DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3b04c334-059e-4983-80c7-c602062352c4.json

40 lines
1.8 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
2022-07-02 16:01:17 -04:00
"id": "bundle--3c7b8aca-8582-494b-bf85-139532812598",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-02 16:01:17 -04:00
"id": "attack-pattern--3b04c334-059e-4983-80c7-c602062352c4",
"created_by_ref": "identity--e0347ed6-f4bb-4b16-a157-f49e981f4938",
"created": "2022-07-02T19:59:12.664285Z",
"modified": "2022-07-02T19:59:12.664285Z",
"name": "Utilize Butterfly Attacks",
2022-07-02 16:01:17 -04:00
"description": "Butterfly attacks occur when operators pretend to be members of a certain social group, usually a group that struggles for representation. An influence operation may mimic a group to insert controversial statements into the discourse, encourage the spread of operation content, or promote harassment among group members. Unlike astroturfing, butterfly attacks aim to infiltrate and discredit existing grassroots movements, organizations, and media campaigns. ",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
2022-06-30 23:30:18 -04:00
"phase_name": "establish-social-assets"
2022-02-20 15:37:38 -05:00
}
],
"external_references": [
{
"source_name": "DISARM",
"url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0094.002.md",
"external_id": "T0094.002"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-02 16:01:17 -04:00
"marking-definition--20b472eb-f674-4e4a-9785-2c8ca7479801"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": true,
2022-02-20 15:37:38 -05:00
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "1.0"
2022-02-20 15:37:38 -05:00
}
]
}