
|
"value": "Identification and classification of the cyber security incident/crime - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "dd4f9192-1735-495e-8182-f25d60d56091",
|
|
"value": "Identification and classification of the cyber security incident/crime - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "93615c2d-3fcd-4cfc-9cfd-538d2e3cae26",
|
|
"value": "Identification and classification of the cyber security incident/crime - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "6ca81f14-eabc-4251-a438-9f53a7a480d6",
|
|
"value": "Identification and classification of the cyber security incident/crime - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "36193028-4f77-4c49-940c-73055c48e73f",
|
|
"value": "Identification and classification of the cyber security incident/crime - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "9d731cd3-e3c1-4161-939d-d489c08842d1",
|
|
"value": "Identification and classification of the cyber security incident/crime - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "d395c567-a957-435e-b09b-ef7a4b7f17c1",
|
|
"value": "Identification and classification of the cyber security incident/crime - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "cce3cbac-9651-4f97-8fd1-4ebf71d148d3",
|
|
"value": "Identification and classification of the cyber security incident/crime - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Incident and crime classification and identification",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "fc51cb7a-35da-4619-b185-68d07cc61bd8",
|
|
"value": "Identification and classification of the cyber security incident/crime - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "9981d788-2c96-4b7c-9da5-00a203a437f4",
|
|
"value": "Identify the type and severity of the compromise - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "0bd0d08d-706d-471d-8840-f1a64c4f1806",
|
|
"value": "Identify the type and severity of the compromise - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "bbe82e44-6da0-405e-b34c-6bc95516a687",
|
|
"value": "Identify the type and severity of the compromise - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "f0534ece-47be-4d68-b50a-0d311655fec5",
|
|
"value": "Identify the type and severity of the compromise - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "c8c32791-1303-4792-bbb4-00f57835e999",
|
|
"value": "Identify the type and severity of the compromise - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "e74a4efb-781f-4e3c-8d35-e3cd572e8da2",
|
|
"value": "Identify the type and severity of the compromise - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "d69b68a3-90a9-4eb2-bc3a-943da0975f1d",
|
|
"value": "Identify the type and severity of the compromise - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "f9f1638a-9aca-48e6-9ba5-76de7f856b9a",
|
|
"value": "Identify the type and severity of the compromise - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "cb152c41-afff-4883-a329-e9c0105f019a",
|
|
"value": "Identify the type and severity of the compromise - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "ef474453-ca40-408a-8337-fcb04dd0b3ee",
|
|
"value": "Identify the type and severity of the compromise - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "dfdce4aa-ab8d-419c-8323-5ce1e6097918",
|
|
"value": "Identify the type and severity of the compromise - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of cyber threats and incident response procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "93063133-f1fd-437b-93a2-e1129c9d8036",
|
|
"value": "Identify the type and severity of the compromise - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "61f81a3b-f210-4de6-804d-b7222dd1d19b",
|
|
"value": "Evidence collection - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "1ce5f5e0-e086-4206-b8aa-dfec054d4efe",
|
|
"value": "Evidence collection - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "3747708a-d00b-4343-946c-dbdafd1b7972",
|
|
"value": "Evidence collection - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "d5b690ed-f3ba-46df-bba2-e72df7484ec3",
|
|
"value": "Evidence collection - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "4cf6c5dd-5bbb-4553-8e88-03f76445d439",
|
|
"value": "Evidence collection - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "ca58afe6-010d-4a7c-ad01-dbd500741ea4",
|
|
"value": "Evidence collection - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "0f03ec7d-0cc8-4fd7-a6af-555271abc790",
|
|
"value": "Evidence collection - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "5c9ab775-2243-44e0-899b-7c40cd24a0f7",
|
|
"value": "Evidence collection - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "5889df92-af5d-4778-a759-153ec0e37922",
|
|
"value": "Evidence collection - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "f062c42e-a9a2-4cd9-8d09-663dc43de6eb",
|
|
"value": "Evidence collection - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "14657b74-0877-4e24-9fdc-e28ad30b1a93",
|
|
"value": "Evidence collection - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of what kind of data to collect; organisation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "41a4fd96-c338-4b91-ac17-440d07a30746",
|
|
"value": "Evidence collection - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "6d88b605-64ce-4697-91df-7aa15cb14e12",
|
|
"value": "Providing technical expertise - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "51d0474b-5aea-4159-859b-bd2abd1b234d",
|
|
"value": "Providing technical expertise - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "9ee736c7-e6fe-4195-9632-12dd64227fd7",
