-
Notifications
You must be signed in to change notification settings - Fork 4
/
engage_activity.json
1 lines (1 loc) · 5.46 KB
/
engage_activity.json
1
[{"_key":"engage_activity_00000","_id":"engage_activity/engage_activity_00000","_rev":"_dVfN7Wu---","original_id":"EAC0001","name":"API Monitoring","datatype":"engage_activity"},{"_key":"engage_activity_00001","_id":"engage_activity/engage_activity_00001","_rev":"_dVfN7Wu--_","original_id":"EAC0002","name":"Network Monitoring","datatype":"engage_activity"},{"_key":"engage_activity_00002","_id":"engage_activity/engage_activity_00002","_rev":"_dVfN7Wu--A","original_id":"EAC0003","name":"System Activity Monitoring","datatype":"engage_activity"},{"_key":"engage_activity_00003","_id":"engage_activity/engage_activity_00003","_rev":"_dVfN7Wu--B","original_id":"EAC0004","name":"Network Analysis","datatype":"engage_activity"},{"_key":"engage_activity_00004","_id":"engage_activity/engage_activity_00004","_rev":"_dVfN7Wu--C","original_id":"EAC0005","name":"Decoy Artifacts and Systems","datatype":"engage_activity"},{"_key":"engage_activity_00005","_id":"engage_activity/engage_activity_00005","_rev":"_dVfN7Wu--D","original_id":"EAC0006","name":"Application Diversity","datatype":"engage_activity"},{"_key":"engage_activity_00006","_id":"engage_activity/engage_activity_00006","_rev":"_dVfN7Wu--E","original_id":"EAC0007","name":"Network Diversity","datatype":"engage_activity"},{"_key":"engage_activity_00007","_id":"engage_activity/engage_activity_00007","_rev":"_dVfN7Wu--F","original_id":"EAC0008","name":"Burn-In","datatype":"engage_activity"},{"_key":"engage_activity_00008","_id":"engage_activity/engage_activity_00008","_rev":"_dVfN7Wu--G","original_id":"EAC0009","name":"Email Manipulation","datatype":"engage_activity"},{"_key":"engage_activity_00009","_id":"engage_activity/engage_activity_00009","_rev":"_dVfN7Wu--H","original_id":"EAC0010","name":"Peripheral Management","datatype":"engage_activity"},{"_key":"engage_activity_00010","_id":"engage_activity/engage_activity_00010","_rev":"_dVfN7Wu--I","original_id":"EAC0011","name":"Pocket Litter","datatype":"engage_activity"},{"_key":"engage_activity_00011","_id":"engage_activity/engage_activity_00011","_rev":"_dVfN7Wu--J","original_id":"EAC0012","name":"Personas","datatype":"engage_activity"},{"_key":"engage_activity_00012","_id":"engage_activity/engage_activity_00012","_rev":"_dVfN7Wu--K","original_id":"EAC0013","name":"Detonate Malware","datatype":"engage_activity"},{"_key":"engage_activity_00013","_id":"engage_activity/engage_activity_00013","_rev":"_dVfN7Wu--L","original_id":"EAC0014","name":"Software Manipulation","datatype":"engage_activity"},{"_key":"engage_activity_00014","_id":"engage_activity/engage_activity_00014","_rev":"_dVfN7Wu--M","original_id":"EAC0015","name":"Information Manipulation","datatype":"engage_activity"},{"_key":"engage_activity_00015","_id":"engage_activity/engage_activity_00015","_rev":"_dVfN7Wu--N","original_id":"EAC0016","name":"Network Manipulation","datatype":"engage_activity"},{"_key":"engage_activity_00016","_id":"engage_activity/engage_activity_00016","_rev":"_dVfN7Wu--O","original_id":"EAC0017","name":"Hardware Manipulation","datatype":"engage_activity"},{"_key":"engage_activity_00017","_id":"engage_activity/engage_activity_00017","_rev":"_dVfN7Wu--P","original_id":"EAC0018","name":"Security Controls","datatype":"engage_activity"},{"_key":"engage_activity_00018","_id":"engage_activity/engage_activity_00018","_rev":"_dVfN7Wu--Q","original_id":"EAC0019","name":"Baseline","datatype":"engage_activity"},{"_key":"engage_activity_00019","_id":"engage_activity/engage_activity_00019","_rev":"_dVfN7Wu--R","original_id":"EAC0020","name":"Isolation","datatype":"engage_activity"},{"_key":"engage_activity_00020","_id":"engage_activity/engage_activity_00020","_rev":"_dVfN7Wu--S","original_id":"EAC0021","name":"Migrate Attack Vector","datatype":"engage_activity"},{"_key":"engage_activity_00021","_id":"engage_activity/engage_activity_00021","_rev":"_dVfN7Wu--T","original_id":"EAC0022","name":"Artifact Diversity","datatype":"engage_activity"},{"_key":"engage_activity_00022","_id":"engage_activity/engage_activity_00022","_rev":"_dVfN7Wu--U","original_id":"SAC0001","name":"Strategic Goal","datatype":"engage_activity"},{"_key":"engage_activity_00023","_id":"engage_activity/engage_activity_00023","_rev":"_dVfN7Wu--V","original_id":"SAC0002","name":"Persona Creation","datatype":"engage_activity"},{"_key":"engage_activity_00024","_id":"engage_activity/engage_activity_00024","_rev":"_dVfN7Wu--W","original_id":"SAC0003","name":"Storyboarding","datatype":"engage_activity"},{"_key":"engage_activity_00025","_id":"engage_activity/engage_activity_00025","_rev":"_dVfN7Wu--X","original_id":"SAC0004","name":"Develop Threat Model","datatype":"engage_activity"},{"_key":"engage_activity_00026","_id":"engage_activity/engage_activity_00026","_rev":"_dVfN7Wu--Y","original_id":"SAC0005","name":"Define Exit Criteria","datatype":"engage_activity"},{"_key":"engage_activity_00027","_id":"engage_activity/engage_activity_00027","_rev":"_dVfN7Wu--Z","original_id":"SAC0006","name":"Hotwash","datatype":"engage_activity"},{"_key":"engage_activity_00028","_id":"engage_activity/engage_activity_00028","_rev":"_dVfN7Wu--a","original_id":"SAC0007","name":"Refine Operation Activities","datatype":"engage_activity"},{"_key":"engage_activity_00029","_id":"engage_activity/engage_activity_00029","_rev":"_dVfN7Wu--b","original_id":"SAC0008","name":"Distill Intelligence","datatype":"engage_activity"},{"_key":"engage_activity_00030","_id":"engage_activity/engage_activity_00030","_rev":"_dVfN7Wu--c","original_id":"SAC0009","name":"Inform Threat Model","datatype":"engage_activity"}]