diff --git a/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx b/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx index 3b2566b..2c27e22 100644 Binary files a/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx and b/DISARM_MASTER_DATA/DISARM_FRAMEWORKS_MASTER.xlsx differ diff --git a/generated_files/DISARM_STIX/DISARM.json b/generated_files/DISARM_STIX/DISARM.json index 3c096ca..d998efe 100644 --- a/generated_files/DISARM_STIX/DISARM.json +++ b/generated_files/DISARM_STIX/DISARM.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--98213c88-03c5-42eb-9784-d7c9af871a35", + "id": "bundle--486294b6-e408-4545-9841-b0e4db48c3fe", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--b03163eb-7e81-4fed-9819-641bf7c99507", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.52801Z", - "modified": "2023-09-25T16:17:56.52801Z", + "created": "2023-09-28T21:25:13.179932Z", + "modified": "2023-09-28T21:25:13.179932Z", "name": "Plan Strategy", "description": "Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives.", "external_references": [ @@ -28,8 +28,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--431af018-56ae-406c-9648-4857f074fffc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.529781Z", - "modified": "2023-09-25T16:17:56.529781Z", + "created": "2023-09-28T21:25:13.180855Z", + "modified": "2023-09-28T21:25:13.180855Z", "name": "Plan Objectives", "description": "Set clearly defined, measurable, and achievable objectives. In some cases achieving objectives ties execution of tactical tasks to reaching the desired strategic end state. In other cases, where there is no clearly defined strategic end state, the tactical objective may stand on its own. The objective statement should not specify the way and means of accomplishment but rather the goal the threat actor wishes to achieve. ", "external_references": [ @@ -49,8 +49,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--acaf8903-418f-425a-93dc-8e1bfb626876", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.530818Z", - "modified": "2023-09-25T16:17:56.530818Z", + "created": "2023-09-28T21:25:13.18167Z", + "modified": "2023-09-28T21:25:13.18167Z", "name": "Microtarget", "description": "Target very specific populations of people", "external_references": [ @@ -70,8 +70,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--82039146-59a3-4353-b328-a422da34db6b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.53159Z", - "modified": "2023-09-25T16:17:56.53159Z", + "created": "2023-09-28T21:25:13.182374Z", + "modified": "2023-09-28T21:25:13.182374Z", "name": "Develop Content", "description": "Create or acquire text, images, and other content", "external_references": [ @@ -91,8 +91,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.53204Z", - "modified": "2023-09-25T16:17:56.53204Z", + "created": "2023-09-28T21:25:13.182957Z", + "modified": "2023-09-28T21:25:13.182957Z", "name": "Select Channels and Affordances", "description": "Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximise an influence operation\u2019s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content.", "external_references": [ @@ -112,8 +112,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.532301Z", - "modified": "2023-09-25T16:17:56.532301Z", + "created": "2023-09-28T21:25:13.183576Z", + "modified": "2023-09-28T21:25:13.183576Z", "name": "Conduct Pump Priming", "description": "Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing.", "external_references": [ @@ -133,8 +133,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.532627Z", - "modified": "2023-09-25T16:17:56.532627Z", + "created": "2023-09-28T21:25:13.184288Z", + "modified": "2023-09-28T21:25:13.184288Z", "name": "Deliver Content", "description": "Release content to general public or larger population", "external_references": [ @@ -154,8 +154,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.53302Z", - "modified": "2023-09-25T16:17:56.53302Z", + "created": "2023-09-28T21:25:13.185109Z", + "modified": "2023-09-28T21:25:13.185109Z", "name": "Drive Offline Activity", "description": "Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline.", "external_references": [ @@ -175,8 +175,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.533364Z", - "modified": "2023-09-25T16:17:56.533364Z", + "created": "2023-09-28T21:25:13.186189Z", + "modified": "2023-09-28T21:25:13.186189Z", "name": "Persist in the Information Environment", "description": "Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign.", "external_references": [ @@ -196,8 +196,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--19886784-0e07-474f-803c-30c443e65347", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.534109Z", - "modified": "2023-09-25T16:17:56.534109Z", + "created": "2023-09-28T21:25:13.186695Z", + "modified": "2023-09-28T21:25:13.186695Z", "name": "Assess Effectiveness", "description": "Assess effectiveness of action, for use in future plans", "external_references": [ @@ -217,8 +217,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--1e005da9-56cc-4802-af90-b267d17a1ad1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.534552Z", - "modified": "2023-09-25T16:17:56.534552Z", + "created": "2023-09-28T21:25:13.187205Z", + "modified": "2023-09-28T21:25:13.187205Z", "name": "Target Audience Analysis", "description": "Identifying and analysing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analysing target audience members allows influence operations to tailor operation strategy and content to their analysis.", "external_references": [ @@ -238,8 +238,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--fd1e7dd3-63d0-4040-808e-3e61b9ddca86", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.535079Z", - "modified": "2023-09-25T16:17:56.535079Z", + "created": "2023-09-28T21:25:13.187521Z", + "modified": "2023-09-28T21:25:13.187521Z", "name": "Develop Narratives", "description": "The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a \"\"whole of society\"\" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives centre more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline.", "external_references": [ @@ -259,8 +259,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--c4eaa2a6-7e86-4eb3-beaa-981a96d4724a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.535352Z", - "modified": "2023-09-25T16:17:56.535352Z", + "created": "2023-09-28T21:25:13.187698Z", + "modified": "2023-09-28T21:25:13.187698Z", "name": "Establish Social Assets", "description": "Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organisations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.", "external_references": [ @@ -280,8 +280,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--8f32bafc-edb2-4d3c-9b7e-e42a9147123b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.535646Z", - "modified": "2023-09-25T16:17:56.535646Z", + "created": "2023-09-28T21:25:13.187908Z", + "modified": "2023-09-28T21:25:13.187908Z", "name": "Establish Legitimacy", "description": "Establish assets that create trust", "external_references": [ @@ -299,10 +299,10 @@ { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--963a9c59-5e4d-433b-9fbe-485d3ceb0ce0", + "id": "x-mitre-tactic--9e114812-fcc3-4b44-b259-18a32d7babbc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.535918Z", - "modified": "2023-09-25T16:17:56.535918Z", + "created": "2023-09-28T21:25:13.188363Z", + "modified": "2023-09-28T21:25:13.188363Z", "name": "Maximise Exposure", "description": "Maximise exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting.", "external_references": [ @@ -322,8 +322,8 @@ "spec_version": "2.1", "id": "x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.536229Z", - "modified": "2023-09-25T16:17:56.536229Z", + "created": "2023-09-28T21:25:13.188786Z", + "modified": "2023-09-28T21:25:13.188786Z", "name": "Drive Online Harms", "description": "Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations.", "external_references": [ @@ -343,8 +343,8 @@ "spec_version": "2.1", "id": "attack-pattern--70717452-f7e3-4ce8-956f-39a4d34c5cfb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.538776Z", - "modified": "2023-09-25T16:17:56.538776Z", + "created": "2023-09-28T21:25:13.190139Z", + "modified": "2023-09-28T21:25:13.190139Z", "name": "Facilitate State Propaganda", "description": "Organise citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda.", "kill_chain_phases": [ @@ -376,8 +376,8 @@ "spec_version": "2.1", "id": "attack-pattern--9cf02828-bd4c-4b04-a9f0-bb67ec3b0493", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.541562Z", - "modified": "2023-09-25T16:17:56.541562Z", + "created": "2023-09-28T21:25:13.19059Z", + "modified": "2023-09-28T21:25:13.19059Z", "name": "Leverage Existing Narratives", "description": "Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices.", "kill_chain_phases": [ @@ -409,8 +409,8 @@ "spec_version": "2.1", "id": "attack-pattern--75a5c211-2590-498c-ad3a-129c912d5cd2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.542172Z", - "modified": "2023-09-25T16:17:56.542172Z", + "created": "2023-09-28T21:25:13.191114Z", + "modified": "2023-09-28T21:25:13.191114Z", "name": "Develop Competing Narratives", "description": "Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centred on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the \"firehose of misinformation\" approach.", "kill_chain_phases": [ @@ -442,8 +442,8 @@ "spec_version": "2.1", "id": "attack-pattern--d1ad0738-1f52-4fab-b0d1-640b551d7f6a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.542561Z", - "modified": "2023-09-25T16:17:56.542561Z", + "created": "2023-09-28T21:25:13.191652Z", + "modified": "2023-09-28T21:25:13.191652Z", "name": "Create Inauthentic Social Media Pages and Groups", "description": "Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are.", "kill_chain_phases": [ @@ -475,8 +475,8 @@ "spec_version": "2.1", "id": "attack-pattern--7981d39a-01be-46f6-b9f9-507d0c03e919", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.542946Z", - "modified": "2023-09-25T16:17:56.542946Z", + "created": "2023-09-28T21:25:13.192169Z", + "modified": "2023-09-28T21:25:13.192169Z", "name": "Create Fake Experts", "description": "Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself.", "kill_chain_phases": [ @@ -508,8 +508,8 @@ "spec_version": "2.1", "id": "attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.543475Z", - "modified": "2023-09-25T16:17:56.543475Z", + "created": "2023-09-28T21:25:13.192717Z", + "modified": "2023-09-28T21:25:13.192717Z", "name": "Utilise Academic/Pseudoscientific Justifications", "description": "Utilise Academic/Pseudoscientific Justifications", "kill_chain_phases": [ @@ -541,8 +541,8 @@ "spec_version": "2.1", "id": "attack-pattern--bacbdfd3-f8c2-4126-a9f3-1b75576fa5e7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.544349Z", - "modified": "2023-09-25T16:17:56.544349Z", + "created": "2023-09-28T21:25:13.193213Z", + "modified": "2023-09-28T21:25:13.193213Z", "name": "Cultivate Ignorant Agents", "description": "Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state\u2019s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as \"useful idiots\" or \"unwitting agents\".", "kill_chain_phases": [ @@ -574,8 +574,8 @@ "spec_version": "2.1", "id": "attack-pattern--4d86424a-26a1-4d9f-bc32-619620a18a8d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.545329Z", - "modified": "2023-09-25T16:17:56.545329Z", + "created": "2023-09-28T21:25:13.193793Z", + "modified": "2023-09-28T21:25:13.193793Z", "name": "Compromise Legitimate Accounts", "description": "Hack or take over legimate accounts to distribute misinformation or damaging content.", "kill_chain_phases": [ @@ -607,8 +607,8 @@ "spec_version": "2.1", "id": "attack-pattern--95e3e261-2f42-4ff0-a1f9-4eb2c5998284", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.546413Z", - "modified": "2023-09-25T16:17:56.546413Z", + "created": "2023-09-28T21:25:13.194292Z", + "modified": "2023-09-28T21:25:13.194292Z", "name": "Create Inauthentic Websites", "description": "Create media assets to support inauthentic organisations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations.", "kill_chain_phases": [ @@ -640,8 +640,8 @@ "spec_version": "2.1", "id": "attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.546873Z", - "modified": "2023-09-25T16:17:56.546873Z", + "created": "2023-09-28T21:25:13.195168Z", + "modified": "2023-09-28T21:25:13.195168Z", "name": "Prepare Fundraising Campaigns", "description": "Fundraising campaigns refer to an influence operation\u2019s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities.", "kill_chain_phases": [ @@ -673,8 +673,8 @@ "spec_version": "2.1", "id": "attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.547204Z", - "modified": "2023-09-25T16:17:56.547204Z", + "created": "2023-09-28T21:25:13.195475Z", + "modified": "2023-09-28T21:25:13.195475Z", "name": "Raise Funds from Malign Actors", "description": "Raising funds from malign actors may include contributions from foreign agents, cutouts or proxies, shell companies, dark money groups, etc.", "kill_chain_phases": [ @@ -706,8 +706,8 @@ "spec_version": "2.1", "id": "attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.54761Z", - "modified": "2023-09-25T16:17:56.54761Z", + "created": "2023-09-28T21:25:13.195612Z", + "modified": "2023-09-28T21:25:13.195612Z", "name": "Raise Funds from Ignorant Agents", "description": "Raising funds from ignorant agents may include scams, donations intended for one stated purpose but then used for another, etc.", "kill_chain_phases": [ @@ -739,8 +739,8 @@ "spec_version": "2.1", "id": "attack-pattern--e0acfceb-4541-438f-ba33-734f9a666c7d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.548057Z", - "modified": "2023-09-25T16:17:56.548057Z", + "created": "2023-09-28T21:25:13.195756Z", + "modified": "2023-09-28T21:25:13.195756Z", "name": "Create Hashtags and Search Artefacts", "description": "Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only \"real\" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicise the story more widely through trending lists and search behaviour. Asset needed to direct/control/manage \"conversation\" connected to launching new incident/campaign with new hashtag for applicable social media sites).", "kill_chain_phases": [ @@ -772,8 +772,8 @@ "spec_version": "2.1", "id": "attack-pattern--34cda40c-8d27-48a0-b27c-c953b75c453d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.548384Z", - "modified": "2023-09-25T16:17:56.548384Z", + "created": "2023-09-28T21:25:13.195892Z", + "modified": "2023-09-28T21:25:13.195892Z", "name": "Create Clickbait", "description": "Create attention grabbing headlines (outrage, doubt, humour) required to drive traffic & engagement. This is a key asset.", "kill_chain_phases": [ @@ -805,8 +805,8 @@ "spec_version": "2.1", "id": "attack-pattern--61df6490-ca2c-41b7-a251-ded790a03a71", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.548742Z", - "modified": "2023-09-25T16:17:56.548742Z", + "created": "2023-09-28T21:25:13.196042Z", + "modified": "2023-09-28T21:25:13.196042Z", "name": "Conduct Fundraising", "description": "Fundraising campaigns refer to an influence operation\u2019s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities.", "kill_chain_phases": [ @@ -838,8 +838,8 @@ "spec_version": "2.1", "id": "attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.549167Z", - "modified": "2023-09-25T16:17:56.549167Z", + "created": "2023-09-28T21:25:13.19624Z", + "modified": "2023-09-28T21:25:13.19624Z", "name": "Conduct Crowdfunding Campaigns", "description": "An influence operation may Conduct Crowdfunding Campaigns on platforms such as GoFundMe, GiveSendGo, Tipeee, Patreon, etc.", "kill_chain_phases": [ @@ -871,8 +871,8 @@ "spec_version": "2.1", "id": "attack-pattern--eef34262-0822-4727-83f5-2e608babc396", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.549545Z", - "modified": "2023-09-25T16:17:56.549545Z", + "created": "2023-09-28T21:25:13.196666Z", + "modified": "2023-09-28T21:25:13.196666Z", "name": "Purchase Targeted Advertisements", "description": "Create or fund advertisements targeted at specific populations", "kill_chain_phases": [ @@ -904,8 +904,8 @@ "spec_version": "2.1", "id": "attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.549871Z", - "modified": "2023-09-25T16:17:56.549871Z", + "created": "2023-09-28T21:25:13.196968Z", + "modified": "2023-09-28T21:25:13.196968Z", "name": "Generate Information Pollution", "description": "Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. \"Nothing is true, but everything is possible.\" Akin to astroturfing campaign.", "kill_chain_phases": [ @@ -937,8 +937,8 @@ "spec_version": "2.1", "id": "attack-pattern--dd9f940d-3970-45b2-8549-12e321567657", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.550222Z", - "modified": "2023-09-25T16:17:56.550222Z", + "created": "2023-09-28T21:25:13.197411Z", + "modified": "2023-09-28T21:25:13.197411Z", "name": "Create Fake Research", "description": "Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx", "kill_chain_phases": [ @@ -970,8 +970,8 @@ "spec_version": "2.1", "id": "attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.550971Z", - "modified": "2023-09-25T16:17:56.550971Z", + "created": "2023-09-28T21:25:13.198072Z", + "modified": "2023-09-28T21:25:13.198072Z", "name": "Hijack Hashtags", "description": "Hashtag hijacking occurs when users \u201c[use] a trending hashtag to promote topics that are substantially different from its recent context\u201d (VanDam and Tan, 2016) or \u201cto promote one\u2019s own social media agenda\u201d (Darius and Stephany, 2019).", "kill_chain_phases": [ @@ -1003,8 +1003,8 @@ "spec_version": "2.1", "id": "attack-pattern--ea0d5988-af73-4b09-8040-7bb2fbadaa3c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.55143Z", - "modified": "2023-09-25T16:17:56.55143Z", + "created": "2023-09-28T21:25:13.198581Z", + "modified": "2023-09-28T21:25:13.198581Z", "name": "Trial Content", "description": "Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates", "kill_chain_phases": [ @@ -1036,8 +1036,8 @@ "spec_version": "2.1", "id": "attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.551796Z", - "modified": "2023-09-25T16:17:56.551796Z", + "created": "2023-09-28T21:25:13.199178Z", + "modified": "2023-09-28T21:25:13.199178Z", "name": "Leverage Conspiracy Theory Narratives", "description": "\"Conspiracy narratives\" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalised or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the \"firehose of falsehoods\" model.", "kill_chain_phases": [ @@ -1069,8 +1069,8 @@ "spec_version": "2.1", "id": "attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.552273Z", - "modified": "2023-09-25T16:17:56.552273Z", + "created": "2023-09-28T21:25:13.199668Z", + "modified": "2023-09-28T21:25:13.199668Z", "name": "Amplify Existing Conspiracy Theory Narratives", "description": "An influence operation may amplify an existing conspiracy theory narrative that aligns with its incident or campaign goals. By amplifying existing conspiracy theory narratives, operators can leverage the power of the existing communities that support and propagate those theories without needing to expend resources creating new narratives or building momentum and buy in around new narratives.", "kill_chain_phases": [ @@ -1102,8 +1102,8 @@ "spec_version": "2.1", "id": "attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.55313Z", - "modified": "2023-09-25T16:17:56.55313Z", + "created": "2023-09-28T21:25:13.200222Z", + "modified": "2023-09-28T21:25:13.200222Z", "name": "Develop Original Conspiracy Theory Narratives", "description": "While this requires more resources than amplifying existing conspiracy theory narratives, an influence operation may develop original conspiracy theory narratives in order to achieve greater control and alignment over the narrative and their campaign goals. Prominent examples include the USSR's Operation INFEKTION disinformation campaign run by the KGB in the 1980s to plant the idea that the