DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7.json

40 lines
1.9 KiB
JSON
Raw Normal View History

2022-07-02 16:01:17 -04:00
{
"type": "bundle",
2022-07-03 19:59:09 -04:00
"id": "bundle--6164b13a-f54c-4053-b88a-2dde05af19a8",
2022-07-02 16:01:17 -04:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-03 19:59:09 -04:00
"id": "attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2022-07-03T23:52:02.902247Z",
"modified": "2022-07-03T23:52:02.902247Z",
2022-07-02 16:01:17 -04:00
"name": "Demand insurmountable proof",
"description": "Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the \"firehose of misinformation\". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of \"questions\" while the truth teller is burdened with higher and higher standards of proof.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "develop-narratives"
}
],
"external_references": [
{
2022-07-03 19:59:09 -04:00
"source_name": "mitre-attack",
2022-07-02 16:01:17 -04:00
"url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0040.md",
"external_id": "T0040"
}
],
"object_marking_refs": [
2022-07-03 19:59:09 -04:00
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
2022-07-02 16:01:17 -04:00
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
2022-07-03 19:59:09 -04:00
"x_mitre_version": "2.1"
2022-07-02 16:01:17 -04:00
}
]
}