| Purchase Technical Data - T1597.002 (0a241b6c-7bb2-48f9-98f7-128145b4d27f) |
Attack Pattern |
Detection of Purchase Technical Data - DET0880 (4d41c48b-ef2a-49a1-baaa-039625612c20) |
Detection Strategies |
1 |
| Analytic 2012 - AN2012 (40c8a3ac-4fe9-49c3-a9bd-f8f684d42003) |
Analytics |
Detection of Purchase Technical Data - DET0880 (4d41c48b-ef2a-49a1-baaa-039625612c20) |
Detection Strategies |
1 |
| Purchase Technical Data - T1597.002 (0a241b6c-7bb2-48f9-98f7-128145b4d27f) |
Attack Pattern |
Search Closed Sources - T1597 (a51eb150-93b1-484b-a503-e51453b127a4) |
Attack Pattern |
2 |