United States had invented HIV/AIDS as part of a biological weapons research project at Fort Detrick, Maryland. More recently, Fort Detrick featured prominently in a new conspiracy theory narratives around the origins of the COVID-19 outbreak and pandemic.", "kill_chain_phases": [ @@ -1135,8 +1135,8 @@ "spec_version": "2.1", "id": "attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.554157Z", - "modified": "2023-09-25T16:17:56.554157Z", + "created": "2023-09-28T21:25:13.200791Z", + "modified": "2023-09-28T21:25:13.200791Z", "name": "Distort Facts", "description": "Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content", "kill_chain_phases": [ @@ -1168,8 +1168,8 @@ "spec_version": "2.1", "id": "attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.555276Z", - "modified": "2023-09-25T16:17:56.555276Z", + "created": "2023-09-28T21:25:13.201279Z", + "modified": "2023-09-28T21:25:13.201279Z", "name": "Reframe Context", "description": "Reframing context refers to removing an event from its surrounding context to distort its intended meaning. Rather than deny that an event occurred, reframing context frames an event in a manner that may lead the target audience to draw a different conclusion about its intentions.", "kill_chain_phases": [ @@ -1201,8 +1201,8 @@ "spec_version": "2.1", "id": "attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.556384Z", - "modified": "2023-09-25T16:17:56.556384Z", + "created": "2023-09-28T21:25:13.201835Z", + "modified": "2023-09-28T21:25:13.201835Z", "name": "Edit Open-Source Content", "description": "An influence operation may edit open-source content, such as collaborative blogs or encyclopaedias, to promote its narratives on outlets with existing credibility and audiences. Editing open-source content may allow an operation to post content on platforms without dedicating resources to the creation and maintenance of its own assets.", "kill_chain_phases": [ @@ -1234,8 +1234,8 @@ "spec_version": "2.1", "id": "attack-pattern--77cb282d-d6e6-4d86-87bf-08a2483bdbb6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.558283Z", - "modified": "2023-09-25T16:17:56.558283Z", + "created": "2023-09-28T21:25:13.202323Z", + "modified": "2023-09-28T21:25:13.202323Z", "name": "Online Polls", "description": "Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well", "kill_chain_phases": [ @@ -1267,8 +1267,8 @@ "spec_version": "2.1", "id": "attack-pattern--5d4cafe2-42cc-4c41-8ce7-41256e1383f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.559519Z", - "modified": "2023-09-25T16:17:56.559519Z", + "created": "2023-09-28T21:25:13.202853Z", + "modified": "2023-09-28T21:25:13.202853Z", "name": "Bait Legitimate Influencers", "description": "Credibility in a social media environment is often a function of the size of a user's network. \"Influencers\" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organisations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.", "kill_chain_phases": [ @@ -1300,8 +1300,8 @@ "spec_version": "2.1", "id": "attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.560097Z", - "modified": "2023-09-25T16:17:56.560097Z", + "created": "2023-09-28T21:25:13.203339Z", + "modified": "2023-09-28T21:25:13.203339Z", "name": "Demand Insurmountable Proof", "description": "Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the \"firehose of misinformation\". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of \"questions\" while the truth teller is burdened with higher and higher standards of proof.", "kill_chain_phases": [ @@ -1333,8 +1333,8 @@ "spec_version": "2.1", "id": "attack-pattern--bd1295e0-67b2-419d-b2b4-a832552dbcc6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.560686Z", - "modified": "2023-09-25T16:17:56.560686Z", + "created": "2023-09-28T21:25:13.203875Z", + "modified": "2023-09-28T21:25:13.203875Z", "name": "Seed Kernel of Truth", "description": "Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters.", "kill_chain_phases": [ @@ -1366,8 +1366,8 @@ "spec_version": "2.1", "id": "attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.561233Z", - "modified": "2023-09-25T16:17:56.561233Z", + "created": "2023-09-28T21:25:13.204367Z", + "modified": "2023-09-28T21:25:13.204367Z", "name": "Chat Apps", "description": "Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.", "kill_chain_phases": [ @@ -1399,8 +1399,8 @@ "spec_version": "2.1", "id": "attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.561668Z", - "modified": "2023-09-25T16:17:56.561668Z", + "created": "2023-09-28T21:25:13.204899Z", + "modified": "2023-09-28T21:25:13.204899Z", "name": "Use Encrypted Chat Apps", "description": "Examples include Signal, WhatsApp, Discord, Wire, etc.", "kill_chain_phases": [ @@ -1432,8 +1432,8 @@ "spec_version": "2.1", "id": "attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.562266Z", - "modified": "2023-09-25T16:17:56.562266Z", + "created": "2023-09-28T21:25:13.205471Z", + "modified": "2023-09-28T21:25:13.205471Z", "name": "Use Unencrypted Chats Apps", "description": "Examples include SMS, etc.", "kill_chain_phases": [ @@ -1465,8 +1465,8 @@ "spec_version": "2.1", "id": "attack-pattern--6b23206e-6a5a-4173-ab1a-17e6cc9a9d2d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.562924Z", - "modified": "2023-09-25T16:17:56.562924Z", + "created": "2023-09-28T21:25:13.205963Z", + "modified": "2023-09-28T21:25:13.205963Z", "name": "Seed Distortions", "description": "Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression.", "kill_chain_phases": [ @@ -1498,8 +1498,8 @@ "spec_version": "2.1", "id": "attack-pattern--0d8138a8-8690-491d-97b5-a330af054b39", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.563226Z", - "modified": "2023-09-25T16:17:56.563226Z", + "created": "2023-09-28T21:25:13.206512Z", + "modified": "2023-09-28T21:25:13.206512Z", "name": "Use Fake Experts", "description": "Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give \"credility\" to misinformation. Take advantage of credential bias", "kill_chain_phases": [ @@ -1531,8 +1531,8 @@ "spec_version": "2.1", "id": "attack-pattern--50f92bc8-f6ad-4267-bd00-f4c572370a72", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.564081Z", - "modified": "2023-09-25T16:17:56.564081Z", + "created": "2023-09-28T21:25:13.206965Z", + "modified": "2023-09-28T21:25:13.206965Z", "name": "Use Search Engine Optimisation", "description": "Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka \"Black-hat SEO\"", "kill_chain_phases": [ @@ -1564,8 +1564,8 @@ "spec_version": "2.1", "id": "attack-pattern--90ca8c39-a644-4007-b3d6-68fabc90b531", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.564472Z", - "modified": "2023-09-25T16:17:56.564472Z", + "created": "2023-09-28T21:25:13.207469Z", + "modified": "2023-09-28T21:25:13.207469Z", "name": "Censor Social Media as a Political Force", "description": "Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports).", "kill_chain_phases": [ @@ -1597,8 +1597,8 @@ "spec_version": "2.1", "id": "attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.564812Z", - "modified": "2023-09-25T16:17:56.564812Z", + "created": "2023-09-28T21:25:13.20799Z", + "modified": "2023-09-28T21:25:13.20799Z", "name": "Harass", "description": "Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content.", "kill_chain_phases": [ @@ -1630,8 +1630,8 @@ "spec_version": "2.1", "id": "attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.565688Z", - "modified": "2023-09-25T16:17:56.565688Z", + "created": "2023-09-28T21:25:13.208447Z", + "modified": "2023-09-28T21:25:13.208447Z", "name": "Boycott/\"Cancel\" Opponents", "description": "Cancel culture refers to the phenomenon in which individuals collectively refrain from supporting an individual, organisation, business, or other entity, usually following a real or falsified controversy. An influence operation may exploit cancel culture by emphasising an adversary\u2019s problematic or disputed behaviour and presenting its own content as an alternative.", "kill_chain_phases": [ @@ -1663,8 +1663,8 @@ "spec_version": "2.1", "id": "attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.566443Z", - "modified": "2023-09-25T16:17:56.566443Z", + "created": "2023-09-28T21:25:13.208935Z", + "modified": "2023-09-28T21:25:13.208935Z", "name": "Harass People Based on Identities", "description": "Examples include social identities like gender, sexuality, race, ethnicity, religion, ability, nationality, etc. as well as roles and occupations like journalist or activist.", "kill_chain_phases": [ @@ -1696,8 +1696,8 @@ "spec_version": "2.1", "id": "attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.567162Z", - "modified": "2023-09-25T16:17:56.567162Z", + "created": "2023-09-28T21:25:13.2094Z", + "modified": "2023-09-28T21:25:13.2094Z", "name": "Threaten to Dox", "description": "Doxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content.", "kill_chain_phases": [ @@ -1729,8 +1729,8 @@ "spec_version": "2.1", "id": "attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.567941Z", - "modified": "2023-09-25T16:17:56.567941Z", + "created": "2023-09-28T21:25:13.21013Z", + "modified": "2023-09-28T21:25:13.21013Z", "name": "Dox", "description": "Doxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content.", "kill_chain_phases": [ @@ -1762,8 +1762,8 @@ "spec_version": "2.1", "id": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.56869Z", - "modified": "2023-09-25T16:17:56.56869Z", + "created": "2023-09-28T21:25:13.21044Z", + "modified": "2023-09-28T21:25:13.21044Z", "name": "Flooding the Information Space", "description": "Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.", "kill_chain_phases": [ @@ -1795,8 +1795,8 @@ "spec_version": "2.1", "id": "attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.569998Z", - "modified": "2023-09-25T16:17:56.569998Z", + "created": "2023-09-28T21:25:13.210665Z", + "modified": "2023-09-28T21:25:13.210665Z", "name": "Trolls Amplify and Manipulate", "description": "Use trolls to amplify narratives and/or manipulate narratives. Fake profiles/sockpuppets operating to support individuals/narratives from the entire political spectrum (left/right binary). Operating with increased emphasis on promoting local content and promoting real Twitter users generating their own, often divisive political content, as it's easier to amplify existing content than create new/original content. Trolls operate where ever there's a socially divisive issue (issues that can/are be politicized).", "kill_chain_phases": [ @@ -1828,8 +1828,8 @@ "spec_version": "2.1", "id": "attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.570845Z", - "modified": "2023-09-25T16:17:56.570845Z", + "created": "2023-09-28T21:25:13.210877Z", + "modified": "2023-09-28T21:25:13.210877Z", "name": "Hijack Existing Hashtag", "description": "Take over an existing hashtag to drive exposure.", "kill_chain_phases": [ @@ -1861,8 +1861,8 @@ "spec_version": "2.1", "id": "attack-pattern--e6ab2793-a059-4354-bb60-045afb019833", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.572675Z", - "modified": "2023-09-25T16:17:56.572675Z", + "created": "2023-09-28T21:25:13.21116Z", + "modified": "2023-09-28T21:25:13.21116Z", "name": "Bots Amplify via Automated Forwarding and Reposting", "description": "Automated forwarding and reposting refer to the proliferation of operation content using automated means, such as artificial intelligence or social media bots. An influence operation may use automated activity to increase content exposure without dedicating the resources, including personnel and time, traditionally required to forward and repost content. Use bots to amplify narratives above algorithm thresholds. Bots are automated/programmed profiles designed to amplify content (ie: automatically retweet or like) and give appearance it's more \"popular\" than it is. They can operate as a network, to function in a coordinated/orchestrated manner. In some cases (more so now) they are an inexpensive/disposable assets used for minimal deployment as bot detection tools improve and platforms are more responsive.", "kill_chain_phases": [ @@ -1894,8 +1894,8 @@ "spec_version": "2.1", "id": "attack-pattern--4282febe-c8a6-46da-863c-f19081615d80", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57385Z", - "modified": "2023-09-25T16:17:56.57385Z", + "created": "2023-09-28T21:25:13.21143Z", + "modified": "2023-09-28T21:25:13.21143Z", "name": "Utilise Spamoflauge", "description": "Spamoflauge refers to the practice of disguising spam messages as legitimate. Spam refers to the use of electronic messaging systems to send out unrequested or unwanted messages in bulk. Simple methods of spamoflauge include replacing letters with numbers to fool keyword-based email spam filters, for example, \"you've w0n our jackp0t!\". Spamoflauge may extend to more complex techniques such as modifying the grammar or word choice of the language, casting messages as images which spam detectors cannot automatically read, or encapsulating messages in password protected attachments, such as .pdf or .zip files. Influence operations may use spamoflauge to avoid spam filtering systems and increase the likelihood of the target audience receiving operation messaging.", "kill_chain_phases": [ @@ -1927,8 +1927,8 @@ "spec_version": "2.1", "id": "attack-pattern--ce5b400c-6f82-4095-936b-617857800da8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57582Z", - "modified": "2023-09-25T16:17:56.57582Z", + "created": "2023-09-28T21:25:13.211643Z", + "modified": "2023-09-28T21:25:13.211643Z", "name": "Conduct Swarming", "description": "Swarming refers to the coordinated use of accounts to overwhelm the information space with operation content. Unlike information flooding, swarming centres exclusively around a specific event or actor rather than a general narrative. Swarming relies on \u201chorizontal communication\u201d between information assets rather than a top-down, vertical command-and-control approach.", "kill_chain_phases": [ @@ -1960,8 +1960,8 @@ "spec_version": "2.1", "id": "attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57684Z", - "modified": "2023-09-25T16:17:56.57684Z", + "created": "2023-09-28T21:25:13.211835Z", + "modified": "2023-09-28T21:25:13.211835Z", "name": "Conduct Keyword Squatting", "description": "Keyword squatting refers to the creation of online content, such as websites, articles, or social media accounts, around a specific search engine-optimized term to overwhelm the search results of that term. An influence may keyword squat to increase content exposure to target audience members who query the exploited term in a search engine and manipulate the narrative around the term.", "kill_chain_phases": [ @@ -1993,8 +1993,8 @@ "spec_version": "2.1", "id": "attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.578132Z", - "modified": "2023-09-25T16:17:56.578132Z", + "created": "2023-09-28T21:25:13.211971Z", + "modified": "2023-09-28T21:25:13.211971Z", "name": "Inauthentic Sites Amplify News and Narratives", "description": "Inauthentic sites circulate cross-post stories and amplify narratives. Often these sites have no masthead, bylines or attribution.", "kill_chain_phases": [ @@ -2026,8 +2026,8 @@ "spec_version": "2.1", "id": "attack-pattern--0102376a-e896-4191-b3fb-e58188301822", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57895Z", - "modified": "2023-09-25T16:17:56.57895Z", + "created": "2023-09-28T21:25:13.212125Z", + "modified": "2023-09-28T21:25:13.212125Z", "name": "Organise Events", "description": "Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.", "kill_chain_phases": [ @@ -2059,8 +2059,8 @@ "spec_version": "2.1", "id": "attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.579763Z", - "modified": "2023-09-25T16:17:56.579763Z", + "created": "2023-09-28T21:25:13.212278Z", + "modified": "2023-09-28T21:25:13.212278Z", "name": "Pay for Physical Action", "description": "Paying for physical action occurs when an influence operation pays individuals to act in the physical realm. An influence operation may pay for physical action to create specific situations and frame them in a way that supports operation narratives, for example, paying a group of people to burn a car to later post an image of the burning car and frame it as an act of protest.", "kill_chain_phases": [ @@ -2092,8 +2092,8 @@ "spec_version": "2.1", "id": "attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.580201Z", - "modified": "2023-09-25T16:17:56.580201Z", + "created": "2023-09-28T21:25:13.212419Z", + "modified": "2023-09-28T21:25:13.212419Z", "name": "Conduct Symbolic Action", "description": "Symbolic action refers to activities specifically intended to advance an operation\u2019s narrative by signalling something to the audience, for example, a military parade supporting a state\u2019s narrative of military superiority. An influence operation may use symbolic action to create falsified evidence supporting operation narratives in the physical information space.", "kill_chain_phases": [ @@ -2125,8 +2125,8 @@ "spec_version": "2.1", "id": "attack-pattern--d1f55d22-f487-48ec-a810-a9f74220c02e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.580613Z", - "modified": "2023-09-25T16:17:56.580613Z", + "created": "2023-09-28T21:25:13.212585Z", + "modified": "2023-09-28T21:25:13.212585Z", "name": "Play the Long Game", "description": "Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative.", "kill_chain_phases": [ @@ -2158,8 +2158,8 @@ "spec_version": "2.1", "id": "attack-pattern--ad410829-2fb3-490b-b470-f5f859d45942", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.581025Z", - "modified": "2023-09-25T16:17:56.581025Z", + "created": "2023-09-28T21:25:13.212724Z", + "modified": "2023-09-28T21:25:13.212724Z", "name": "Continue to Amplify", "description": "continue narrative or message amplification after the main incident work has finished", "kill_chain_phases": [ @@ -2191,8 +2191,8 @@ "spec_version": "2.1", "id": "attack-pattern--ddc9d571-88a9-4246-bbbf-075bfed721f8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.581726Z", - "modified": "2023-09-25T16:17:56.581726Z", + "created": "2023-09-28T21:25:13.212859Z", + "modified": "2023-09-28T21:25:13.212859Z", "name": "Sell Merchandise", "description": "Sell mechandise refers to getting the message or narrative into physical space in the offline world while making money", "kill_chain_phases": [ @@ -2224,8 +2224,8 @@ "spec_version": "2.1", "id": "attack-pattern--b3bb61ca-5472-42b0-807e-bd8657fc05b2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.582525Z", - "modified": "2023-09-25T16:17:56.582525Z", + "created": "2023-09-28T21:25:13.212997Z", + "modified": "2023-09-28T21:25:13.212997Z", "name": "Prepare Physical Broadcast Capabilities", "description": "Create or coopt broadcast capabilities (e.g. TV, radio etc).", "kill_chain_phases": [ @@ -2257,8 +2257,8 @@ "spec_version": "2.1", "id": "attack-pattern--d696b89b-9686-42ff-b3c4-5a4d5ecaa17a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.58392Z", - "modified": "2023-09-25T16:17:56.58392Z", + "created": "2023-09-28T21:25:13.21355Z", + "modified": "2023-09-28T21:25:13.21355Z", "name": "Degrade Adversary", "description": "Plan to degrade an adversary\u2019s image or ability to act. This could include preparation and use of harmful information about the adversary\u2019s actions or reputation.", "kill_chain_phases": [ @@ -2290,8 +2290,8 @@ "spec_version": "2.1", "id": "attack-pattern--b2a7561a-28ad-426c-a249-f415b5f11cee", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.584482Z", - "modified": "2023-09-25T16:17:56.584482Z", + "created": "2023-09-28T21:25:13.214046Z", + "modified": "2023-09-28T21:25:13.214046Z", "name": "Respond to Breaking News Event or Active Crisis", "description": "Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumours, and conspiracy theories, which are all vulnerable to manipulation.", "kill_chain_phases": [ @@ -2323,8 +2323,8 @@ "spec_version": "2.1", "id": "attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.584821Z", - "modified": "2023-09-25T16:17:56.584821Z", + "created": "2023-09-28T21:25:13.214551Z", + "modified": "2023-09-28T21:25:13.214551Z", "name": "Segment