|
|
"value": "Providing technical expertise - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "eaedc9f6-2c3a-468a-9f10-7f37d01477c7",
|
|
"value": "Providing technical expertise - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "26cb504a-77fa-4ac1-bd8e-488e7d4c77d0",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "08a0548d-baf5-4641-9936-8673c1d42016",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "5af70b5d-18a9-448d-9257-94c4017357bb",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "869d4c36-8164-4800-bbbd-1ac93e3e44cf",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "7b78714d-9888-4390-9a25-4f383e0fb20f",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "cbcf9bf4-b49a-42e2-983d-a3cc2c729b89",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "905c8bd9-9951-4b32-a1c6-8d490779e61b",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "f3950bc7-713a-4e39-af5b-117a8d275b45",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "6449c177-2440-4505-8aa1-40dab349b62b",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "e68a149d-aafc-46da-b229-7d97076a78d8",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "805b36a5-7b7c-483b-9438-3ac54f87b3a3",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Digital investigations; forensics tools;",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "6c517f9e-f7a4-40a7-9bff-ed70018befa1",
|
|
"value": "Preserving the evidence that may be crucial for the detection of a crime in a criminal trial - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "8994e4ff-d44b-4965-b9cf-02636b4d252e",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "0d058ec0-9a7b-4f10-93ee-b03f03cad673",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "38d879b6-adfd-4e4e-b834-804b4dfa7542",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "3412596c-224d-40ac-bdb2-8691c2c5601b",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "1183b225-bf7e-4338-a4bd-653320265f33",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "40a01101-5d08-474c-8f69-fb0eb85cbc00",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "a73adbf2-25df-49fe-bf57-ce7031a62e84",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Obligations and restriction on information sharing; communication channels",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "b7950b87-3c58-4adb-8eab-7302bf896e8b",
|
|
"value": "Advising the victim to report / obligation to report a cybercrime to law enforcement (LE) - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "d7708f53-91fc-4ea0-ac56-e6fd37785e11",
|
|
"value": "Duty to inform the victim of a cybercrime - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "8f1ac4a2-ad36-46cb-8fb8-6c385a487988",
|
|
"value": "Duty to inform the victim of a cybercrime - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "10490bc4-f878-42a1-9a35-9a132951e3cd",
|
|
"value": "Duty to inform the victim of a cybercrime - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "95ac0390-4e51-4f62-be07-f52a5741d481",
|
|
"value": "Duty to inform the victim of a cybercrime - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "f105a5e7-77bc-46df-962a-3915524a764f",
|
|
"value": "Duty to inform the victim of a cybercrime - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "9f920c06-dd08-445e-856c-dee257b8bff9",
|
|
"value": "Duty to inform the victim of a cybercrime - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "f39d58f1-27e1-4286-874b-774bc14d020a",
|
|
"value": "Duty to inform the victim of a cybercrime - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "39d6009a-5d04-470c-8e35-626b42ad0e22",
|
|
"value": "Duty to inform the victim of a cybercrime - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "fff34bab-f0be-43a9-b88a-147bedb624a4",
|
|
"value": "Duty to inform the victim of a cybercrime - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "500872c2-e390-4af3-8afc-ebac12fc8ecb",
|
|
"value": "Duty to inform the victim of a cybercrime - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "5279aa3e-c651-420d-90c4-ef7ea664509f",
|
|
"value": "Duty to inform the victim of a cybercrime - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Obligations and restrictions to the information sharing",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "15eeb208-d6bd-455d-afa0-f08d7cfd455d",
|
|
"value": "Duty to inform the victim of a cybercrime - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Obligations and rules for information sharing among communities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "3d563698-b30e-4311-94f0-a546116ddebb",
|
|
"value": "Duty to inform other stakeholders/authorities (operators of vulnerable systems, data protection authorities, telecommunications authorities, etc.) - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Obligations and rules for information sharing among communities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "3156a0ba-e42f-414d-94b4-5918fe0123e9",
|
|
"value": "Duty to inform other stakeholders/authorities (operators of vulnerable systems, data protection authorities, telecommunications authorities, etc.) - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Obligations and rules for information sharing among communities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "da26c647-653f-4be6-88bb-9c2f47938070",
|
|
