DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9.json

40 lines
1.6 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
"id": "bundle--ce822db7-2c37-44b2-bb15-40bfcf69c926",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-03 19:59:09 -04:00
"id": "attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2023-09-28T21:25:13.274372Z",
"modified": "2023-09-28T21:25:13.274372Z",
2022-06-30 23:30:18 -04:00
"name": "Control Information Environment through Offensive Cyberspace Operations",
"description": "Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritise operation messaging or block opposition messaging.",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
2022-06-30 23:30:18 -04:00
"phase_name": "drive-online-harms"
2022-02-20 15:37:38 -05:00
}
],
"external_references": [
{
2022-07-03 19:59:09 -04:00
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0123.md",
2022-06-30 23:30:18 -04:00
"external_id": "T0123"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-03 19:59:09 -04:00
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
2022-07-03 19:59:09 -04:00
"x_mitre_version": "2.1"
2022-02-20 15:37:38 -05:00
}
]
}