Audiences", "description": "Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics.", "kill_chain_phases": [ @@ -2356,8 +2356,8 @@ "spec_version": "2.1", "id": "attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.58524Z", - "modified": "2023-09-25T16:17:56.58524Z", + "created": "2023-09-28T21:25:13.215004Z", + "modified": "2023-09-28T21:25:13.215004Z", "name": "Geographic Segmentation", "description": "An influence operation may target populations in a specific geographic location, such as a region, state, or city. An influence operation may use geographic segmentation to Create Localised Content (see: Establish Legitimacy).", "kill_chain_phases": [ @@ -2389,8 +2389,8 @@ "spec_version": "2.1", "id": "attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.585594Z", - "modified": "2023-09-25T16:17:56.585594Z", + "created": "2023-09-28T21:25:13.215512Z", + "modified": "2023-09-28T21:25:13.215512Z", "name": "Demographic Segmentation", "description": "An influence operation may target populations based on demographic segmentation, including age, gender, and income. Demographic segmentation may be useful for influence operations aiming to change state policies that affect a specific population sector. For example, an influence operation attempting to influence Medicare funding in the United States would likely target U.S. voters over 65 years of age.", "kill_chain_phases": [ @@ -2422,8 +2422,8 @@ "spec_version": "2.1", "id": "attack-pattern--1d917530-027d-4f82-b380-404c320dc783", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.585969Z", - "modified": "2023-09-25T16:17:56.585969Z", + "created": "2023-09-28T21:25:13.216032Z", + "modified": "2023-09-28T21:25:13.216032Z", "name": "Economic Segmentation", "description": "An influence operation may target populations based on their income bracket, wealth, or other financial or economic division.", "kill_chain_phases": [ @@ -2455,8 +2455,8 @@ "spec_version": "2.1", "id": "attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.586611Z", - "modified": "2023-09-25T16:17:56.586611Z", + "created": "2023-09-28T21:25:13.216489Z", + "modified": "2023-09-28T21:25:13.216489Z", "name": "Psychographic Segmentation", "description": "An influence operation may target populations based on psychographic segmentation, which uses audience values and decision-making processes. An operation may individually gather psychographic data with its own surveys or collection tools or externally purchase data from social media companies or online surveys, such as personality quizzes.", "kill_chain_phases": [ @@ -2488,8 +2488,8 @@ "spec_version": "2.1", "id": "attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.587334Z", - "modified": "2023-09-25T16:17:56.587334Z", + "created": "2023-09-28T21:25:13.217051Z", + "modified": "2023-09-28T21:25:13.217051Z", "name": "Political Segmentation", "description": "An influence operation may target populations based on their political affiliations, especially when aiming to manipulate voting or change policy.", "kill_chain_phases": [ @@ -2521,8 +2521,8 @@ "spec_version": "2.1", "id": "attack-pattern--6faf71ca-1e32-4134-8a7c-79b25f7f3615", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.588304Z", - "modified": "2023-09-25T16:17:56.588304Z", + "created": "2023-09-28T21:25:13.217222Z", + "modified": "2023-09-28T21:25:13.217222Z", "name": "Determine Target Audiences", "description": "Determining the target audiences (segments of the population) who will receive campaign narratives and artefacts intended to achieve the strategic ends.", "kill_chain_phases": [ @@ -2554,8 +2554,8 @@ "spec_version": "2.1", "id": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.588791Z", - "modified": "2023-09-25T16:17:56.588791Z", + "created": "2023-09-28T21:25:13.217367Z", + "modified": "2023-09-28T21:25:13.217367Z", "name": "Determine Strategic Ends", "description": "These are the long-term end-states the campaign aims to bring about. They typically involve an advantageous position vis-a-vis competitors in terms of power or influence. The strategic goal may be to improve or simply to hold one\u2019s position. Competition occurs in the public sphere in the domains of war, diplomacy, politics, economics, and ideology, and can play out between armed groups, nation-states, political parties, corporations, interest groups, or individuals. ", "kill_chain_phases": [ @@ -2585,10 +2585,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--dc068bb2-cb65-427b-a4d1-9a76e50ff4ce", + "id": "attack-pattern--e499df14-e898-4e4f-be58-67266915e7b2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.589261Z", - "modified": "2023-09-25T16:17:56.589261Z", + "created": "2023-09-28T21:25:13.217536Z", + "modified": "2023-09-28T21:25:13.217536Z", "name": "Geopolitical Advantage", "description": "Favourable position on the international stage in terms of great power politics or regional rivalry. Geopolitics plays out in the realms of foreign policy, national security, diplomacy, and intelligence. It involves nation-state governments, heads of state, foreign ministers, intergovernmental organisations, and regional security alliances.", "kill_chain_phases": [ @@ -2618,10 +2618,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--c992a74a-a70d-40b4-bf9c-47044c81cabb", + "id": "attack-pattern--456e7902-1294-4ee0-aeb1-cfed13346a72", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.589841Z", - "modified": "2023-09-25T16:17:56.589841Z", + "created": "2023-09-28T21:25:13.217706Z", + "modified": "2023-09-28T21:25:13.217706Z", "name": "Domestic Political Advantage", "description": "Favourable position vis-\u00e0-vis national or sub-national political opponents such as political parties, interest groups, politicians, candidates. ", "kill_chain_phases": [ @@ -2651,10 +2651,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--2e8ddb66-1cf8-425b-8eea-8cc21d86d9f5", + "id": "attack-pattern--b463442a-ee7a-4ddb-83fe-c1de27b65c43", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.590444Z", - "modified": "2023-09-25T16:17:56.590444Z", + "created": "2023-09-28T21:25:13.218047Z", + "modified": "2023-09-28T21:25:13.218047Z", "name": "Economic Advantage", "description": "Favourable position domestically or internationally in the realms of commerce, trade, finance, industry. Economics involves nation-states, corporations, banks, trade blocs, industry associations, cartels. ", "kill_chain_phases": [ @@ -2684,10 +2684,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--6733ed94-5779-4756-b84d-1d6ee932b9b2", + "id": "attack-pattern--6921234b-a646-4a18-88cf-e70fc8ffc874", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.590978Z", - "modified": "2023-09-25T16:17:56.590978Z", + "created": "2023-09-28T21:25:13.218536Z", + "modified": "2023-09-28T21:25:13.218536Z", "name": "Ideological Advantage", "description": "Favourable position domestically or internationally in the market for ideas, beliefs, and world views. Competition plays out among faith systems, political systems, and value systems. It can involve sub-national, national or supra-national movements. ", "kill_chain_phases": [ @@ -2719,8 +2719,8 @@ "spec_version": "2.1", "id": "attack-pattern--5414f74d-0b10-4562-ad9d-e5e1093e255a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.592504Z", - "modified": "2023-09-25T16:17:56.592504Z", + "created": "2023-09-28T21:25:13.219041Z", + "modified": "2023-09-28T21:25:13.219041Z", "name": "Dismiss", "description": "Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biassed.", "kill_chain_phases": [ @@ -2752,8 +2752,8 @@ "spec_version": "2.1", "id": "attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.593542Z", - "modified": "2023-09-25T16:17:56.593542Z", + "created": "2023-09-28T21:25:13.219588Z", + "modified": "2023-09-28T21:25:13.219588Z", "name": "Discredit Credible Sources", "description": "Plan to delegitimize the media landscape and degrade public trust in reporting, by discrediting credible sources. This makes it easier to promote influence operation content.", "kill_chain_phases": [ @@ -2785,8 +2785,8 @@ "spec_version": "2.1", "id": "attack-pattern--1a85cb33-f7cc-49d9-a23f-4b7ce82a2146", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.593982Z", - "modified": "2023-09-25T16:17:56.593982Z", + "created": "2023-09-28T21:25:13.22009Z", + "modified": "2023-09-28T21:25:13.22009Z", "name": "Distort", "description": "Twist the narrative. Take information, or artefacts like images, and change the framing around them.", "kill_chain_phases": [ @@ -2818,8 +2818,8 @@ "spec_version": "2.1", "id": "attack-pattern--9e80abf9-0991-47c3-982c-b33e66640d10", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.594475Z", - "modified": "2023-09-25T16:17:56.594475Z", + "created": "2023-09-28T21:25:13.220627Z", + "modified": "2023-09-28T21:25:13.220627Z", "name": "Distract", "description": "Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they\u2019ve accused you of (e.g. police brutality).", "kill_chain_phases": [ @@ -2851,8 +2851,8 @@ "spec_version": "2.1", "id": "attack-pattern--8ad58740-d5c1-40bb-9091-f98adfe8d89f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.595524Z", - "modified": "2023-09-25T16:17:56.595524Z", + "created": "2023-09-28T21:25:13.221088Z", + "modified": "2023-09-28T21:25:13.221088Z", "name": "Dismay", "description": "Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story.", "kill_chain_phases": [ @@ -2884,8 +2884,8 @@ "spec_version": "2.1", "id": "attack-pattern--1d48fe65-5062-4262-b9e2-890aca1da132", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.601045Z", - "modified": "2023-09-25T16:17:56.601045Z", + "created": "2023-09-28T21:25:13.221608Z", + "modified": "2023-09-28T21:25:13.221608Z", "name": "Divide", "description": "Create conflict between subgroups, to widen divisions in a community", "kill_chain_phases": [ @@ -2917,8 +2917,8 @@ "spec_version": "2.1", "id": "attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.601502Z", - "modified": "2023-09-25T16:17:56.601502Z", + "created": "2023-09-28T21:25:13.222094Z", + "modified": "2023-09-28T21:25:13.222094Z", "name": "Map Target Audience Information Environment", "description": "Mapping the target audience information environment analyses the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.", "kill_chain_phases": [ @@ -2950,8 +2950,8 @@ "spec_version": "2.1", "id": "attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.601851Z", - "modified": "2023-09-25T16:17:56.601851Z", + "created": "2023-09-28T21:25:13.222626Z", + "modified": "2023-09-28T21:25:13.222626Z", "name": "Monitor Social Media Analytics", "description": "An influence operation may use social media analytics to determine which factors will increase the operation content\u2019s exposure to its target audience on social media platforms, including views, interactions, and sentiment relating to topics and content types. The social media platform itself or a third-party tool may collect the metrics.", "kill_chain_phases": [ @@ -2983,8 +2983,8 @@ "spec_version": "2.1", "id": "attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.602362Z", - "modified": "2023-09-25T16:17:56.602362Z", + "created": "2023-09-28T21:25:13.222968Z", + "modified": "2023-09-28T21:25:13.222968Z", "name": "Evaluate Media Surveys", "description": "An influence operation may evaluate its own or third-party media surveys to determine what type of content appeals to its target audience. Media surveys may provide insight into an audience\u2019s political views, social class, general interests, or other indicators used to tailor operation messaging to its target audience.", "kill_chain_phases": [ @@ -3016,8 +3016,8 @@ "spec_version": "2.1", "id": "attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.602724Z", - "modified": "2023-09-25T16:17:56.602724Z", + "created": "2023-09-28T21:25:13.223169Z", + "modified": "2023-09-28T21:25:13.223169Z", "name": "Identify Trending Topics/Hashtags", "description": "An influence operation may identify trending hashtags on social media platforms for later use in boosting operation content. A hashtag40 refers to a word or phrase preceded by the hash symbol (#) on social media used to identify messages and posts relating to a specific topic. All public posts that use the same hashtag are aggregated onto a centralised page dedicated to the word or phrase and sorted either chronologically or by popularity.", "kill_chain_phases": [ @@ -3049,8 +3049,8 @@ "spec_version": "2.1", "id": "attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.603123Z", - "modified": "2023-09-25T16:17:56.603123Z", + "created": "2023-09-28T21:25:13.223372Z", + "modified": "2023-09-28T21:25:13.223372Z", "name": "Conduct Web Traffic Analysis", "description": "An influence operation may conduct web traffic analysis to determine which search engines, keywords, websites, and advertisements gain the most traction with its target audience.", "kill_chain_phases": [ @@ -3082,8 +3082,8 @@ "spec_version": "2.1", "id": "attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.604787Z", - "modified": "2023-09-25T16:17:56.604787Z", + "created": "2023-09-28T21:25:13.223592Z", + "modified": "2023-09-28T21:25:13.223592Z", "name": "Assess Degree/Type of Media Access", "description": "An influence operation may survey a target audience\u2019s Internet availability and degree of media freedom to determine which target audience members will have access to operation content and on which platforms. An operation may face more difficulty targeting an information environment with heavy restrictions and media control than an environment with independent media, freedom of speech and of the press, and individual liberties.", "kill_chain_phases": [ @@ -3115,8 +3115,8 @@ "spec_version": "2.1", "id": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.606169Z", - "modified": "2023-09-25T16:17:56.606169Z", + "created": "2023-09-28T21:25:13.223959Z", + "modified": "2023-09-28T21:25:13.223959Z", "name": "Identify Social and Technical Vulnerabilities", "description": "Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives.", "kill_chain_phases": [ @@ -3148,8 +3148,8 @@ "spec_version": "2.1", "id": "attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.607352Z", - "modified": "2023-09-25T16:17:56.607352Z", + "created": "2023-09-28T21:25:13.224398Z", + "modified": "2023-09-28T21:25:13.224398Z", "name": "Find Echo Chambers", "description": "Find or plan to create areas (social media groups, search term groups, hashtag groups etc) where individuals only engage with people they agree with.", "kill_chain_phases": [ @@ -3181,8 +3181,8 @@ "spec_version": "2.1", "id": "attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.608622Z", - "modified": "2023-09-25T16:17:56.608622Z", + "created": "2023-09-28T21:25:13.224906Z", + "modified": "2023-09-28T21:25:13.224906Z", "name": "Identify Data Voids", "description": "A data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. A 2019 report by Michael Golebiewski identifies five types of data voids. (1) \u201cBreaking news\u201d data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a \u201cstrategic new terms\u201d data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on \u201coutdated terms\u201d that have decreased in popularity, capitalising on most search engines\u2019 preferences for recency. (4) \u201cFragmented concepts\u201d data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use \u201cproblematic queries\u201d that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term.", "kill_chain_phases": [ @@ -3214,8 +3214,8 @@ "spec_version": "2.1", "id": "attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.609623Z", - "modified": "2023-09-25T16:17:56.609623Z", + "created": "2023-09-28T21:25:13.225334Z", + "modified": "2023-09-28T21:25:13.225334Z", "name": "Identify Existing Prejudices", "description": "An influence operation may exploit existing racial, religious, demographic, or social prejudices to further polarise its target audience from the rest of the public.", "kill_chain_phases": [ @@ -3247,8 +3247,8 @@ "spec_version": "2.1", "id": "attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.609984Z", - "modified": "2023-09-25T16:17:56.609984Z", + "created": "2023-09-28T21:25:13.225998Z", + "modified": "2023-09-28T21:25:13.225998Z", "name": "Identify Existing Fissures", "description": "An influence operation may identify existing fissures to pit target populations against one another or facilitate a \u201cdivide-and-conquer\" approach to tailor operation narratives along the divides.", "kill_chain_phases": [ @@ -3280,8 +3280,8 @@ "spec_version": "2.1", "id": "attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.610333Z", - "modified": "2023-09-25T16:17:56.610333Z", + "created": "2023-09-28T21:25:13.226454Z", + "modified": "2023-09-28T21:25:13.226454Z", "name": "Identify Existing Conspiracy Narratives/Suspicions", "description": "An influence operation may assess preexisting conspiracy theories or suspicions in a population to identify existing narratives that support operational objectives.", "kill_chain_phases": [ @@ -3313,8 +3313,8 @@ "spec_version": "2.1", "id": "attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.610649Z", - "modified": "2023-09-25T16:17:56.610649Z", + "created": "2023-09-28T21:25:13.226785Z", + "modified": "2023-09-28T21:25:13.226785Z", "name": "Identify Wedge Issues", "description": "A wedge issue is a divisive political issue, usually concerning a social phenomenon, that divides individuals along a defined line. An influence operation may exploit wedge issues by intentionally polarising the public along the wedge issue line and encouraging opposition between factions.", "kill_chain_phases": [ @@ -3346,8 +3346,8 @@ "spec_version": "2.1", "id": "attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.610989Z", - "modified": "2023-09-25T16:17:56.610989Z", + "created": "2023-09-28T21:25:13.227018Z", + "modified": "2023-09-28T21:25:13.227018Z", "name": "Identify Target Audience Adversaries", "description": "An influence operation may identify or create a real or imaginary adversary to centre operation narratives against. A real adversary may include certain politicians or political parties while imaginary adversaries may include falsified \u201cdeep state\u201d62 actors that, according to conspiracies, run the state behind public view.", "kill_chain_phases": [ @@ -3379,8 +3379,8 @@ "spec_version": "2.1", "id": "attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.611284Z", - "modified": "2023-09-25T16:17:56.611284Z", + "created": "2023-09-28T21:25:13.227215Z", + "modified": "2023-09-28T21:25:13.227215Z", "name": "Identify Media System Vulnerabilities", "description": "An influence operation may exploit existing weaknesses in a target\u2019s media system. These weaknesses may include existing biases among media agencies, vulnerability to false news agencies on social media, or existing distrust of traditional media sources. An existing distrust among the public in the media system\u2019s credibility holds high potential for exploitation by an influence operation when establishing alternative news agencies to spread operation content.", "kill_chain_phases": [ @@ -3412,8 +3412,8 @@ "spec_version": "2.1", "id": "attack-pattern--14bec5aa-0823-4dde-9223-ec49a1cea65e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.611628Z", - "modified": "2023-09-25T16:17:56.611628Z", + "created": "2023-09-28T21:25:13.227448Z", + "modified": "2023-09-28T21:25:13.227448Z", "name": "Develop New Narratives", "description": "Actors may develop new narratives to further strategic or tactical goals, especially when existing narratives adequately align with the campaign goals. New narratives provide more control in terms of crafting the message to achieve specific goals. However, new narratives may require more effort to disseminate than adapting or adopting existing narratives.", "kill_chain_phases": [ @@ -3445,8 +3445,8 @@ "spec_version": "2.1", "id": "attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.611937Z", - "modified": "2023-09-25T16:17:56.611937Z", + "created": "2023-09-28T21:25:13.227652Z", + "modified": "2023-09-28T21:25:13.227652Z", "name": "Integrate Target Audience Vulnerabilities into Narrative", "description": "An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation\u2019s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment.", "kill_chain_phases": [ @@ -3478,8 +3478,8 @@ "spec_version": "2.1", "id": "attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.6123Z", - "modified": "2023-09-25T16:17:56.6123Z", + "created": "2023-09-28T21:25:13.227892Z", + "modified": "2023-09-28T21:25:13.227892Z", "name": "Reuse Existing Content", "description": "When an operation recycles content from its own previous operations or plagiarises from external operations. An operation may launder information to conserve resources that would have otherwise been utilised to develop new content.", "kill_chain_phases": [ @@ -3511,8 +3511,8 @@ "spec_version": "2.1", "id": "attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.61373Z", - "modified": "2023-09-25T16:17:56.61373Z", + "created": "2023-09-28T21:25:13.228328Z", + "modified": "2023-09-28T21:25:13.228328Z", "name": "Use Copypasta", "description": "Copypasta refers to a piece of text that has been copied and pasted multiple times across various online platforms. A copypasta\u2019s final form may differ from its original source text as users add, delete, or otherwise edit the content as they repost the text.", "kill_chain_phases": [ @@ -3544,8 +3544,8 @@ "spec_version": "2.1", "id": "attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.614129Z", - "modified": "2023-09-25T16:17:56.614129Z", + "created": "2023-09-28T21:25:13.228888Z", + "modified": "2023-09-28T21:25:13.228888Z", "name": "Plagiarise Content", "description": "An influence operation may take content from other sources without proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources.", "kill_chain_phases": [ @@ -3577,8 +3577,8 @@ "spec_version": "2.1", "id": "attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.61453Z", - "modified": "2023-09-25T16:17:56.61453Z", + "created": "2023-09-28T21:25:13.229346Z", + "modified": "2023-09-28T21:25:13.229346Z", "name": "Deceptively Labelled or Translated", "description": "An influence operation may take authentic content from other sources and add deceptive labels or deceptively translate the content into other langauges.", "kill_chain_phases": [ @@ -3610,8 +3610,8 @@ "spec_version": "2.1", "id": "attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.615112Z", - "modified": "2023-09-25T16:17:56.615112Z", + "created": "2023-09-28T21:25:13.229867Z", + "modified": "2023-09-28T21:25:13.229867Z", "name": "Appropriate Content", "description": "An influence operation may take content from other sources with proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources. Examples include the appropriation of content from one inauthentic news site to another inauthentic news site or network in ways that align with the originators licencing or terms of service.", "kill_chain_phases": [ @@ -3643,8 +3643,8 @@ "spec_version": "2.1", "id": "attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.615616Z", - "modified": "2023-09-25T16:17:56.615616Z", + "created": "2023-09-28T21:25:13.230461Z", + "modified": "2023-09-28T21:25:13.230461Z", "name": "Develop Text-Based Content", "description": "Creating and editing false or misleading text-based artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign.", "kill_chain_phases": [ @@ -3676,8 +3676,8 @@ "spec_version": "2.1", "id": "attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.615991Z", - "modified": "2023-09-25T16:17:56.615991Z", + "created": "2023-09-28T21:25:13.230922Z", + "modified": "2023-09-28T21:25:13.230922Z", "name": "Develop AI-Generated Text", "description": "AI-generated texts refers to synthetic text composed by computers using text-generating AI technology. Autonomous generation refers to content created by a bot without human input, also known as bot-created content generation. Autonomous generation represents the next step in automation after language generation and may lead to automated journalism. An influence operation may use read fakes or autonomous generation to quickly develop and distribute content to the target audience.", "kill_chain_phases": [ @@ -3709,8 +3709,8 @@ "spec_version": "2.1", "id": "attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.616332Z", - "modified": "2023-09-25T16:17:56.616332Z", + "created": "2023-09-28T21:25:13.231426Z", + "modified": "2023-09-28T21:25:13.231426Z", "name": "Develop False or Altered Documents", "description": "Develop False or Altered Documents", "kill_chain_phases": [ @@ -3742,8 +3742,8 @@ "spec_version": "2.1", "id": "attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.616791Z", - "modified": "2023-09-25T16:17:56.616791Z", + "created": "2023-09-28T21:25:13.231884Z", + "modified": "2023-09-28T21:25:13.231884Z", "name": "Develop Inauthentic News Articles", "description": "An influence operation may develop false or misleading news articles aligned to their campaign goals or narratives.", "kill_chain_phases": [ @@ -3775,8 +3775,8 @@ "spec_version": "2.1", "id": "attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.617185Z", - "modified": "2023-09-25T16:17:56.617185Z", + "created": "2023-09-28T21:25:13.232379Z", + "modified": "2023-09-28T21:25:13.232379Z", "name": "Develop Image-Based Content", "description": "Creating and editing false or misleading visual artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include photographing staged real-life situations, repurposing existing digital images, or using image creation and editing technologies.", "kill_chain_phases": [ @@ -3808,8 +3808,8 @@ "spec_version": "2.1", "id": "attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.617557Z", - "modified": "2023-09-25T16:17:56.617557Z", + "created": "2023-09-28T21:25:13.232905Z", + "modified": "2023-09-28T21:25:13.232905Z", "name": "Develop Memes", "description": "Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.", "kill_chain_phases": [ @@ -3841,8 +3841,8 @@ "spec_version": "2.1", "id": "attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.61799Z", - "modified": "2023-09-25T16:17:56.61799Z", + "created": "2023-09-28T21:25:13.233365Z", + "modified": "2023-09-28T21:25:13.233365Z", "name": "Develop AI-Generated Images (Deepfakes)", "description": "Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual\u2019s face, body, voice, and physical gestures.", "kill_chain_phases": [ @@ -3874,8 +3874,8 @@ "spec_version": "2.1", "id": "attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.618334Z", - "modified": "2023-09-25T16:17:56.618334Z", + "created": "2023-09-28T21:25:13.233879Z", + "modified": "2023-09-28T21:25:13.233879Z", "name": "Deceptively Edit Images (Cheap Fakes)", "description": "Cheap fakes utilise less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.", "kill_chain_phases": [ @@ -3907,8 +3907,8 @@ "spec_version": "2.1", "id": "attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.618702Z", - "modified": "2023-09-25T16:17:56.618702Z", + "created": "2023-09-28T21:25:13.23435Z", + "modified": "2023-09-28T21:25:13.23435Z", "name": "Aggregate Information into Evidence Collages", "description": "Image files that aggregate positive evidence (Joan Donovan)", "kill_chain_phases": [ @@ -3940,8 +3940,8 @@ "spec_version": "2.1", "id": "attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.619059Z", - "modified": "2023-09-25T16:17:56.619059Z", + "created": "2023-09-28T21:25:13.234844Z", + "modified": "2023-09-28T21:25:13.234844Z", "name": "Develop Video-Based Content", "description": "Creating and editing false or misleading video artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include staging videos of purportedly real situations, repurposing existing video artefacts, or using AI-generated video creation and editing technologies (including deepfakes).", "kill_chain_phases": [ @@ -3973,8 +3973,8 @@ "spec_version": "2.1", "id": "attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.619404Z", - "modified": "2023-09-25T16:17:56.619404Z", + "created": "2023-09-28T21:25:13.235323Z", + "modified": "2023-09-28T21:25:13.235323Z", "name": "Develop AI-Generated Videos (Deepfakes)", "description": "Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual\u2019s face, body, voice, and physical gestures.", "kill_chain_phases": [ @@ -4006,8 +4006,8 @@ "spec_version": "2.1", "id": "attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.619753Z", - "modified": "2023-09-25T16:17:56.619753Z", + "created": "2023-09-28T21:25:13.235858Z", + "modified": "2023-09-28T21:25:13.235858Z", "name": "Deceptively Edit Video (Cheap Fakes)", "description": "Cheap fakes utilise less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.", "kill_chain_phases": [ @@ -4039,8 +4039,8 @@ "spec_version": "2.1", "id": "attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.620115Z", - "modified": "2023-09-25T16:17:56.620115Z", + "created": "2023-09-28T21:25:13.236325Z", + "modified": "2023-09-28T21:25:13.236325Z", "name": "Develop Audio-Based Content", "description": "Creating and editing false or misleading audio artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include creating completely new audio content, repurposing existing audio artefacts (including cheap fakes), or using AI-generated audio creation and editing technologies (including deepfakes).", "kill_chain_phases": [ @@ -4072,8 +4072,8 @@ "spec_version": "2.1", "id": "attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.620468Z", - "modified": "2023-09-25T16:17:56.620468Z", + "created": "2023-09-28T21:25:13.236836Z", + "modified": "2023-09-28T21:25:13.236836Z", "name": "Develop AI-Generated Audio (Deepfakes)", "description": "Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual\u2019s face, body, voice, and physical gestures.", "kill_chain_phases": [ @@ -4105,8 +4105,8 @@ "spec_version": "2.1", "id": "attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.620803Z", - "modified": "2023-09-25T16:17:56.620803Z", + "created": "2023-09-28T21:25:13.237308Z", + "modified": "2023-09-28T21:25:13.237308Z", "name": "Deceptively Edit Audio (Cheap Fakes)", "description": "Cheap fakes utilise less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.", "kill_chain_phases": [ @@ -4138,8 +4138,8 @@ "spec_version": "2.1", "id": "attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.621185Z", - "modified": "2023-09-25T16:17:56.621185Z", + "created": "2023-09-28T21:25:13.237844Z", + "modified": "2023-09-28T21:25:13.237844Z", "name": "Obtain Private Documents", "description": "Procuring documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can include authentic non-public documents, authentic non-public documents have been altered, or inauthentic documents intended to appear as if they are authentic non-public documents. All of these types of documents can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ @@ -4171,8 +4171,8 @@ "spec_version": "2.1", "id": "attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.621541Z", - "modified": "2023-09-25T16:17:56.621541Z", + "created": "2023-09-28T21:25:13.238381Z", + "modified": "2023-09-28T21:25:13.238381Z", "name": "Obtain Authentic Documents", "description": "Procure authentic documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ @@ -4204,8 +4204,8 @@ "spec_version": "2.1", "id": "attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.621872Z", - "modified": "2023-09-25T16:17:56.621872Z", + "created": "2023-09-28T21:25:13.238861Z", + "modified": "2023-09-28T21:25:13.238861Z", "name": "Create Inauthentic Documents", "description": "Create inauthentic documents intended to appear as if they are authentic non-public documents. These documents can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ @@ -4237,8 +4237,8 @@ "spec_version": "2.1", "id": "attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.622228Z", - "modified": "2023-09-25T16:17:56.622228Z", + "created": "2023-09-28T21:25:13.239371Z", + "modified": "2023-09-28T21:25:13.239371Z", "name": "Alter Authentic Documents", "description": "Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ @@ -4270,8 +4270,8 @@ "spec_version": "2.1", "id": "attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.622758Z", - "modified": "2023-09-25T16:17:56.622758Z", + "created": "2023-09-28T21:25:13.239842Z", + "modified": "2023-09-28T21:25:13.239842Z", "name": "Create Inauthentic Accounts", "description": "Inauthentic accounts include bot accounts, cyborg accounts, sockpuppet accounts, and anonymous accounts.", "kill_chain_phases": [ @@ -4303,8 +4303,8 @@ "spec_version": "2.1", "id": "attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.623306Z", - "modified": "2023-09-25T16:17:56.623306Z", + "created": "2023-09-28T21:25:13.24035Z", + "modified": "2023-09-28T21:25:13.24035Z", "name": "Create Anonymous Accounts", "description": "Anonymous accounts or anonymous users refer to users that access network resources without providing a username or password. An influence operation may use anonymous accounts to spread content without direct attribution to the operation.", "kill_chain_phases": [ @@ -4336,8 +4336,8 @@ "spec_version": "2.1", "id": "attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.624406Z", - "modified": "2023-09-25T16:17:56.624406Z", + "created": "2023-09-28T21:25:13.24082Z", + "modified": "2023-09-28T21:25:13.24082Z", "name": "Create Cyborg Accounts", "description": "Cyborg accounts refer to partly manned, partly automated social media accounts. Cyborg accounts primarily act as bots, but a human operator periodically takes control of the account to engage with real social media users by responding to comments and posting original content. Influence operations may use cyborg accounts to reduce the amount of direct human input required to maintain a regular account but increase the apparent legitimacy of the cyborg account by occasionally breaking its bot-like behaviour with human interaction.", "kill_chain_phases": [ @@ -4369,8 +4369,8 @@ "spec_version": "2.1", "id": "attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.624865Z", - "modified": "2023-09-25T16:17:56.624865Z", + "created": "2023-09-28T21:25:13.241564Z", + "modified": "2023-09-28T21:25:13.241564Z", "name": "Create Bot Accounts", "description": "Bots refer to autonomous internet users that interact with systems or other users while imitating traditional human behaviour. Bots use a variety of tools to stay active without direct human operation, including artificial intelligence and big data analytics. For example, an individual may programme a Twitter bot to retweet a tweet every time it contains a certain keyword or hashtag. An influence operation may use bots to increase its exposure and artificially promote its content across the internet without dedicating additional time or human resources. Amplifier bots promote operation content through reposts, shares, and likes to increase the content\u2019s online popularity. Hacker bots are traditionally covert bots running on computer scripts that rarely engage with users and work primarily as agents of larger cyberattacks, such as a Distributed Denial of Service attacks. Spammer bots are programmed to post content on social media or in comment sections, usually as a supplementary tool. Impersonator bots102 pose as real people by mimicking human behaviour, complicating their detection.", "kill_chain_phases": [ @@ -4402,8 +4402,8 @@ "spec_version": "2.1", "id": "attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.625293Z", - "modified": "2023-09-25T16:17:56.625293Z", + "created": "2023-09-28T21:25:13.24201Z", + "modified": "2023-09-28T21:25:13.24201Z", "name": "Create Sockpuppet Accounts", "description": "Sockpuppet accounts refer to falsified accounts that either promote the influence operation\u2019s own material or attack critics of the material online. Individuals who control sockpuppet accounts also man at least one other user account.67 Sockpuppet accounts help legitimise operation narratives by providing an appearance of external support for the material and discrediting opponents of the operation.", "kill_chain_phases": [ @@ -4435,8 +4435,8 @@ "spec_version": "2.1", "id": "attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.62662Z", - "modified": "2023-09-25T16:17:56.62662Z", + "created": "2023-09-28T21:25:13.242187Z", + "modified": "2023-09-28T21:25:13.242187Z", "name": "Recruit Malign Actors", "description": "Operators recruit bad actors paying recruiting, or exerting control over individuals includes trolls, partisans, and contractors.", "kill_chain_phases": [ @@ -4468,8 +4468,8 @@ "spec_version": "2.1", "id": "attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.627207Z", - "modified": "2023-09-25T16:17:56.627207Z", + "created": "2023-09-28T21:25:13.242366Z", + "modified": "2023-09-28T21:25:13.242366Z", "name": "Recruit Contractors", "description": "Operators recruit paid contractor to support the campaign.", "kill_chain_phases": [ @@ -4501,8 +4501,8 @@ "spec_version": "2.1", "id": "attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.627814Z", - "modified": "2023-09-25T16:17:56.627814Z", + "created": "2023-09-28T21:25:13.242543Z", + "modified": "2023-09-28T21:25:13.242543Z", "name": "Recruit Partisans", "description": "Operators recruit partisans (ideologically-aligned individuals) to support the campaign.", "kill_chain_phases": [ @@ -4534,8 +4534,8 @@ "spec_version": "2.1", "id": "attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.628538Z", - "modified": "2023-09-25T16:17:56.628538Z", + "created": "2023-09-28T21:25:13.242733Z", + "modified": "2023-09-28T21:25:13.242733Z", "name": "Enlist Troll Accounts", "description": "An influence operation may hire trolls, or human operators of fake accounts that aim to provoke others by posting and amplifying content about controversial issues. Trolls can serve to discredit an influence operation\u2019s opposition or bring attention to the operation\u2019s cause through debate. Classic trolls refer to regular people who troll for personal reasons, such as attention-seeking or boredom. Classic trolls may advance operation narratives by coincidence but are not directly affiliated with any larger operation. Conversely, hybrid trolls act on behalf of another institution, such as a state or financial organisation, and post content with a specific ideological goal. Hybrid trolls may be highly advanced and institutionalised or less organised and work for a single individual.", "kill_chain_phases": [ @@ -4567,8 +4567,8 @@ "spec_version": "2.1", "id": "attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.629289Z", - "modified": "2023-09-25T16:17:56.629289Z", + "created": "2023-09-28T21:25:13.242875Z", + "modified": "2023-09-28T21:25:13.242875Z", "name": "Build Network", "description": "Operators build their own network, creating links between accounts -- whether authentic or inauthentic -- in order amplify and promote narratives and artefacts, and encourage further growth of ther network, as well as the ongoing sharing and engagement with operational content.", "kill_chain_phases": [ @@ -4600,8 +4600,8 @@ "spec_version": "2.1", "id": "attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.629682Z", - "modified": "2023-09-25T16:17:56.629682Z", + "created": "2023-09-28T21:25:13.243054Z", + "modified": "2023-09-28T21:25:13.243054Z", "name": "Create Organisations", "description": "Influence operations may establish organisations with legitimate or falsified hierarchies, staff, and content to structure operation assets, provide a sense of legitimacy to the operation, or provide institutional backing to operation activities.", "kill_chain_phases": [ @@ -4633,8 +4633,8 @@ "spec_version": "2.1", "id": "attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.630048Z", - "modified": "2023-09-25T16:17:56.630048Z", + "created": "2023-09-28T21:25:13.243236Z", + "modified": "2023-09-28T21:25:13.243236Z", "name": "Use Follow Trains", "description": "A follow train is a group of people who follow each other on a social media platform, often as a way for an individual or campaign to grow its social media following. Follow trains may be a violation of platform Terms of Service. They are also known as follow-for-follow groups.", "kill_chain_phases": [ @@ -4666,8 +4666,8 @@ "spec_version": "2.1", "id": "attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.630373Z", - "modified": "2023-09-25T16:17:56.630373Z", + "created": "2023-09-28T21:25:13.243711Z", + "modified": "2023-09-28T21:25:13.243711Z", "name": "Create Community or Sub-Group", "description": "When there is not an existing community or sub-group that meets a campaign's goals, an influence operation may seek to create a community or sub-group.", "kill_chain_phases": [ @@ -4699,8 +4699,8 @@ "spec_version": "2.1", "id": "attack-pattern--c1182f49-4318-486f-81be-d44b99300343", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.630744Z", - "modified": "2023-09-25T16:17:56.630744Z", + "created": "2023-09-28T21:25:13.244257Z", + "modified": "2023-09-28T21:25:13.244257Z", "name": "Acquire/Recruit Network", "description": "Operators acquire an existing network by paying, recruiting, or exerting control over the leaders of the existing network.", "kill_chain_phases": [ @@ -4732,8 +4732,8 @@ "spec_version": "2.1", "id": "attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.631104Z", - "modified": "2023-09-25T16:17:56.631104Z", + "created": "2023-09-28T21:25:13.244787Z", + "modified": "2023-09-28T21:25:13.244787Z", "name": "Fund Proxies", "description": "An influence operation may fund proxies, or external entities that work for the operation. An operation may recruit/train users with existing sympathies towards the operation\u2019s narratives and/or goals as proxies. Funding proxies serves various purposes including: - Diversifying operation locations to complicate attribution - Reducing the workload for direct operation assets", "kill_chain_phases": [ @@ -4765,8 +4765,8 @@ "spec_version": "2.1", "id": "attack-pattern--c7017017-4965-4dad-a970-e748b7080a19", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.631463Z", - "modified": "2023-09-25T16:17:56.631463Z", + "created": "2023-09-28T21:25:13.245253Z", + "modified": "2023-09-28T21:25:13.245253Z", "name": "Acquire Botnets", "description": "A botnet is a group of bots that can function in coordination with each other.", "kill_chain_phases": [ @@ -4798,8 +4798,8 @@ "spec_version": "2.1", "id": "attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.631807Z", - "modified": "2023-09-25T16:17:56.631807Z", + "created": "2023-09-28T21:25:13.245794Z", + "modified": "2023-09-28T21:25:13.245794Z", "name": "Infiltrate Existing Networks", "description": "Operators deceptively insert social assets into existing networks as group members in order to influence the members of the network and the wider information environment that the network impacts.", "kill_chain_phases": [ @@ -4831,8 +4831,8 @@ "spec_version": "2.1", "id": "attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.632178Z", - "modified": "2023-09-25T16:17:56.632178Z", + "created": "2023-09-28T21:25:13.246267Z", + "modified": "2023-09-28T21:25:13.246267Z", "name": "Identify Susceptible Targets in Networks", "description": "When seeking to infiltrate an existing network, an influence operation may identify individuals and groups that might be susceptible to being co-opted or influenced.", "kill_chain_phases": [ @@ -4864,8 +4864,8 @@ "spec_version": "2.1", "id": "attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.632569Z", - "modified": "2023-09-25T16:17:56.632569Z", + "created": "2023-09-28T21:25:13.246767Z", + "modified": "2023-09-28T21:25:13.246767Z", "name": "Utilise Butterfly Attacks", "description": "Butterfly attacks occur when operators pretend to be members of a certain social group, usually a group that struggles for representation. An influence operation may mimic a group to insert controversial statements into the discourse, encourage the spread of operation content, or promote harassment among group members. Unlike astroturfing, butterfly attacks aim to infiltrate and discredit existing grassroots movements, organisations, and media campaigns.", "kill_chain_phases": [ @@ -4897,8 +4897,8 @@ "spec_version": "2.1", "id": "attack-pattern--444c403e-a73f-4b78-9ffd-556f1dd29039", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.632961Z", - "modified": "2023-09-25T16:17:56.632961Z", + "created": "2023-09-28T21:25:13.247214Z", + "modified": "2023-09-28T21:25:13.247214Z", "name": "Develop Owned Media Assets", "description": "An owned media asset refers to an agency or organisation through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organisation of content.", "kill_chain_phases": [ @@ -4930,8 +4930,8 @@ "spec_version": "2.1", "id": "attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.633319Z", - "modified": "2023-09-25T16:17:56.633319Z", + "created": "2023-09-28T21:25:13.247708Z", + "modified": "2023-09-28T21:25:13.247708Z", "name": "Leverage Content Farms", "description": "Using the services of large-scale content providers for creating and amplifying campaign artefacts at scale.", "kill_chain_phases": [ @@ -4963,8 +4963,8 @@ "spec_version": "2.1", "id": "attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.633693Z", - "modified": "2023-09-25T16:17:56.633693Z", + "created": "2023-09-28T21:25:13.248135Z", + "modified": "2023-09-28T21:25:13.248135Z", "name": "Create Content Farms", "description": "An influence operation may create an organisation for creating and amplifying campaign artefacts at scale.", "kill_chain_phases": [ @@ -4996,8 +4996,8 @@ "spec_version": "2.1", "id": "attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.634211Z", - "modified": "2023-09-25T16:17:56.634211Z", + "created": "2023-09-28T21:25:13.248612Z", + "modified": "2023-09-28T21:25:13.248612Z", "name": "Outsource Content Creation to External Organisations", "description": "An influence operation may outsource content creation to external companies to avoid attribution, increase the rate of content creation, or improve content quality, i.e., by employing an organisation that can create content in the target audience\u2019s native language. Employed organisations may include marketing companies for tailored advertisements or external content farms for high volumes of targeted media.", "kill_chain_phases": [ @@ -5029,8 +5029,8 @@ "spec_version": "2.1", "id": "attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.634628Z", - "modified": "2023-09-25T16:17:56.634628Z", + "created": "2023-09-28T21:25:13.249041Z", + "modified": "2023-09-28T21:25:13.249041Z", "name": "Create Personas", "description": "Creating fake people, often with accounts across multiple platforms. These personas can be as simple as a name, can contain slightly more background like location, profile pictures, backstory, or can be effectively backstopped with indicators like fake identity documents.", "kill_chain_phases": [ @@ -5062,8 +5062,8 @@ "spec_version": "2.1", "id": "attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.634846Z", - "modified": "2023-09-25T16:17:56.634846Z", + "created": "2023-09-28T21:25:13.249554Z", + "modified": "2023-09-28T21:25:13.249554Z", "name": "Backstop Personas", "description": "Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believability", "kill_chain_phases": [ @@ -5095,8 +5095,8 @@ "spec_version": "2.1", "id": "attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.635104Z", - "modified": "2023-09-25T16:17:56.635104Z", + "created": "2023-09-28T21:25:13.250085Z", + "modified": "2023-09-28T21:25:13.250085Z", "name": "Establish Inauthentic News Sites", "description": "Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.", "kill_chain_phases": [ @@ -5128,8 +5128,8 @@ "spec_version": "2.1", "id": "attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.635463Z", - "modified": "2023-09-25T16:17:56.635463Z", + "created": "2023-09-28T21:25:13.250542Z", + "modified": "2023-09-28T21:25:13.250542Z", "name": "Create Inauthentic News Sites", "description": "Create Inauthentic News Sites", "kill_chain_phases": [ @@ -5161,8 +5161,8 @@ "spec_version": "2.1", "id": "attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.635795Z", - "modified": "2023-09-25T16:17:56.635795Z", + "created": "2023-09-28T21:25:13.250986Z", + "modified": "2023-09-28T21:25:13.250986Z", "name": "Leverage Existing Inauthentic News Sites", "description": "Leverage Existing Inauthentic News Sites", "kill_chain_phases": [ @@ -5194,8 +5194,8 @@ "spec_version": "2.1", "id": "attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.636164Z", - "modified": "2023-09-25T16:17:56.636164Z", + "created": "2023-09-28T21:25:13.251463Z", + "modified": "2023-09-28T21:25:13.251463Z", "name": "Prepare Assets Impersonating Legitimate Entities", "description": "An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organisations, or state entities. An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity\u2019s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct.", "kill_chain_phases": [ @@ -5227,8 +5227,8 @@ "spec_version": "2.1", "id": "attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.636729Z", - "modified": "2023-09-25T16:17:56.636729Z", + "created": "2023-09-28T21:25:13.251896Z", + "modified": "2023-09-28T21:25:13.251896Z", "name": "Astroturfing", "description": "Astroturfing occurs when an influence operation disguises itself as grassroots movement or organisation that supports operation narratives. Unlike butterfly attacks, astroturfing aims to increase the appearance of popular support for the operation cause and does not infiltrate existing groups to discredit their objectives.", "kill_chain_phases": [ @@ -5260,8 +5260,8 @@ "spec_version": "2.1", "id": "attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.637469Z", - "modified": "2023-09-25T16:17:56.637469Z", + "created": "2023-09-28T21:25:13.252368Z", + "modified": "2023-09-28T21:25:13.252368Z", "name": "Spoof/Parody Account/Site", "description": "An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organisations, or state entities.", "kill_chain_phases": [ @@ -5293,8 +5293,8 @@ "spec_version": "2.1", "id": "attack-pattern--283333f5-e161-4195-9070-5a7c22505adf", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.637907Z", - "modified": "2023-09-25T16:17:56.637907Z", + "created": "2023-09-28T21:25:13.252865Z", + "modified": "2023-09-28T21:25:13.252865Z", "name": "Co-Opt Trusted Sources", "description": "An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: - National or local new outlets - Research or academic publications - Online blogs or websites", "kill_chain_phases": [ @@ -5326,8 +5326,8 @@ "spec_version": "2.1", "id": "attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.638395Z", - "modified": "2023-09-25T16:17:56.638395Z", + "created": "2023-09-28T21:25:13.253297Z", + "modified": "2023-09-28T21:25:13.253297Z", "name": "Co-Opt Trusted Individuals", "description": "Co-Opt Trusted Individuals", "kill_chain_phases": [ @@ -5359,8 +5359,8 @@ "spec_version": "2.1", "id": "attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.63922Z", - "modified": "2023-09-25T16:17:56.63922Z", + "created": "2023-09-28T21:25:13.253721Z", + "modified": "2023-09-28T21:25:13.253721Z", "name": "Co-Opt Grassroots Groups", "description": "Co-Opt Grassroots Groups", "kill_chain_phases": [ @@ -5392,8 +5392,8 @@ "spec_version": "2.1", "id": "attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.639916Z", - "modified": "2023-09-25T16:17:56.639916Z", + "created": "2023-09-28T21:25:13.254245Z", + "modified": "2023-09-28T21:25:13.254245Z", "name": "Co-Opt Influencers", "description": "Co-opt Influencers", "kill_chain_phases": [ @@ -5425,8 +5425,8 @@ "spec_version": "2.1", "id": "attack-pattern--11352e9a-a52b-4ade-ad4f-ec64a15fa1d5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.640838Z", - "modified": "2023-09-25T16:17:56.640838Z", + "created": "2023-09-28T21:25:13.254922Z", + "modified": "2023-09-28T21:25:13.254922Z", "name": "Create Localised Content", "description": "Localised content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localised content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localised content may help an operation increase legitimacy, avoid detection, and complicate external attribution.", "kill_chain_phases": [ @@ -5458,8 +5458,8 @@ "spec_version": "2.1", "id": "attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.643292Z", - "modified": "2023-09-25T16:17:56.643292Z", + "created": "2023-09-28T21:25:13.255442Z", + "modified": "2023-09-28T21:25:13.255442Z", "name": "Leverage Echo Chambers/Filter Bubbles", "description": "An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with \u201cothers with which they are already in agreement.\u201d A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members.", "kill_chain_phases": [ @@ -5491,8 +5491,8 @@ "spec_version": "2.1", "id": "attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.644763Z", - "modified": "2023-09-25T16:17:56.644763Z", + "created": "2023-09-28T21:25:13.255837Z", + "modified": "2023-09-28T21:25:13.255837Z", "name": "Use Existing Echo Chambers/Filter Bubbles", "description": "Use existing Echo Chambers/Filter Bubbles", "kill_chain_phases": [ @@ -5524,8 +5524,8 @@ "spec_version": "2.1", "id": "attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.645337Z", - "modified": "2023-09-25T16:17:56.645337Z", + "created": "2023-09-28T21:25:13.256038Z", + "modified": "2023-09-28T21:25:13.256038Z", "name": "Create Echo Chambers/Filter Bubbles", "description": "Create Echo Chambers/Filter Bubbles", "kill_chain_phases": [ @@ -5557,8 +5557,8 @@ "spec_version": "2.1", "id": "attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.645644Z", - "modified": "2023-09-25T16:17:56.645644Z", + "created": "2023-09-28T21:25:13.256193Z", + "modified": "2023-09-28T21:25:13.256193Z", "name": "Exploit Data Voids", "description": "A data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. A 2019 report by Michael Golebiewski identifies five types of data voids. (1) \u201cBreaking news\u201d data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a \u201cstrategic new terms\u201d data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on \u201coutdated terms\u201d that have decreased in popularity, capitalising on most search engines\u2019 preferences for recency. (4) \u201cFragmented concepts\u201d data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use \u201cproblematic queries\u201d that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term.", "kill_chain_phases": [ @@ -5590,8 +5590,8 @@ "spec_version": "2.1", "id": "attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.646329Z", - "modified": "2023-09-25T16:17:56.646329Z", + "created": "2023-09-28T21:25:13.256347Z", + "modified": "2023-09-28T21:25:13.256347Z", "name": "Livestream", "description": "A livestream refers to an online broadcast capability that allows for real-time communication to closed or open networks.", "kill_chain_phases": [ @@ -5623,8 +5623,8 @@ "spec_version": "2.1", "id": "attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.646696Z", - "modified": "2023-09-25T16:17:56.646696Z", + "created": "2023-09-28T21:25:13.256885Z", + "modified": "2023-09-28T21:25:13.256885Z", "name": "Video Livestream", "description": "A video livestream refers to an online video broadcast capability that allows for real-time communication to closed or open networks.", "kill_chain_phases": [ @@ -5656,8 +5656,8 @@ "spec_version": "2.1", "id": "attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.647065Z", - "modified": "2023-09-25T16:17:56.647065Z", + "created": "2023-09-28T21:25:13.257306Z", + "modified": "2023-09-28T21:25:13.257306Z", "name": "Audio Livestream", "description": "An audio livestream refers to an online audio broadcast capability that allows for real-time communication to closed or open networks.", "kill_chain_phases": [ @@ -5689,8 +5689,8 @@ "spec_version": "2.1", "id": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.647464Z", - "modified": "2023-09-25T16:17:56.647464Z", + "created": "2023-09-28T21:25:13.257486Z", + "modified": "2023-09-28T21:25:13.257486Z", "name": "Social Networks", "description": "Social media are interactive digital channels that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks.", "kill_chain_phases": [ @@ -5722,8 +5722,8 @@ "spec_version": "2.1", "id": "attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.647861Z", - "modified": "2023-09-25T16:17:56.647861Z", + "created": "2023-09-28T21:25:13.257668Z", + "modified": "2023-09-28T21:25:13.257668Z", "name": "Mainstream Social Networks", "description": "Examples include Facebook, Twitter, LinkedIn, etc.", "kill_chain_phases": [ @@ -5755,8 +5755,8 @@ "spec_version": "2.1", "id": "attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.648254Z", - "modified": "2023-09-25T16:17:56.648254Z", + "created": "2023-09-28T21:25:13.257828Z", + "modified": "2023-09-28T21:25:13.257828Z", "name": "Dating Apps", "description": "Dating Apps", "kill_chain_phases": [ @@ -5788,8 +5788,8 @@ "spec_version": "2.1", "id": "attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.648664Z", - "modified": "2023-09-25T16:17:56.648664Z", + "created": "2023-09-28T21:25:13.257984Z", + "modified": "2023-09-28T21:25:13.257984Z", "name": "Private/Closed Social Networks", "description": "Social networks that are not open to people outside of family, friends, neighbours, or co-workers. Non-work-related examples include Couple, FamilyWall, 23snaps, and Nextdoor. Some of the larger social network platforms enable closed communities: examples are Instagram Close Friends and Twitter (X) Circle. Work-related examples of private social networks include LinkedIn, Facebook Workplace, and enterprise communication platforms such as Slack or Microsoft Teams.", "kill_chain_phases": [ @@ -5821,8 +5821,8 @@ "spec_version": "2.1", "id": "attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.649209Z", - "modified": "2023-09-25T16:17:56.649209Z", + "created": "2023-09-28T21:25:13.258181Z", + "modified": "2023-09-28T21:25:13.258181Z", "name": "Interest-Based Networks", "description": "Examples include smaller and niche networks including Gettr, Truth Social, Parler, etc.", "kill_chain_phases": [ @@ -5854,8 +5854,8 @@ "spec_version": "2.1", "id": "attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.650118Z", - "modified": "2023-09-25T16:17:56.650118Z", + "created": "2023-09-28T21:25:13.258527Z", + "modified": "2023-09-28T21:25:13.258527Z", "name": "Use Hashtags", "description": "Use a dedicated, existing hashtag for the campaign/incident.", "kill_chain_phases": [ @@ -5887,8 +5887,8 @@ "spec_version": "2.1", "id": "attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.650615Z", - "modified": "2023-09-25T16:17:56.650615Z", + "created": "2023-09-28T21:25:13.258959Z", + "modified": "2023-09-28T21:25:13.258959Z", "name": "Create Dedicated Hashtag", "description": "Create a campaign/incident specific hashtag.", "kill_chain_phases": [ @@ -5920,8 +5920,8 @@ "spec_version": "2.1", "id": "attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651001Z", - "modified": "2023-09-25T16:17:56.651001Z", + "created": "2023-09-28T21:25:13.259452Z", + "modified": "2023-09-28T21:25:13.259452Z", "name": "Media Sharing Networks", "description": "Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.", "kill_chain_phases": [ @@ -5953,8 +5953,8 @@ "spec_version": "2.1", "id": "attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651419Z", - "modified": "2023-09-25T16:17:56.651419Z", + "created": "2023-09-28T21:25:13.259826Z", + "modified": "2023-09-28T21:25:13.259826Z", "name": "Photo Sharing", "description": "Examples include Instagram, Snapchat, Flickr, etc", "kill_chain_phases": [ @@ -5986,8 +5986,8 @@ "spec_version": "2.1", "id": "attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651719Z", - "modified": "2023-09-25T16:17:56.651719Z", + "created": "2023-09-28T21:25:13.260018Z", + "modified": "2023-09-28T21:25:13.260018Z", "name": "Video Sharing", "description": "Examples include Youtube, TikTok, ShareChat, Rumble, etc", "kill_chain_phases": [ @@ -6019,8 +6019,8 @@ "spec_version": "2.1", "id": "attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651958Z", - "modified": "2023-09-25T16:17:56.651958Z", + "created": "2023-09-28T21:25:13.260345Z", + "modified": "2023-09-28T21:25:13.260345Z", "name": "Audio Sharing", "description": "Examples include podcasting apps, Soundcloud, etc.", "kill_chain_phases": [ @@ -6052,8 +6052,8 @@ "spec_version": "2.1", "id": "attack-pattern--9b6b3dea-54ac-4e00-bd92-380555205afe", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.652178Z", - "modified": "2023-09-25T16:17:56.652178Z", + "created": "2023-09-28T21:25:13.260838Z", + "modified": "2023-09-28T21:25:13.260838Z", "name": "Discussion Forums", "description": "Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc.", "kill_chain_phases": [ @@ -6085,8 +6085,8 @@ "spec_version": "2.1", "id": "attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.652483Z", - "modified": "2023-09-25T16:17:56.652483Z", + "created": "2023-09-28T21:25:13.261294Z", + "modified": "2023-09-28T21:25:13.261294Z", "name": "Anonymous Message Boards", "description": "Examples include the Chans", "kill_chain_phases": [ @@ -6118,8 +6118,8 @@ "spec_version": "2.1", "id": "attack-pattern--b69275ef-ba3d-409f-a857-40d4d1870dca", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.65295Z", - "modified": "2023-09-25T16:17:56.65295Z", + "created": "2023-09-28T21:25:13.261742Z", + "modified": "2023-09-28T21:25:13.261742Z", "name": "Bookmarking and Content Curation", "description": "Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc.", "kill_chain_phases": [ @@ -6151,8 +6151,8 @@ "spec_version": "2.1", "id": "attack-pattern--d4e35ba1-f83d-41b4-a862-caabb634cc3e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.653463Z", - "modified": "2023-09-25T16:17:56.653463Z", + "created": "2023-09-28T21:25:13.262253Z", + "modified": "2023-09-28T21:25:13.262253Z", "name": "Blogging and Publishing Networks", "description": "Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc.", "kill_chain_phases": [ @@ -6184,8 +6184,8 @@ "spec_version": "2.1", "id": "attack-pattern--da4ae172-c8c8-4eb1-bc03-c5198624c8a2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.654059Z", - "modified": "2023-09-25T16:17:56.654059Z", + "created": "2023-09-28T21:25:13.262725Z", + "modified": "2023-09-28T21:25:13.262725Z", "name": "Consumer Review Networks", "description": "Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc.", "kill_chain_phases": [ @@ -6217,8 +6217,8 @@ "spec_version": "2.1", "id": "attack-pattern--d4813d4a-2afe-4c0e-8ddb-b21973bb283a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.655315Z", - "modified": "2023-09-25T16:17:56.655315Z", + "created": "2023-09-28T21:25:13.263231Z", + "modified": "2023-09-28T21:25:13.263231Z", "name": "Formal Diplomatic Channels", "description": "Leveraging formal, traditional, diplomatic channels to communicate with foreign governments (written documents, meetings, summits, diplomatic visits, etc). This type of diplomacy is conducted by diplomats of one nation with diplomats and other officials of another nation or international organisation.", "kill_chain_phases": [ @@ -6250,8 +6250,8 @@ "spec_version": "2.1", "id": "attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.656146Z", - "modified": "2023-09-25T16:17:56.656146Z", + "created": "2023-09-28T21:25:13.263697Z", + "modified": "2023-09-28T21:25:13.263697Z", "name": "Traditional Media", "description": "Examples include TV, Newspaper, Radio, etc.", "kill_chain_phases": [ @@ -6283,8 +6283,8 @@ "spec_version": "2.1", "id": "attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.65666Z", - "modified": "2023-09-25T16:17:56.65666Z", + "created": "2023-09-28T21:25:13.264206Z", + "modified": "2023-09-28T21:25:13.264206Z", "name": "TV", "description": "TV", "kill_chain_phases": [ @@ -6316,8 +6316,8 @@ "spec_version": "2.1", "id": "attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.657178Z", - "modified": "2023-09-25T16:17:56.657178Z", + "created": "2023-09-28T21:25:13.264749Z", + "modified": "2023-09-28T21:25:13.264749Z", "name": "Newspaper", "description": "Newspaper", "kill_chain_phases": [ @@ -6349,8 +6349,8 @@ "spec_version": "2.1", "id": "attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.662034Z", - "modified": "2023-09-25T16:17:56.662034Z", + "created": "2023-09-28T21:25:13.265297Z", + "modified": "2023-09-28T21:25:13.265297Z", "name": "Radio", "description": "Radio", "kill_chain_phases": [ @@ -6382,8 +6382,8 @@ "spec_version": "2.1", "id": "attack-pattern--c54dd9c4-5b7b-47a9-bb40-e63967b2ec33", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.663415Z", - "modified": "2023-09-25T16:17:56.663415Z", + "created": "2023-09-28T21:25:13.265873Z", + "modified": "2023-09-28T21:25:13.265873Z", "name": "Email", "description": "Delivering content and narratives via email. This can include using list management or high-value individually targeted messaging.", "kill_chain_phases": [ @@ -6415,8 +6415,8 @@ "spec_version": "2.1", "id": "attack-pattern--245d117b-2700-462e-97d4-be9b4b3745c4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.663835Z", - "modified": "2023-09-25T16:17:56.663835Z", + "created": "2023-09-28T21:25:13.266341Z", + "modified": "2023-09-28T21:25:13.266341Z", "name": "Employ Commercial Analytic Firms", "description": "Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences.", "kill_chain_phases": [ @@ -6448,8 +6448,8 @@ "spec_version": "2.1", "id": "attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.664206Z", - "modified": "2023-09-25T16:17:56.664206Z", + "created": "2023-09-28T21:25:13.266843Z", + "modified": "2023-09-28T21:25:13.266843Z", "name": "Deliver Ads", "description": "Delivering content via any form of paid media or advertising.", "kill_chain_phases": [ @@ -6481,8 +6481,8 @@ "spec_version": "2.1", "id": "attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.665004Z", - "modified": "2023-09-25T16:17:56.665004Z", + "created": "2023-09-28T21:25:13.267305Z", + "modified": "2023-09-28T21:25:13.267305Z", "name": "Social Media", "description": "Social Media", "kill_chain_phases": [ @@ -6514,8 +6514,8 @@ "spec_version": "2.1", "id": "attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.665988Z", - "modified": "2023-09-25T16:17:56.665988Z", + "created": "2023-09-28T21:25:13.267811Z", + "modified": "2023-09-28T21:25:13.267811Z", "name": "Traditional Media", "description": "Examples include TV, Radio, Newspaper, billboards", "kill_chain_phases": [ @@ -6547,8 +6547,8 @@ "spec_version": "2.1", "id": "attack-pattern--1997947a-7e08-4ea9-802c-85391d561266", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.667424Z", - "modified": "2023-09-25T16:17:56.667424Z", + "created": "2023-09-28T21:25:13.268338Z", + "modified": "2023-09-28T21:25:13.268338Z", "name": "Post Content", "description": "Delivering content by posting via owned media (assets that the operator controls).", "kill_chain_phases": [ @@ -6580,8 +6580,8 @@ "spec_version": "2.1", "id": "attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.668486Z", - "modified": "2023-09-25T16:17:56.668486Z", + "created": "2023-09-28T21:25:13.268804Z", + "modified": "2023-09-28T21:25:13.268804Z", "name": "Share Memes", "description": "Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.", "kill_chain_phases": [ @@ -6613,8 +6613,8 @@ "spec_version": "2.1", "id": "attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.669719Z", - "modified": "2023-09-25T16:17:56.669719Z", + "created": "2023-09-28T21:25:13.269329Z", + "modified": "2023-09-28T21:25:13.269329Z", "name": "Post Violative Content to Provoke Takedown and Backlash", "description": "Post Violative Content to Provoke Takedown and Backlash.", "kill_chain_phases": [ @@ -6646,8 +6646,8 @@ "spec_version": "2.1", "id": "attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.670686Z", - "modified": "2023-09-25T16:17:56.670686Z", + "created": "2023-09-28T21:25:13.269813Z", + "modified": "2023-09-28T21:25:13.269813Z", "name": "One-Way Direct Posting", "description": "Direct posting refers to a method of posting content via a one-way messaging service, where the recipient cannot directly respond to the poster\u2019s messaging. An influence operation may post directly to promote operation narratives to the target audience without allowing opportunities for fact-checking or disagreement, creating a false sense of support for the narrative.", "kill_chain_phases": [ @@ -6679,8 +6679,8 @@ "spec_version": "2.1", "id": "attack-pattern--318f2a34-07b6-4c4b-9bb0-58f5bca681fc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.671099Z", - "modified": "2023-09-25T16:17:56.671099Z", + "created": "2023-09-28T21:25:13.270307Z", + "modified": "2023-09-28T21:25:13.270307Z", "name": "Comment or Reply on Content", "description": "Delivering content by replying or commenting via owned media (assets that the operator controls).", "kill_chain_phases": [ @@ -6712,8 +6712,8 @@ "spec_version": "2.1", "id": "attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.671832Z", - "modified": "2023-09-25T16:17:56.671832Z", + "created": "2023-09-28T21:25:13.270783Z", + "modified": "2023-09-28T21:25:13.270783Z", "name": "Post Inauthentic Social Media Comment", "description": "Use government-paid social media commenters, astroturfers, chat bots (programmed to reply to specific key words/hashtags) influence online conversations, product reviews, web-site comment forums.", "kill_chain_phases": [ @@ -6745,8 +6745,8 @@ "spec_version": "2.1", "id": "attack-pattern--72df7e55-dc60-4a7e-9928-ed41ac0e1581", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.672848Z", - "modified": "2023-09-25T16:17:56.672848Z", + "created": "2023-09-28T21:25:13.271321Z", + "modified": "2023-09-28T21:25:13.271321Z", "name": "Attract Traditional Media", "description": "Deliver content by attracting the attention of traditional media (earned media).", "kill_chain_phases": [ @@ -6778,8 +6778,8 @@ "spec_version": "2.1", "id": "attack-pattern--836e9eef-b446-4f68-805f-0f10116d6e7f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.673959Z", - "modified": "2023-09-25T16:17:56.673959Z", + "created": "2023-09-28T21:25:13.271782Z", + "modified": "2023-09-28T21:25:13.271782Z", "name": "Amplify Existing Narrative", "description": "An influence operation may amplify existing narratives that align with its narratives to support operation objectives.", "kill_chain_phases": [ @@ -6811,8 +6811,8 @@ "spec_version": "2.1", "id": "attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.674329Z", - "modified": "2023-09-25T16:17:56.674329Z", + "created": "2023-09-28T21:25:13.272585Z", + "modified": "2023-09-28T21:25:13.272585Z", "name": "Cross-Posting", "description": "Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience.", "kill_chain_phases": [ @@ -6844,8 +6844,8 @@ "spec_version": "2.1", "id": "attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.674845Z", - "modified": "2023-09-25T16:17:56.674845Z", + "created": "2023-09-28T21:25:13.272851Z", + "modified": "2023-09-28T21:25:13.272851Z", "name": "Post across Groups", "description": "An influence operation may post content across groups to spread narratives and content to new communities within the target audiences or to new target audiences.", "kill_chain_phases": [ @@ -6877,8 +6877,8 @@ "spec_version": "2.1", "id": "attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.675524Z", - "modified": "2023-09-25T16:17:56.675524Z", + "created": "2023-09-28T21:25:13.273066Z", + "modified": "2023-09-28T21:25:13.273066Z", "name": "Post across Platform", "description": "An influence operation may post content across platforms to spread narratives and content to new communities within the target audiences or to new target audiences. Posting across platforms can also remove opposition and context, helping the narrative spread with less opposition on the cross-posted platform.", "kill_chain_phases": [ @@ -6910,8 +6910,8 @@ "spec_version": "2.1", "id": "attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.675855Z", - "modified": "2023-09-25T16:17:56.675855Z", + "created": "2023-09-28T21:25:13.273283Z", + "modified": "2023-09-28T21:25:13.273283Z", "name": "Post across Disciplines", "description": "Post Across Disciplines", "kill_chain_phases": [ @@ -6943,8 +6943,8 @@ "spec_version": "2.1", "id": "attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.677498Z", - "modified": "2023-09-25T16:17:56.677498Z", + "created": "2023-09-28T21:25:13.273494Z", + "modified": "2023-09-28T21:25:13.273494Z", "name": "Incentivize Sharing", "description": "Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.", "kill_chain_phases": [ @@ -6976,8 +6976,8 @@ "spec_version": "2.1", "id": "attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.678764Z", - "modified": "2023-09-25T16:17:56.678764Z", + "created": "2023-09-28T21:25:13.273641Z", + "modified": "2023-09-28T21:25:13.273641Z", "name": "Use Affiliate Marketing Programmes", "description": "Use Affiliate Marketing Programmes", "kill_chain_phases": [ @@ -7009,8 +7009,8 @@ "spec_version": "2.1", "id": "attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.679944Z", - "modified": "2023-09-25T16:17:56.679944Z", + "created": "2023-09-28T21:25:13.273783Z", + "modified": "2023-09-28T21:25:13.273783Z", "name": "Use Contests and Prizes", "description": "Use Contests and Prizes", "kill_chain_phases": [ @@ -7042,8 +7042,8 @@ "spec_version": "2.1", "id": "attack-pattern--7e3a06ee-c109-4901-8720-69c46fe04a76", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.680668Z", - "modified": "2023-09-25T16:17:56.680668Z", + "created": "2023-09-28T21:25:13.273944Z", + "modified": "2023-09-28T21:25:13.273944Z", "name": "Manipulate Platform Algorithm", "description": "Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analysing a platform\u2019s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation\u2019s strategy. For example, an influence operation may use bots to amplify its posts so that the platform\u2019s algorithm recognises engagement with operation content and further promotes the content on user timelines.", "kill_chain_phases": [ @@ -7075,8 +7075,8 @@ "spec_version": "2.1", "id": "attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.681531Z", - "modified": "2023-09-25T16:17:56.681531Z", + "created": "2023-09-28T21:25:13.274087Z", + "modified": "2023-09-28T21:25:13.274087Z", "name": "Bypass Content Blocking", "description": "Bypassing content blocking refers to actions taken to circumvent network security measures that prevent users from accessing certain servers, resources, or other online spheres. An influence operation may bypass content blocking to proliferate its content on restricted areas of the internet. Common strategies for bypassing content blocking include: - Altering IP addresses to avoid IP filtering - Using a Virtual Private Network (VPN) to avoid IP filtering - Using a Content Delivery Network (CDN) to avoid IP filtering - Enabling encryption to bypass packet inspection blocking - Manipulating text to avoid filtering by keywords - Posting content on multiple platforms to avoid platform-specific removals - Using local facilities or modified DNS servers to avoid DNS filtering", "kill_chain_phases": [ @@ -7108,8 +7108,8 @@ "spec_version": "2.1", "id": "attack-pattern--690761b6-8afd-4dd5-954e-174de362d1b0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.682265Z", - "modified": "2023-09-25T16:17:56.682265Z", + "created": "2023-09-28T21:25:13.274229Z", + "modified": "2023-09-28T21:25:13.274229Z", "name": "Direct Users to Alternative Platforms", "description": "Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content.", "kill_chain_phases": [ @@ -7141,8 +7141,8 @@ "spec_version": "2.1", "id": "attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.683246Z", - "modified": "2023-09-25T16:17:56.683246Z", + "created": "2023-09-28T21:25:13.274372Z", + "modified": "2023-09-28T21:25:13.274372Z", "name": "Control Information Environment through Offensive Cyberspace Operations", "description": "Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritise operation messaging or block opposition messaging.", "kill_chain_phases": [ @@ -7174,8 +7174,8 @@ "spec_version": "2.1", "id": "attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.683514Z", - "modified": "2023-09-25T16:17:56.683514Z", + "created": "2023-09-28T21:25:13.274512Z", + "modified": "2023-09-28T21:25:13.274512Z", "name": "Delete Opposing Content", "description": "Deleting opposing content refers to the removal of content that conflicts with operational narratives from selected platforms. An influence operation may delete opposing content to censor contradictory information from the target audience, allowing operation narratives to take priority in the information space.", "kill_chain_phases": [ @@ -7207,8 +7207,8 @@ "spec_version": "2.1", "id": "attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.683782Z", - "modified": "2023-09-25T16:17:56.683782Z", + "created": "2023-09-28T21:25:13.274682Z", + "modified": "2023-09-28T21:25:13.274682Z", "name": "Block Content", "description": "Content blocking refers to actions taken to restrict internet access or render certain areas of the internet inaccessible. An influence operation may restrict content based on both network and content attributes.", "kill_chain_phases": [ @@ -7240,8 +7240,8 @@ "spec_version": "2.1", "id": "attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.684021Z", - "modified": "2023-09-25T16:17:56.684021Z", + "created": "2023-09-28T21:25:13.27495Z", + "modified": "2023-09-28T21:25:13.27495Z", "name": "Destroy Information Generation Capabilities", "description": "Destroying information generation capabilities refers to actions taken to limit, degrade, or otherwise incapacitate an actor\u2019s ability to generate conflicting information. An influence operation may destroy an actor\u2019s information generation capabilities by physically dismantling the information infrastructure, disconnecting resources needed for information generation, or redirecting information generation personnel. An operation may destroy an adversary\u2019s information generation capabilities to limit conflicting content exposure to the target audience and crowd the information space with its own narratives.", "kill_chain_phases": [ @@ -7273,8 +7273,8 @@ "spec_version": "2.1", "id": "attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.684273Z", - "modified": "2023-09-25T16:17:56.684273Z", + "created": "2023-09-28T21:25:13.275328Z", + "modified": "2023-09-28T21:25:13.275328Z", "name": "Conduct Server Redirect", "description": "A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side or client-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.", "kill_chain_phases": [ @@ -7306,8 +7306,8 @@ "spec_version": "2.1", "id": "attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.684615Z", - "modified": "2023-09-25T16:17:56.684615Z", + "created": "2023-09-28T21:25:13.275468Z", + "modified": "2023-09-28T21:25:13.275468Z", "name": "Suppress Opposition", "description": "Operators can suppress the opposition by exploiting platform content moderation tools and processes like reporting non-violative content to platforms for takedown and goading opposition actors into taking actions that result in platform action or target audience disapproval.", "kill_chain_phases": [ @@ -7339,8 +7339,8 @@ "spec_version": "2.1", "id": "attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.68496Z", - "modified": "2023-09-25T16:17:56.68496Z", + "created": "2023-09-28T21:25:13.275608Z", + "modified": "2023-09-28T21:25:13.275608Z", "name": "Report Non-Violative Opposing Content", "description": "Reporting opposing content refers to notifying and providing