DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4.json

40 lines
2.7 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
2024-08-02 13:33:25 -04:00
"id": "bundle--1f3237eb-94c9-4daa-a4bf-2ff797e9b2bc",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-03 19:59:09 -04:00
"id": "attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
2024-08-02 13:33:25 -04:00
"created": "2024-08-02T17:12:32.383296Z",
"modified": "2024-08-02T17:12:32.383296Z",
"name": "Present Persona",
"description": "This Technique contains different types of personas commonly taken on by threat actors during influence operations.<br><br>Analysts should use T0097\u2019s sub-techniques to document the type of persona which an account is presenting. For example, an account which describes itself as being a journalist can be tagged with T0097.102: Journalist Persona.<br><br>Personas presented by individuals include:<br><br>T0097.100: Individual Persona<br>T0097.101: Local Persona<br>T0097.102: Journalist Persona<br>T0097.103: Activist Persona<br>T0097.104: Hacktivist Persona<br>T0097.105: Military Personnel Persona<br>T0097.106: Recruiter Persona<br>T0097.107: Researcher Persona<br>T0097.108: Expert Persona<br>T0097.109: Romantic Suitor Persona<br>T0097.110: Party Official Persona<br>T0097.111: Government Official Persona<br>T0097.112: Government Employee Persona<br><br>This Technique also houses institutional personas commonly taken on by threat actors:<br><br>T0097.200: Institutional Persona<br>T0097.201: Local Institution Persona<br>T0097.202: News Outlet Persona<br>T0097.203: Fact Checking Organisation Persona<br>T0097.204: Think Tank Persona<br>T0097.205: Business Persona<br>T0097.206: Government Institution Persona<br>T0097.207: NGO Persona<br>T0097.208: Social Cause Persona<br><br>By using a persona, a threat actor is adding the perceived legitimacy of the persona to their narratives and activities.",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
2022-06-30 23:30:18 -04:00
"phase_name": "establish-legitimacy"
2022-02-20 15:37:38 -05:00
}
],
"external_references": [
{
2022-07-03 19:59:09 -04:00
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0097.md",
2022-06-30 23:30:18 -04:00
"external_id": "T0097"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-03 19:59:09 -04:00
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
2022-07-03 19:59:09 -04:00
"x_mitre_version": "2.1"
2022-02-20 15:37:38 -05:00
}
]
}