DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8.json

40 lines
1.8 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
2024-11-22 13:37:54 -05:00
"id": "bundle--6861e741-3628-45ea-9c28-246d0e740409",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-03 19:59:09 -04:00
"id": "attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
2024-11-22 13:37:54 -05:00
"created": "2024-11-22T16:43:58.191586Z",
"modified": "2024-11-22T16:43:58.191586Z",
"name": "Use Pseudonyms",
"description": "An operation may use pseudonyms, or fake names, to mask the identity of operational accounts, channels, pages etc., publish anonymous content, or otherwise use falsified personas to conceal the identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account, channel, or page with the same falsified name.",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
2022-06-30 23:30:18 -04:00
"phase_name": "persist-in-the-information-environment"
2022-02-20 15:37:38 -05:00
}
],
"external_references": [
{
2022-07-03 19:59:09 -04:00
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0128.001.md",
"external_id": "T0128.001"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-03 19:59:09 -04:00
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": true,
2022-02-20 15:37:38 -05:00
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
2022-07-03 19:59:09 -04:00
"x_mitre_version": "2.1"
2022-02-20 15:37:38 -05:00
}
]
}