an instance of a violation of a platform\u2019s guidelines and policies for conduct on the platform. In addition to simply reporting the content, an operation may leverage copyright regulations to trick social media and web platforms into removing opposing content by manipulating the content to appear in violation of copyright laws. Reporting opposing content facilitates the suppression of contradictory information and allows operation narratives to take priority in the information space.", "kill_chain_phases": [ @@ -7372,8 +7372,8 @@ "spec_version": "2.1", "id": "attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.686015Z", - "modified": "2023-09-25T16:17:56.686015Z", + "created": "2023-09-28T21:25:13.275963Z", + "modified": "2023-09-28T21:25:13.275963Z", "name": "Goad People into Harmful Action (Stop Hitting Yourself)", "description": "Goad people into actions that violate terms of service or will lead to having their content or accounts taken down.", "kill_chain_phases": [ @@ -7405,8 +7405,8 @@ "spec_version": "2.1", "id": "attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.686385Z", - "modified": "2023-09-25T16:17:56.686385Z", + "created": "2023-09-28T21:25:13.276393Z", + "modified": "2023-09-28T21:25:13.276393Z", "name": "Exploit Platform TOS/Content Moderation", "description": "Exploit Platform TOS/Content Moderation", "kill_chain_phases": [ @@ -7438,8 +7438,8 @@ "spec_version": "2.1", "id": "attack-pattern--fd04fba0-0e20-40f9-868d-e8effcf6dab6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.686658Z", - "modified": "2023-09-25T16:17:56.686658Z", + "created": "2023-09-28T21:25:13.276552Z", + "modified": "2023-09-28T21:25:13.276552Z", "name": "Platform Filtering", "description": "Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation)", "kill_chain_phases": [ @@ -7471,8 +7471,8 @@ "spec_version": "2.1", "id": "attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.68687Z", - "modified": "2023-09-25T16:17:56.68687Z", + "created": "2023-09-28T21:25:13.27669Z", + "modified": "2023-09-28T21:25:13.27669Z", "name": "Encourage Attendance at Events", "description": "Operation encourages attendance at existing real world event.", "kill_chain_phases": [ @@ -7504,8 +7504,8 @@ "spec_version": "2.1", "id": "attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687102Z", - "modified": "2023-09-25T16:17:56.687102Z", + "created": "2023-09-28T21:25:13.276828Z", + "modified": "2023-09-28T21:25:13.276828Z", "name": "Call to Action to Attend", "description": "Call to action to attend an event", "kill_chain_phases": [ @@ -7537,8 +7537,8 @@ "spec_version": "2.1", "id": "attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.68731Z", - "modified": "2023-09-25T16:17:56.68731Z", + "created": "2023-09-28T21:25:13.276967Z", + "modified": "2023-09-28T21:25:13.276967Z", "name": "Facilitate Logistics or Support for Attendance", "description": "Facilitate logistics or support for travel, food, housing, etc.", "kill_chain_phases": [ @@ -7570,8 +7570,8 @@ "spec_version": "2.1", "id": "attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687534Z", - "modified": "2023-09-25T16:17:56.687534Z", + "created": "2023-09-28T21:25:13.277105Z", + "modified": "2023-09-28T21:25:13.277105Z", "name": "Physical Violence", "description": "Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value.", "kill_chain_phases": [ @@ -7603,8 +7603,8 @@ "spec_version": "2.1", "id": "attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687738Z", - "modified": "2023-09-25T16:17:56.687738Z", + "created": "2023-09-28T21:25:13.277243Z", + "modified": "2023-09-28T21:25:13.277243Z", "name": "Conduct Physical Violence", "description": "An influence operation may directly Conduct Physical Violence to achieve campaign goals.", "kill_chain_phases": [ @@ -7636,8 +7636,8 @@ "spec_version": "2.1", "id": "attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687957Z", - "modified": "2023-09-25T16:17:56.687957Z", + "created": "2023-09-28T21:25:13.277436Z", + "modified": "2023-09-28T21:25:13.277436Z", "name": "Encourage Physical Violence", "description": "An influence operation may Encourage others to engage in Physical Violence to achieve campaign goals.", "kill_chain_phases": [ @@ -7669,8 +7669,8 @@ "spec_version": "2.1", "id": "attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688166Z", - "modified": "2023-09-25T16:17:56.688166Z", + "created": "2023-09-28T21:25:13.277655Z", + "modified": "2023-09-28T21:25:13.277655Z", "name": "Conceal Information Assets", "description": "Conceal the identity or provenance of campaign information assets such as accounts, channels, pages etc. to avoid takedown and attribution.", "kill_chain_phases": [ @@ -7702,8 +7702,8 @@ "spec_version": "2.1", "id": "attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688367Z", - "modified": "2023-09-25T16:17:56.688367Z", + "created": "2023-09-28T21:25:13.278041Z", + "modified": "2023-09-28T21:25:13.278041Z", "name": "Use Pseudonyms", "description": "An operation may use pseudonyms, or fake names, to mask the identity of operational accounts, channels, pages etc., publish anonymous content, or otherwise use falsified personas to conceal the identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account, channel, or page with the same falsified name.", "kill_chain_phases": [ @@ -7735,8 +7735,8 @@ "spec_version": "2.1", "id": "attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688597Z", - "modified": "2023-09-25T16:17:56.688597Z", + "created": "2023-09-28T21:25:13.27818Z", + "modified": "2023-09-28T21:25:13.27818Z", "name": "Conceal Network Identity", "description": "Concealing network identity aims to hide the existence an influence operation\u2019s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.", "kill_chain_phases": [ @@ -7768,8 +7768,8 @@ "spec_version": "2.1", "id": "attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688811Z", - "modified": "2023-09-25T16:17:56.688811Z", + "created": "2023-09-28T21:25:13.278442Z", + "modified": "2023-09-28T21:25:13.278442Z", "name": "Distance Reputable Individuals from Operation", "description": "Distancing reputable individuals from the operation occurs when enlisted individuals, such as celebrities or subject matter experts, actively disengage themselves from operation activities and messaging. Individuals may distance themselves from the operation by deleting old posts or statements, unfollowing operation information assets, or otherwise detaching themselves from the operation\u2019s timeline. An influence operation may want reputable individuals to distance themselves from the operation to reduce operation exposure, particularly if the operation aims to remove all evidence.", "kill_chain_phases": [ @@ -7801,8 +7801,8 @@ "spec_version": "2.1", "id": "attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.689063Z", - "modified": "2023-09-25T16:17:56.689063Z", + "created": "2023-09-28T21:25:13.278837Z", + "modified": "2023-09-28T21:25:13.278837Z", "name": "Launder Information Assets", "description": "Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution.", "kill_chain_phases": [ @@ -7834,8 +7834,8 @@ "spec_version": "2.1", "id": "attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.689297Z", - "modified": "2023-09-25T16:17:56.689297Z", + "created": "2023-09-28T21:25:13.278976Z", + "modified": "2023-09-28T21:25:13.278976Z", "name": "Change Names of Information Assets", "description": "Changing names or brand names of information assets such as accounts, channels, pages etc. An operation may change the names or brand names of its assets throughout an operation to avoid detection or alter the names of newly acquired or repurposed assets to fit operational narratives.", "kill_chain_phases": [ @@ -7867,8 +7867,8 @@ "spec_version": "2.1", "id": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.689689Z", - "modified": "2023-09-25T16:17:56.689689Z", + "created": "2023-09-28T21:25:13.279115Z", + "modified": "2023-09-28T21:25:13.279115Z", "name": "Conceal Operational Activity", "description": "Conceal the campaign's operational activity to avoid takedown and attribution.", "kill_chain_phases": [ @@ -7900,8 +7900,8 @@ "spec_version": "2.1", "id": "attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.69011Z", - "modified": "2023-09-25T16:17:56.69011Z", + "created": "2023-09-28T21:25:13.279479Z", + "modified": "2023-09-28T21:25:13.279479Z", "name": "Conceal Network Identity", "description": "Concealing network identity aims to hide the existence an influence operation\u2019s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.", "kill_chain_phases": [ @@ -7933,8 +7933,8 @@ "spec_version": "2.1", "id": "attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.690422Z", - "modified": "2023-09-25T16:17:56.690422Z", + "created": "2023-09-28T21:25:13.279929Z", + "modified": "2023-09-28T21:25:13.279929Z", "name": "Generate Content Unrelated to Narrative", "description": "An influence operation may mix its own operation content with legitimate news or external unrelated content to disguise operational objectives, narratives, or existence. For example, an operation may generate \"lifestyle\" or \"cuisine\" content alongside regular operation content.", "kill_chain_phases": [ @@ -7966,8 +7966,8 @@ "spec_version": "2.1", "id": "attack-pattern--3437993c-c521-4145-a2d8-b860399876b0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.690653Z", - "modified": "2023-09-25T16:17:56.690653Z", + "created": "2023-09-28T21:25:13.2801Z", + "modified": "2023-09-28T21:25:13.2801Z", "name": "Break Association with Content", "description": "Breaking association with content occurs when an influence operation actively separates itself from its own content. An influence operation may break association with content by unfollowing, unliking, or unsharing its content, removing attribution from its content, or otherwise taking actions that distance the operation from its messaging. An influence operation may break association with its content to complicate attribution or regain credibility for a new operation.", "kill_chain_phases": [ @@ -7999,8 +7999,8 @@ "spec_version": "2.1", "id": "attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.69086Z", - "modified": "2023-09-25T16:17:56.69086Z", + "created": "2023-09-28T21:25:13.280245Z", + "modified": "2023-09-28T21:25:13.280245Z", "name": "Delete URLs", "description": "URL deletion occurs when an influence operation completely removes its website registration, rendering the URL inaccessible. An influence operation may delete its URLs to complicate attribution or remove online documentation that the operation ever occurred.", "kill_chain_phases": [ @@ -8032,8 +8032,8 @@ "spec_version": "2.1", "id": "attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.691175Z", - "modified": "2023-09-25T16:17:56.691175Z", + "created": "2023-09-28T21:25:13.280391Z", + "modified": "2023-09-28T21:25:13.280391Z", "name": "Coordinate on Encrypted/Closed Networks", "description": "Coordinate on encrypted/ closed networks", "kill_chain_phases": [ @@ -8065,8 +8065,8 @@ "spec_version": "2.1", "id": "attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.691451Z", - "modified": "2023-09-25T16:17:56.691451Z", + "created": "2023-09-28T21:25:13.280677Z", + "modified": "2023-09-28T21:25:13.280677Z", "name": "Deny Involvement", "description": "Without \"smoking gun\" proof (and even with proof), incident creator can or will deny involvement. This technique also leverages the attacker advantages outlined in \"Demand insurmountable proof\", specifically the asymmetric disadvantage for truth-tellers in a \"firehose of misinformation\" environment.", "kill_chain_phases": [ @@ -8098,8 +8098,8 @@ "spec_version": "2.1", "id": "attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.693681Z", - "modified": "2023-09-25T16:17:56.693681Z", + "created": "2023-09-28T21:25:13.281952Z", + "modified": "2023-09-28T21:25:13.281952Z", "name": "Delete Accounts/Account Activity", "description": "Deleting accounts and account activity occurs when an influence operation removes its online social media assets, including social media accounts, posts, likes, comments, and other online artefacts. An influence operation may delete its accounts and account activity to complicate attribution or remove online documentation that the operation ever occurred.", "kill_chain_phases": [ @@ -8131,8 +8131,8 @@ "spec_version": "2.1", "id": "attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.694715Z", - "modified": "2023-09-25T16:17:56.694715Z", + "created": "2023-09-28T21:25:13.282451Z", + "modified": "2023-09-28T21:25:13.282451Z", "name": "Redirect URLs", "description": "An influence operation may redirect its falsified or typosquatted URLs to legitimate websites to increase the operation's appearance of legitimacy, complicate attribution, and avoid detection.", "kill_chain_phases": [ @@ -8164,8 +8164,8 @@ "spec_version": "2.1", "id": "attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.695784Z", - "modified": "2023-09-25T16:17:56.695784Z", + "created": "2023-09-28T21:25:13.282986Z", + "modified": "2023-09-28T21:25:13.282986Z", "name": "Remove Post Origins", "description": "Removing post origins refers to the elimination of evidence that indicates the initial source of operation content, often to complicate attribution. An influence operation may remove post origins by deleting watermarks, renaming files, or removing embedded links in its content.", "kill_chain_phases": [ @@ -8197,8 +8197,8 @@ "spec_version": "2.1", "id": "attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.696473Z", - "modified": "2023-09-25T16:17:56.696473Z", + "created": "2023-09-28T21:25:13.283543Z", + "modified": "2023-09-28T21:25:13.283543Z", "name": "Misattribute Activity", "description": "Misattributed activity refers to incorrectly attributed operation activity. For example, a state sponsored influence operation may conduct operation activity in a way that mimics another state so that external entities misattribute activity to the incorrect state. An operation may misattribute their activities to complicate attribution, avoid detection, or frame an adversary for negative behaviour.", "kill_chain_phases": [ @@ -8230,8 +8230,8 @@ "spec_version": "2.1", "id": "attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.696916Z", - "modified": "2023-09-25T16:17:56.696916Z", + "created": "2023-09-28T21:25:13.284035Z", + "modified": "2023-09-28T21:25:13.284035Z", "name": "Conceal Infrastructure", "description": "Conceal the campaign's infrastructure to avoid takedown and attribution.", "kill_chain_phases": [ @@ -8263,8 +8263,8 @@ "spec_version": "2.1", "id": "attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.697341Z", - "modified": "2023-09-25T16:17:56.697341Z", + "created": "2023-09-28T21:25:13.284619Z", + "modified": "2023-09-28T21:25:13.284619Z", "name": "Conceal Sponsorship", "description": "Concealing sponsorship aims to mislead or obscure the identity of the hidden sponsor behind an operation rather than entity publicly running the operation. Operations that conceal sponsorship may maintain visible falsified groups, news outlets, non-profits, or other organisations, but seek to mislead or obscure the identity sponsoring, funding, or otherwise supporting these entities. Influence operations may use a variety of techniques to mask the location of their social media accounts to complicate attribution and conceal evidence of foreign interference. Operation accounts may set their location to a false place, often the location of the operation\u2019s target audience, and post in the region\u2019s language", "kill_chain_phases": [ @@ -8296,8 +8296,8 @@ "spec_version": "2.1", "id": "attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.697724Z", - "modified": "2023-09-25T16:17:56.697724Z", + "created": "2023-09-28T21:25:13.285122Z", + "modified": "2023-09-28T21:25:13.285122Z", "name": "Utilise Bulletproof Hosting", "description": "Hosting refers to services through which storage and computing resources are provided to an individual or organisation for the accommodation and maintenance of one or more websites and related services. Services may include web hosting, file sharing, and email distribution. Bulletproof hosting refers to services provided by an entity, such as a domain hosting or web hosting firm, that allows its customer considerable leniency in use of the service. An influence operation may utilise bulletproof hosting to maintain continuity of service for suspicious, illegal, or disruptive operation activities that stricter hosting services would limit, report, or suspend.", "kill_chain_phases": [ @@ -8329,8 +8329,8 @@ "spec_version": "2.1", "id": "attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.698186Z", - "modified": "2023-09-25T16:17:56.698186Z", + "created": "2023-09-28T21:25:13.285674Z", + "modified": "2023-09-28T21:25:13.285674Z", "name": "Use Shell Organisations", "description": "Use Shell Organisations to conceal sponsorship.", "kill_chain_phases": [ @@ -8362,8 +8362,8 @@ "spec_version": "2.1", "id": "attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.698575Z", - "modified": "2023-09-25T16:17:56.698575Z", + "created": "2023-09-28T21:25:13.28615Z", + "modified": "2023-09-28T21:25:13.28615Z", "name": "Use Cryptocurrency", "description": "Use Cryptocurrency to conceal sponsorship. Examples include Bitcoin, Monero, and Etherium.", "kill_chain_phases": [ @@ -8395,8 +8395,8 @@ "spec_version": "2.1", "id": "attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.698933Z", - "modified": "2023-09-25T16:17:56.698933Z", + "created": "2023-09-28T21:25:13.286669Z", + "modified": "2023-09-28T21:25:13.286669Z", "name": "Obfuscate Payment", "description": "Obfuscate Payment", "kill_chain_phases": [ @@ -8428,8 +8428,8 @@ "spec_version": "2.1", "id": "attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.699472Z", - "modified": "2023-09-25T16:17:56.699472Z", + "created": "2023-09-28T21:25:13.287453Z", + "modified": "2023-09-28T21:25:13.287453Z", "name": "Exploit TOS/Content Moderation", "description": "Exploiting weaknesses in platforms' terms of service and content moderation policies to avoid takedowns and platform actions.", "kill_chain_phases": [ @@ -8461,8 +8461,8 @@ "spec_version": "2.1", "id": "attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.700044Z", - "modified": "2023-09-25T16:17:56.700044Z", + "created": "2023-09-28T21:25:13.287776Z", + "modified": "2023-09-28T21:25:13.287776Z", "name": "Legacy Web Content", "description": "Make incident content visible for a long time, e.g. by exploiting platform terms of service, or placing it where it's hard to remove or unlikely to be removed.", "kill_chain_phases": [ @@ -8494,8 +8494,8 @@ "spec_version": "2.1", "id": "attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.700839Z", - "modified": "2023-09-25T16:17:56.700839Z", + "created": "2023-09-28T21:25:13.287935Z", + "modified": "2023-09-28T21:25:13.287935Z", "name": "Post Borderline Content", "description": "Post Borderline Content", "kill_chain_phases": [ @@ -8527,8 +8527,8 @@ "spec_version": "2.1", "id": "attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.702386Z", - "modified": "2023-09-25T16:17:56.702386Z", + "created": "2023-09-28T21:25:13.28818Z", + "modified": "2023-09-28T21:25:13.28818Z", "name": "Measure Performance", "description": "A metric used to determine the accomplishment of actions. \u201cAre the actions being executed as planned?