"value": "Duty to inform other stakeholders/authorities (operators of vulnerable systems, data protection authorities, telecommunications authorities, etc.) - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Obligations and rules for information sharing among communities",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "adda2338-7a8c-4df1-9df0-b41d0cc4cf1c",
|
|
"value": "Duty to inform other stakeholders/authorities (operators of vulnerable systems, data protection authorities, telecommunications authorities, etc.) - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Communication skills; communication channel",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "c997e57d-b01e-431b-8290-97597e5663f6",
|
|
"value": "Acting as a single point of contact (PoC) for any communication with other EU Member States for the incident handling - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Communication skills; communication channel",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "44809f1a-e49f-4c04-ae1e-4b27e44f6094",
|
|
"value": "Acting as a single point of contact (PoC) for any communication with other EU Member States for the incident handling - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Communication skills; communication channel",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "a4d86259-3ca8-45af-8cfa-4dbab7ea7a78",
|
|
"value": "Acting as a single point of contact (PoC) for any communication with other EU Member States for the incident handling - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Communication skills; communication channel",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "a22ff356-a9b6-49fe-97ee-927d1b45a995",
|
|
"value": "Acting as a single point of contact (PoC) for any communication with other EU Member States for the incident handling - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Well-prepared & well-organised to react promptly in an incident",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "95d832c2-6e71-41b9-bfab-57c800b22f71",
|
|
"value": "Mitigation of an incident - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Well-prepared & well-organised to react promptly in an incident",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "6d35762c-22c2-496a-aa02-11c8edb524fa",
|
|
"value": "Mitigation of an incident - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Well-prepared & well-organised to react promptly in an incident",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "835a8809-f266-47f3-b8ac-a72b35a9c86a",
|
|
"value": "Mitigation of an incident - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Well-prepared & well-organised to react promptly in an incident",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "b405f755-9429-4b86-a5e0-359e804c1d7a",
|
|
"value": "Mitigation of an incident - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "3689b125-b9b2-46d3-98a6-46932d0b75db",
|
|
"value": "Conducting the criminal investigation - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "bcb5b5bf-db9f-4ede-a5e5-87b15c7dea1b",
|
|
"value": "Conducting the criminal investigation - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "2ca796bd-be77-4d08-bba7-94c277010089",
|
|
"value": "Conducting the criminal investigation - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "e4af5e72-70da-452d-b9e7-b3d8a6345ab4",
|
|
"value": "Conducting the criminal investigation - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "02cf6e8a-43e7-4afd-861d-248d0daf3e04",
|
|
"value": "Conducting the criminal investigation - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "6af3562b-0f1d-4f29-b560-d69dff725e9e",
|
|
"value": "Conducting the criminal investigation - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "6de8cd8e-bb72-4cf3-a617-f06283f6d7e0",
|
|
"value": "Conducting the criminal investigation - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "564a9803-868a-4aa2-b86f-0f8b9031bc11",
|
|
"value": "Conducting the criminal investigation - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "06e56a2d-710e-4e76-a0cb-84f977a52ce2",
|
|
"value": "Leading the criminal investigation - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "635964ba-56a2-415c-a5b0-afa0c3a2f037",
|
|
"value": "Leading the criminal investigation - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "cb846a08-8a27-4294-bfcd-6d18676aa921",
|
|
"value": "Leading the criminal investigation - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "318abb2b-1ae1-4bad-8c55-dc82feead1aa",
|
|
"value": "Leading the criminal investigation - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "e6d2ce58-6533-4c24-ae2c-ad26baaa98e6",
|
|
"value": "Leading the criminal investigation - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "ed8a6b5c-6a99-40cc-a2d1-bb1595a00a01",
|
|
"value": "Leading the criminal investigation - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "b3b25783-b00a-4034-9a59-162733cdc73f",
|
|
"value": "Leading the criminal investigation - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the incident response plan; leadership skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "a902e7c5-b55a-4bc8-b83d-462a212e509b",
|
|
"value": "Leading the criminal investigation - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "de629bfb-b231-498d-b84f-f741aec754be",
|
|
"value": "In the case of disagreement, the final say for an investigation - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "8f313224-d8a2-48f3-847b-c1c2bdc2371f",
|
|
"value": "In the case of disagreement, the final say for an investigation - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "23b44f62-e07d-4e18-810d-e4b6a946fe08",
|
|
