DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ff319f77-3085-4eb5-8925-89103daab804.json

40 lines
2.2 KiB
JSON
Raw Normal View History

2022-07-02 16:01:17 -04:00
{
"type": "bundle",
"id": "bundle--99a8e2f5-888a-49f4-a897-eff43aacb31b",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--ff319f77-3085-4eb5-8925-89103daab804",
"created_by_ref": "identity--4f80a6b6-2893-46ec-a55c-0f62ea9db2ae",
"created": "2022-07-02T19:59:12.628154Z",
"modified": "2022-07-02T19:59:12.628154Z",
"name": "Bait legitimate influencers",
"description": "Credibility in a social media environment is often a function of the size of a user's network. \"Influencers\" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "conduct-pump-priming"
}
],
"external_references": [
{
"source_name": "DISARM",
"url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0039 .md",
"external_id": "T0039"
}
],
"object_marking_refs": [
"marking-definition--8983ccd4-a112-4e43-b633-1e7f4c99303a"
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "1.0"
}
]
}