DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7.json

40 lines
2.4 KiB
JSON
Raw Normal View History

2022-07-02 16:01:17 -04:00
{
"type": "bundle",
2024-08-02 13:33:25 -04:00
"id": "bundle--0c1ff1c4-0d4c-46c0-a14e-c59254dc9a83",
2022-07-02 16:01:17 -04:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-03 19:59:09 -04:00
"id": "attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
2024-08-02 13:33:25 -04:00
"created": "2024-08-02T17:12:32.377807Z",
"modified": "2024-08-02T17:12:32.377807Z",
2022-07-02 16:01:17 -04:00
"name": "Create Bot Accounts",
"description": "Bots refer to autonomous internet users that interact with systems or other users while imitating traditional human behaviour. Bots use a variety of tools to stay active without direct human operation, including artificial intelligence and big data analytics. For example, an individual may programme a Twitter bot to retweet a tweet every time it contains a certain keyword or hashtag. An influence operation may use bots to increase its exposure and artificially promote its content across the internet without dedicating additional time or human resources. Amplifier bots promote operation content through reposts, shares, and likes to increase the content\u2019s online popularity. Hacker bots are traditionally covert bots running on computer scripts that rarely engage with users and work primarily as agents of larger cyberattacks, such as a Distributed Denial of Service attacks. Spammer bots are programmed to post content on social media or in comment sections, usually as a supplementary tool. Impersonator bots102 pose as real people by mimicking human behaviour, complicating their detection.",
2022-07-02 16:01:17 -04:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
2024-08-02 13:33:25 -04:00
"phase_name": "establish-assets"
2022-07-02 16:01:17 -04:00
}
],
"external_references": [
{
2022-07-03 19:59:09 -04:00
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0090.003.md",
2022-07-02 16:01:17 -04:00
"external_id": "T0090.003"
}
],
"object_marking_refs": [
2022-07-03 19:59:09 -04:00
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
2022-07-02 16:01:17 -04:00
],
"x_mitre_is_subtechnique": true,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
2022-07-03 19:59:09 -04:00
"x_mitre_version": "2.1"
2022-07-02 16:01:17 -04:00
}
]
}