"value": "In the case of disagreement, the final say for an investigation - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "4ab2a736-2499-45d7-b843-63b7972dec07",
|
|
"value": "In the case of disagreement, the final say for an investigation - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "193472fd-ca99-4db3-ac80-329982e6396b",
|
|
"value": "In the case of disagreement, the final say for an investigation - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "53bf5445-a394-48a2-8cef-e707567b4734",
|
|
"value": "In the case of disagreement, the final say for an investigation - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "82cd434b-8c2c-4f90-8242-408085076c25",
|
|
"value": "In the case of disagreement, the final say for an investigation - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge of the legal framework; decision- making skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "ac453021-0cb0-4812-8f7f-07d9428e9ace",
|
|
"value": "In the case of disagreement, the final say for an investigation - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "0c5e2c44-098b-4fe2-b1a1-9757989f99fe",
|
|
"value": "Authorizing the investigation carried out by the LE - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "2ebc7c1e-8dd5-42e5-9435-7a7ee56b2dfe",
|
|
"value": "Authorizing the investigation carried out by the LE - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "3f04b464-dd5e-4a96-a91b-41c6a46f29c5",
|
|
"value": "Authorizing the investigation carried out by the LE - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "a2bbef44-e2b7-4605-85a6-560a2713d273",
|
|
"value": "Authorizing the investigation carried out by the LE - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "affc1393-e18a-43da-a277-ac30d1193142",
|
|
"value": "Authorizing the investigation carried out by the LE - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "8e20ed2e-3e51-474d-a5ea-446df870b2b2",
|
|
"value": "Authorizing the investigation carried out by the LE - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "d9583c3d-6179-492d-a0aa-902e3f3bb48a",
|
|
"value": "Authorizing the investigation carried out by the LE - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "dcc4d9a9-b865-41f5-a89d-58121e38639d",
|
|
"value": "Authorizing the investigation carried out by the LE - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "f42381e6-6758-40a0-ad79-98af7060974c",
|
|
"value": "Authorizing the investigation carried out by the LE - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "425f94a9-b777-47e2-a409-90273b3dd9bb",
|
|
"value": "Authorizing the investigation carried out by the LE - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "8e508097-9886-48cc-956d-4288f3728d94",
|
|
"value": "Authorizing the investigation carried out by the LE - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Decision-making in the criminal procedure",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "bd13d489-b9f3-4cd0-8b7b-458e8df42d67",
|
|
"value": "Authorizing the investigation carried out by the LE - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "9955c7c9-4dbe-40ed-9a38-90a2c52caf4f",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "38bb48d4-3146-4d40-a0f6-79e98fdc4c7c",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "1bcbc557-1ad2-4b70-9bac-9930fcb1d967",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "f55bc140-4642-4ced-94eb-b235a0ab7f3a",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "69015eb2-478f-4ea9-ae12-6684a25587c1",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "9134dcb3-884f-4960-8dcf-6a86d7f6c818",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "eab9fecb-6057-4bb4-a16f-fb7881f6e7cd",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "e151eaee-8113-455b-85d5-b97a1f679515",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "7ab31ea4-1033-423c-a9d8-30957eda89b8",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "62c99f5e-ad73-47f5-bbd1-88b4e051c34b",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "8470e8d0-8fec-4574-87a6-0bf34ceebf0c",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "2e1778fa-6d6a-4e40-b625-afc047af4f62",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "84a6d93b-0098-40fe-be8e-1bd23f331177",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "128208a7-7ba3-498a-bbed-0d59cc77ec67",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "54cba708-e19c-455a-86c6-94bbbd07223d",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Fundamental rights in criminal investigations and prosecutions",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"during-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "7e8cc247-68a8-452f-b0fd-3bc99c0dae82",
|
|
"value": "Ensuring that fundamental rights are respected during the investigation and prosecution - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "356945de-c675-408d-8688-f145aec7d62f",
|
|
"value": "Systems recovery - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "285a749d-daae-4c8e-bef2-47065435d4fd",
|
|
"value": "Systems recovery - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "b0064b51-9d80-45a6-8c30-f87cdefd5667",
|
|
"value": "Systems recovery - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Technical skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "fbf409b9-c89b-452f-a47e-da2c1627f181",
|
|
"value": "Systems recovery - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Drafting and establishing procedures; technical knowledge",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "d4d3b38f-c565-4cc2-a0fc-c3b2ed47d907",
