DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803.json

40 lines
1.8 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
2024-11-22 13:37:54 -05:00
"id": "bundle--d75f5597-857c-45f1-ba97-9fc2a49f2b4d",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-03 19:59:09 -04:00
"id": "attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
2024-11-22 13:37:54 -05:00
"created": "2024-11-22T16:43:58.19525Z",
"modified": "2024-11-22T16:43:58.19525Z",
"name": "Launder Information Assets",
"description": "Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution.",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
2022-06-30 23:30:18 -04:00
"phase_name": "persist-in-the-information-environment"
2022-02-20 15:37:38 -05:00
}
],
"external_references": [
{
2022-07-03 19:59:09 -04:00
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0128.004.md",
"external_id": "T0128.004"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-03 19:59:09 -04:00
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": true,
2022-02-20 15:37:38 -05:00
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
2022-07-03 19:59:09 -04:00
"x_mitre_version": "2.1"
2022-02-20 15:37:38 -05:00
}
]
}