|
|
"value": "Protecting the constituency - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Drafting and establishing procedures; technical knowledge",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "a337c6cc-e40c-49f0-90ba-24847e117e5c",
|
|
"value": "Protecting the constituency - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Drafting and establishing procedures; technical knowledge",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "657ed783-8e11-436d-9d8b-8b2de2402fbc",
|
|
"value": "Protecting the constituency - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Drafting and establishing procedures; technical knowledge",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "44f80a62-8260-4058-b38a-5dda7365744c",
|
|
"value": "Protecting the constituency - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Technical skills pertaining to system administration, network administration, technical support or intrusion detection",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "27318b65-8667-4ca9-81fd-37d456200e57",
|
|
"value": "Preventing and containing IT incidents from a technical point of view - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Technical skills pertaining to system administration, network administration, technical support or intrusion detection",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "69fc2283-3868-4c7e-9f36-4f4025624b7a",
|
|
"value": "Preventing and containing IT incidents from a technical point of view - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Technical skills pertaining to system administration, network administration, technical support or intrusion detection",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "028ca72f-eb90-4083-8d8a-40d20d775ff7",
|
|
"value": "Preventing and containing IT incidents from a technical point of view - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Technical skills pertaining to system administration, network administration, technical support or intrusion detection",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "5aecf4bd-2b97-424a-b611-0d2b6bd5d96a",
|
|
"value": "Preventing and containing IT incidents from a technical point of view - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "91a37fef-e3d4-4eef-9f12-0a88cb65581c",
|
|
"value": "Analysis and interpretation of collected evidence - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "49cff69a-5bfc-4fcc-8dac-dcf59f02d5c0",
|
|
"value": "Analysis and interpretation of collected evidence - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "e4899567-185e-422b-8e59-1152cf5d26aa",
|
|
"value": "Analysis and interpretation of collected evidence - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "e38eee95-a2ab-4c61-bd73-0636a6146170",
|
|
"value": "Analysis and interpretation of collected evidence - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "ca5c5713-032e-4e68-9119-092c5d668365",
|
|
"value": "Analysis and interpretation of collected evidence - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "87c10286-ebdf-438f-a069-f7c95f1ccbd7",
|
|
"value": "Analysis and interpretation of collected evidence - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "e3a6f578-96f0-47af-b08f-724a57a63aae",
|
|
"value": "Analysis and interpretation of collected evidence - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "94c73cd1-2365-4270-9ee6-659525149405",
|
|
"value": "Analysis and interpretation of collected evidence - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "437ee3ac-3fe9-4d6f-a88f-c809c035b86b",
|
|
"value": "Analysis and interpretation of collected evidence - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "3ed0b2f7-3021-4454-9199-6c061d5de922",
|
|
"value": "Analysis and interpretation of collected evidence - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "d85e900e-2bcf-4305-aaef-b362ac61e101",
|
|
"value": "Analysis and interpretation of collected evidence - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Criminalistics, digital forensics, admissible evidence",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "90c12824-a4dc-4282-a26c-edcd8c3bfc4f",
|
|
"value": "Analysis and interpretation of collected evidence - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "41376c5a-b7b1-4441-9e1e-cb5ce1e1a9b0",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "c38aa097-40ef-47fd-ba79-f403cb0eec5f",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "b8641236-8582-4bd8-8c99-2f8cd2bea74f",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "a1a09ff7-eb19-4f57-844a-cf9ce89498d0",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "e5847af6-ebdd-4b72-a509-f55de749d56a",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "0c41efc8-c326-4e80-b24c-4156cdd1fc09",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "79c7f396-4949-47ed-aff5-c4704d230e58",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Testimonies in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "d2654db2-e882-4525-be19-754f49ea1f3d",
|
|
"value": "Requesting testimonies from CSIRTs and LE - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "497c3b2a-6277-4e82-9460-17576d252daa",
|
|
"value": "Admitting and assessing the evidence - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "7f139862-ff17-4f18-af0c-340cc9bc1563",
|
|
"value": "Admitting and assessing the evidence - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "65fe735e-771d-47ef-a38e-e724dfdb28f8",
|
|
"value": "Admitting and assessing the evidence - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "8f2bbd47-bec3-45df-9698-39a1b94d9535",
|
|
"value": "Admitting and assessing the evidence - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "90137086-de2c-4aab-9512-29cc78f12e66",
|
|
"value": "Admitting and assessing the evidence - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "9b58b333-584d-4a50-a9a0-5b0aac194995",
|
|
"value": "Admitting and assessing the evidence - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "f019f15e-f7e1-46a6-a48e-55998f4ff956",
|
|
"value": "Admitting and assessing the evidence - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Evidence in a criminal trial",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "ecc643e3-5d69-4687-a641-f7790789c031",
|
|
"value": "Admitting and assessing the evidence - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Technical knowledge and knowledge of the legal framework",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "11f97b62-13a5-4491-ba56-0ac8fea7e592",
|
|
"value": "Judging who committed a crime - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Technical knowledge and knowledge of the legal framework",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "59b824e1-7ff1-4835-98e1-8c510ccc8b85",
|
|
"value": "Judging who committed a crime - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Technical knowledge and knowledge of the legal framework",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "7141587b-f580-4283-ac51-d5296d38dc10",
|
|
"value": "Judging who committed a crime - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Technical knowledge and knowledge of the legal framework",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "1980c76f-a657-4a2e-b3ae-579b9cee9795",
|
|
"value": "Judging who committed a crime - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "058d25e4-6cf4-4855-97e5-359a631a683d",
|
|
"value": "Assessing incident damage and cost - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "f6a4f5b4-20d7-4b07-9a59-1488390afc43",
|
|
"value": "Assessing incident damage and cost - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "41acb7ad-0d35-414b-b69c-6828e6a61962",
|
|
"value": "Assessing incident damage and cost - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "6b247f52-85ec-4cf3-9165-7f3f5d259fe6",
|
|
"value": "Assessing incident damage and cost - CSIRT - [S]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "c05d9264-08d9-468b-be2e-e3b79036b7b9",
|
|
"value": "Assessing incident damage and cost - LEA - [R]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "124763b3-592d-4662-8dda-230b9f7e5ab9",
|
|
"value": "Assessing incident damage and cost - LEA - [C]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "4e76f9f4-3165-45bc-88a3-a9f6b7f00f98",
|
|
"value": "Assessing incident damage and cost - LEA - [I]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:LEA"
|
|
]
|
|
},
|
|
"uuid": "ecc5f293-13d3-487b-a580-bbabbcf889a1",
|
|
"value": "Assessing incident damage and cost - LEA - [S]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "a71b7577-17f7-4e38-a6a0-2c6028baf739",
|
|
"value": "Assessing incident damage and cost - Judiciary - [R]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "1ee5efd5-ba69-43e3-aaab-6a7fca656cdd",
|
|
"value": "Assessing incident damage and cost - Judiciary - [C]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "294e5877-f6ad-4ebc-b28f-bd105e63d0b2",
|
|
"value": "Assessing incident damage and cost - Judiciary - [I]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Judiciary"
|
|
]
|
|
},
|
|
"uuid": "0027e0fb-0342-4c0c-af5b-3468213d414e",
|
|
"value": "Assessing incident damage and cost - Judiciary - [S]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "9cab3d89-b906-44af-9d17-74e82e1734aa",
|
|
"value": "Assessing incident damage and cost - Prosecutors - [R]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "1ff18020-ea35-4191-a24d-14a82b7e4d07",
|
|
"value": "Assessing incident damage and cost - Prosecutors - [C]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "08abb5f4-561f-48ad-9902-a7dbf5b0413c",
|
|
"value": "Assessing incident damage and cost - Prosecutors - [I]"
|
|
},
|
|
{
|
|
"description": "Evaluation skills",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:Prosecutors"
|
|
]
|
|
},
|
|
"uuid": "fd0e8d2d-4635-4837-8c53-551dc2b46e48",
|
|
"value": "Assessing incident damage and cost - Prosecutors - [S]"
|
|
},
|
|
{
|
|
"description": "Knowledge how to draft an incident response and procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "ee5780be-fc4f-43bd-a066-38d442ffeda9",
|
|
"value": "Reviewing the response and update policies and procedures - CSIRT - [R]"
|
|
},
|
|
{
|
|
"description": "Knowledge how to draft an incident response and procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "a1cc67b3-46f2-4b55-90b8-b301d0071971",
|
|
"value": "Reviewing the response and update policies and procedures - CSIRT - [C]"
|
|
},
|
|
{
|
|
"description": "Knowledge how to draft an incident response and procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "f41444cb-d57f-4e2f-a44c-06de1fe4f734",
|
|
"value": "Reviewing the response and update policies and procedures - CSIRT - [I]"
|
|
},
|
|
{
|
|
"description": "Knowledge how to draft an incident response and procedures",
|
|
"meta": {
|
|
"kill_chain": [
|
|
"post-incident-crime:CSIRT"
|
|
]
|
|
},
|
|
"uuid": "f63252c8-fd24-4703-ba57-3bca3c5c6299",
|
|
"value": "Reviewing the response and update policies and procedures - CSIRT - [S]"
|
|
}
|
|
],
|
|
"version": 1
|
|
}
|