\u201d", "kill_chain_phases": [ @@ -8560,8 +8560,8 @@ "spec_version": "2.1", "id": "attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.702751Z", - "modified": "2023-09-25T16:17:56.702751Z", + "created": "2023-09-28T21:25:13.288335Z", + "modified": "2023-09-28T21:25:13.288335Z", "name": "People Focused", "description": "Measure the performance individuals in achieving campaign goals", "kill_chain_phases": [ @@ -8593,8 +8593,8 @@ "spec_version": "2.1", "id": "attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.703094Z", - "modified": "2023-09-25T16:17:56.703094Z", + "created": "2023-09-28T21:25:13.288478Z", + "modified": "2023-09-28T21:25:13.288478Z", "name": "Content Focused", "description": "Measure the performance of campaign content", "kill_chain_phases": [ @@ -8626,8 +8626,8 @@ "spec_version": "2.1", "id": "attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.703414Z", - "modified": "2023-09-25T16:17:56.703414Z", + "created": "2023-09-28T21:25:13.28864Z", + "modified": "2023-09-28T21:25:13.28864Z", "name": "View Focused", "description": "View Focused", "kill_chain_phases": [ @@ -8659,8 +8659,8 @@ "spec_version": "2.1", "id": "attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.703765Z", - "modified": "2023-09-25T16:17:56.703765Z", + "created": "2023-09-28T21:25:13.288832Z", + "modified": "2023-09-28T21:25:13.288832Z", "name": "Measure Effectiveness", "description": "A metric used to measure a current system state. \u201cAre we on track to achieve the intended new system state within the planned timescale?\u201d", "kill_chain_phases": [ @@ -8692,8 +8692,8 @@ "spec_version": "2.1", "id": "attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.70427Z", - "modified": "2023-09-25T16:17:56.70427Z", + "created": "2023-09-28T21:25:13.289032Z", + "modified": "2023-09-28T21:25:13.289032Z", "name": "Behaviour Changes", "description": "Monitor and evaluate behaviour changes from misinformation incidents.", "kill_chain_phases": [ @@ -8725,8 +8725,8 @@ "spec_version": "2.1", "id": "attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.705323Z", - "modified": "2023-09-25T16:17:56.705323Z", + "created": "2023-09-28T21:25:13.289186Z", + "modified": "2023-09-28T21:25:13.289186Z", "name": "Content", "description": "Measure current system state with respect to the effectiveness of campaign content.", "kill_chain_phases": [ @@ -8758,8 +8758,8 @@ "spec_version": "2.1", "id": "attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.706462Z", - "modified": "2023-09-25T16:17:56.706462Z", + "created": "2023-09-28T21:25:13.289474Z", + "modified": "2023-09-28T21:25:13.289474Z", "name": "Awareness", "description": "Measure current system state with respect to the effectiveness of influencing awareness.", "kill_chain_phases": [ @@ -8791,8 +8791,8 @@ "spec_version": "2.1", "id": "attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.70757Z", - "modified": "2023-09-25T16:17:56.70757Z", + "created": "2023-09-28T21:25:13.289726Z", + "modified": "2023-09-28T21:25:13.289726Z", "name": "Knowledge", "description": "Measure current system state with respect to the effectiveness of influencing knowledge.", "kill_chain_phases": [ @@ -8824,8 +8824,8 @@ "spec_version": "2.1", "id": "attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.70866Z", - "modified": "2023-09-25T16:17:56.70866Z", + "created": "2023-09-28T21:25:13.289879Z", + "modified": "2023-09-28T21:25:13.289879Z", "name": "Action/Attitude", "description": "Measure current system state with respect to the effectiveness of influencing action/attitude.", "kill_chain_phases": [ @@ -8857,8 +8857,8 @@ "spec_version": "2.1", "id": "attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.710111Z", - "modified": "2023-09-25T16:17:56.710111Z", + "created": "2023-09-28T21:25:13.290026Z", + "modified": "2023-09-28T21:25:13.290026Z", "name": "Measure Effectiveness Indicators (or KPIs)", "description": "Ensuring that Key Performance Indicators are identified and tracked, so that the performance and effectiveness of campaigns, and elements of campaigns, can be measured, during and after their execution.", "kill_chain_phases": [ @@ -8890,8 +8890,8 @@ "spec_version": "2.1", "id": "attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.71158Z", - "modified": "2023-09-25T16:17:56.71158Z", + "created": "2023-09-28T21:25:13.290171Z", + "modified": "2023-09-28T21:25:13.290171Z", "name": "Message Reach", "description": "Monitor and evaluate message reach in misinformation incidents.", "kill_chain_phases": [ @@ -8923,8 +8923,8 @@ "spec_version": "2.1", "id": "attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.712817Z", - "modified": "2023-09-25T16:17:56.712817Z", + "created": "2023-09-28T21:25:13.29032Z", + "modified": "2023-09-28T21:25:13.29032Z", "name": "Social Media Engagement", "description": "Monitor and evaluate social media engagement in misinformation incidents.", "kill_chain_phases": [ @@ -8954,10 +8954,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--bf00e553-c89f-40b3-8cec-3f2f996366f8", + "id": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.713515Z", - "modified": "2023-09-25T16:17:56.713515Z", + "created": "2023-09-28T21:25:13.290467Z", + "modified": "2023-09-28T21:25:13.290467Z", "name": "Undermine", "description": "Weaken, debilitate, or subvert a target or their actions. An influence operation may be designed to disparage an opponent; sabotage an opponent\u2019s systems or processes; compromise an opponent\u2019s relationships or support system; impair an opponent\u2019s capability; or thwart an opponent\u2019s initiative. ", "kill_chain_phases": [ @@ -8987,10 +8987,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--abce7f18-537e-43fa-85f5-d6e682b802f1", + "id": "attack-pattern--ca3d3bb7-d3eb-4c2b-9b83-8b8579185636", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.714164Z", - "modified": "2023-09-25T16:17:56.714164Z", + "created": "2023-09-28T21:25:13.29074Z", + "modified": "2023-09-28T21:25:13.29074Z", "name": "Smear", "description": "Denigrate, disparage, or discredit an opponent. This is a common tactical objective in political campaigns with a larger strategic goal. It differs from efforts to harm a target through defamation. If there is no ulterior motive and the sole aim is to cause harm to the target, then choose sub-technique \u201cDefame\u201d of technique \u201cCause Harm\u201d instead.", "kill_chain_phases": [ @@ -9020,10 +9020,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--c059fec5-ae27-4b80-8dfa-19d17df2e5b7", + "id": "attack-pattern--924eb596-25cc-4c13-8395-56ed892e5771", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.714661Z", - "modified": "2023-09-25T16:17:56.714661Z", + "created": "2023-09-28T21:25:13.291056Z", + "modified": "2023-09-28T21:25:13.291056Z", "name": "Thwart", "description": "Prevent the successful outcome of a policy, operation, or initiative. Actors conduct influence operations to stymie or foil proposals, plans, or courses of action which are not in their interest. ", "kill_chain_phases": [ @@ -9053,10 +9053,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--01449efe-95f9-4480-bc5e-1fe6ee04e333", + "id": "attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.715094Z", - "modified": "2023-09-25T16:17:56.715094Z", + "created": "2023-09-28T21:25:13.291305Z", + "modified": "2023-09-28T21:25:13.291305Z", "name": "Subvert", "description": "Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of \u201cactive measures\u201d involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation. ", "kill_chain_phases": [ @@ -9086,10 +9086,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3aa19ee4-7c0f-4108-b4ff-d7cbb37f7f66", + "id": "attack-pattern--2b17f29f-f65f-4398-9e35-1c1d8836c20d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.715365Z", - "modified": "2023-09-25T16:17:56.715365Z", + "created": "2023-09-28T21:25:13.291627Z", + "modified": "2023-09-28T21:25:13.291627Z", "name": "Polarise", "description": "To cause a target audience to divide into two completely opposing groups. This is a special case of subversion. To divide and conquer is an age-old approach to subverting and overcoming an enemy.", "kill_chain_phases": [ @@ -9119,10 +9119,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "id": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.715624Z", - "modified": "2023-09-25T16:17:56.715624Z", + "created": "2023-09-28T21:25:13.291932Z", + "modified": "2023-09-28T21:25:13.291932Z", "name": "Cultivate Support", "description": "Grow or maintain the base of support for the actor, ally, or action. This includes hard core recruitment, managing alliances, and generating or maintaining sympathy among a wider audience, including reputation management and public relations. Sub-techniques assume support for actor (self) unless otherwise specified. ", "kill_chain_phases": [ @@ -9152,10 +9152,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--872ec72b-0270-4d64-83f8-2588ea76577a", + "id": "attack-pattern--c28a0edd-a7af-4651-8e11-8e7284009174", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.715849Z", - "modified": "2023-09-25T16:17:56.715849Z", + "created": "2023-09-28T21:25:13.292228Z", + "modified": "2023-09-28T21:25:13.292228Z", "name": "Defend Reputaton", "description": "Preserve a positive perception in the public\u2019s mind following an accusation or adverse event. When accused of a wrongful act, an actor may engage in denial, counter accusations, whataboutism, or conspiracy theories to distract public attention and attempt to maintain a positive image. ", "kill_chain_phases": [ @@ -9185,10 +9185,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f7430ba5-3391-4a7c-9890-d625cd051ee8", + "id": "attack-pattern--afb60a6d-8299-4b2c-abda-6e11e4a65a4b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.716094Z", - "modified": "2023-09-25T16:17:56.716094Z", + "created": "2023-09-28T21:25:13.292524Z", + "modified": "2023-09-28T21:25:13.292524Z", "name": "Justify Action", "description": "To convince others to exonerate you of a perceived wrongdoing. When an actor finds it untenable to deny doing something, they may attempt to exonerate themselves with disinformation which claims the action was reasonable. This is a special case of \u201cDefend Reputation\u201d. ", "kill_chain_phases": [ @@ -9218,10 +9218,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--a8cd34a2-a724-4b50-bd4e-fea85ecaf9c2", + "id": "attack-pattern--665d4984-25b7-4bd5-9dcb-e81c7ed7f1c9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.716455Z", - "modified": "2023-09-25T16:17:56.716455Z", + "created": "2023-09-28T21:25:13.292839Z", + "modified": "2023-09-28T21:25:13.292839Z", "name": "Energise Supporters", "description": "Raise the morale of those who support the organisation or group. Invigorate constituents with zeal for the mission or activity. Terrorist groups, political movements, and cults may indoctrinate their supporters with ideologies that are based on warped versions of religion or cause harm to others. ", "kill_chain_phases": [ @@ -9251,10 +9251,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--23e51ece-142b-48c4-bc1a-8ec4abd0ab14", + "id": "attack-pattern--7ff061e5-cc6e-4d6a-9d0c-dbdf4c869c57", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.717505Z", - "modified": "2023-09-25T16:17:56.717505Z", + "created": "2023-09-28T21:25:13.293217Z", + "modified": "2023-09-28T21:25:13.293217Z", "name": "Boost Reputation", "description": "Elevate the estimation of the actor in the public\u2019s mind. Improve their image or standing. Public relations professionals use persuasive overt communications to achieve this goal; manipulators use covert disinformation. ", "kill_chain_phases": [ @@ -9284,10 +9284,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--95cc1720-8644-47ac-af79-de410621c75b", + "id": "attack-pattern--c2397671-33fb-4486-ad90-50653a169781", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.718042Z", - "modified": "2023-09-25T16:17:56.718042Z", + "created": "2023-09-28T21:25:13.293628Z", + "modified": "2023-09-28T21:25:13.293628Z", "name": "Cultvate Support for Initiative", "description": "Elevate or fortify the public backing for a policy, operation, or idea. Domestic and foreign actors can use artificial means to fabricate or amplify public support for a proposal or action. ", "kill_chain_phases": [ @@ -9317,10 +9317,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--08e50234-c956-48ed-a89c-41d112253317", + "id": "attack-pattern--acab804f-184f-4602-9201-5e518bc72202", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.718302Z", - "modified": "2023-09-25T16:17:56.718302Z", + "created": "2023-09-28T21:25:13.294002Z", + "modified": "2023-09-28T21:25:13.294002Z", "name": "Cultivate Support for Ally", "description": "Elevate or fortify the public backing for a partner. Governments may interfere in other countries\u2019 elections by covertly favouring a party or candidate aligned with their interests. They may also mount an influence operation to bolster the reputation of an ally under attack. ", "kill_chain_phases": [ @@ -9350,10 +9350,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--7db25360-8e4c-45dd-b172-112db2d3e80b", + "id": "attack-pattern--b8a49b7d-5a2e-44ff-9c18-6f6501231f15", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.718543Z", - "modified": "2023-09-25T16:17:56.718543Z", + "created": "2023-09-28T21:25:13.294332Z", + "modified": "2023-09-28T21:25:13.294332Z", "name": "Recruit Members", "description": "Motivate followers to join or subscribe as members of the team. Organisations may mount recruitment drives that use propaganda to entice sympathisers to sign up. ", "kill_chain_phases": [ @@ -9383,10 +9383,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--2f4b79f6-74d1-4951-8e01-4abc1ae514f6", + "id": "attack-pattern--f8fc8cda-8dbe-4f8a-8c62-e06b975582df", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.718756Z", - "modified": "2023-09-25T16:17:56.718756Z", + "created": "2023-09-28T21:25:13.294603Z", + "modified": "2023-09-28T21:25:13.294603Z", "name": "Increase Prestige", "description": "Improve personal standing within a community. Gain fame, approbation, or notoriety. Conspiracy theorists, those with special access, and ideologues can gain prominence in a community by propagating disinformation, leaking confidential documents, or spreading hate. ", "kill_chain_phases": [ @@ -9416,10 +9416,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--861d74ed-4290-4445-af3d-12c4b43feb41", + "id": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.719723Z", - "modified": "2023-09-25T16:17:56.719723Z", + "created": "2023-09-28T21:25:13.294873Z", + "modified": "2023-09-28T21:25:13.294873Z", "name": "Make Money", "description": "Profit from disinformation, conspiracy theories, or online harm. In some cases, the sole objective is financial gain, in other cases the objective is both financial and political. Making money may also be a way to sustain a political campaign. ", "kill_chain_phases": [ @@ -9449,10 +9449,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--7d3b5bb6-81d3-41d2-afd7-2c5c050d9f55", + "id": "attack-pattern--4c06f94a-13d2-4b86-9505-38684b317bcb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.720653Z", - "modified": "2023-09-25T16:17:56.720653Z", + "created": "2023-09-28T21:25:13.295155Z", + "modified": "2023-09-28T21:25:13.295155Z", "name": "Generate Ad Revenue", "description": "Earn income from digital advertisements published alongside inauthentic content. Conspiratorial, false, or provocative content drives internet traffic. Content owners earn money from impressions of, or clicks on, or conversions of ads published on their websites, social media profiles, or streaming services, or ads published when their content appears in search engine results. Fraudsters simulate impressions, clicks, and conversions, or they spin up inauthentic sites or social media profiles just to generate ad revenue. Conspiracy theorists and political operators generate ad revenue as a byproduct of their operation or as a means of sustaining their campaign. ", "kill_chain_phases": [ @@ -9482,10 +9482,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b61e1242-4b43-48b7-94e5-acbbfcdfdbd4", + "id": "attack-pattern--f08df5bc-7cea-42b8-be2c-b07c0d62c982", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.721657Z", - "modified": "2023-09-25T16:17:56.721657Z", + "created": "2023-09-28T21:25:13.295422Z", + "modified": "2023-09-28T21:25:13.295422Z", "name": "Scam", "description": "Defraud a target or trick a target into doing something that benefits the attacker. A typical scam is where a fraudster convinces a target to pay for something without the intention of ever delivering anything in return. Alternatively, the fraudster may promise benefits which never materialise, such as a fake cure. Criminals often exploit a fear or crisis or generate a sense of urgency. They may use deepfakes to impersonate authority figures or individuals in distress. ", "kill_chain_phases": [ @@ -9515,10 +9515,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--c0b7ddc2-47d1-4d81-afe4-453df6e729ee", + "id": "attack-pattern--37d7a656-a425-4ec8-8128-c39848350716", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.722935Z", - "modified": "2023-09-25T16:17:56.722935Z", + "created": "2023-09-28T21:25:13.295682Z", + "modified": "2023-09-28T21:25:13.295682Z", "name": "Raise Funds", "description": "Solicit donations for a cause. Popular conspiracy theorists can attract financial contributions from their followers. Fighting back against the establishment is a popular crowdfunding narrative. ", "kill_chain_phases": [ @@ -9548,10 +9548,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3a9b4f90-2f59-4200-91a6-1cfd29157a28", + "id": "attack-pattern--07070de8-0d3f-41f6-9861-33c090bbeaf2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.724288Z", - "modified": "2023-09-25T16:17:56.724288Z", + "created": "2023-09-28T21:25:13.295946Z", + "modified": "2023-09-28T21:25:13.295946Z", "name": "Sell Items under False Pretences", "description": "Offer products for sale under false pretences. Campaigns may hijack or create causes built on disinformation to sell promotional merchandise. Or charlatans may amplify victims\u2019 unfounded fears to sell them items of questionable utility such as supplements or survival gear. ", "kill_chain_phases": [ @@ -9581,10 +9581,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--9f7d3455-40f1-4f79-a1c7-1f5bb597b494", + "id": "attack-pattern--719b15f1-fb7d-49f4-97ca-7ba5ab09da6d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.725232Z", - "modified": "2023-09-25T16:17:56.725232Z", + "created": "2023-09-28T21:25:13.296236Z", + "modified": "2023-09-28T21:25:13.296236Z", "name": "Extort", "description": "Coerce money or favours from a target by threatening to expose or corrupt information. Ransomware criminals typically demand money. Intelligence agencies demand national secrets. Sexual predators demand favours. The leverage may be critical, sensitive, or embarrassing information. ", "kill_chain_phases": [ @@ -9614,10 +9614,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--a23bc5de-9afb-4928-bcb6-63be576dfb56", + "id": "attack-pattern--54edae40-39dc-45c4-a473-cef151d299ff", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.725555Z", - "modified": "2023-09-25T16:17:56.725555Z", + "created": "2023-09-28T21:25:13.296499Z", + "modified": "2023-09-28T21:25:13.296499Z", "name": "Manipulate Stocks", "description": "Artificially inflate or deflate the price of stocks or other financial instruments and then trade on these to make profit. The most common securities fraud schemes are called \u201cpump and dump\u201d and \u201cpoop and scoop\u201d. ", "kill_chain_phases": [ @@ -9647,10 +9647,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--0f6e5675-c9b0-4f22-b2f2-6d12a301c113", + "id": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.725797Z", - "modified": "2023-09-25T16:17:56.725797Z", + "created": "2023-09-28T21:25:13.296809Z", + "modified": "2023-09-28T21:25:13.296809Z", "name": "Motivate to Act", "description": "Persuade, impel, or provoke the target to behave in a specific manner favourable to the attacker. Some common behaviours are joining, subscribing, voting, buying, demonstrating, fighting, retreating, resigning, boycotting.", "kill_chain_phases": [ @@ -9680,10 +9680,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--735ad880-563f-43f7-8596-7069eeaa76fb", + "id": "attack-pattern--acc70582-c43a-4ed1-ab78-19e56ad4d4ed", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.726572Z", - "modified": "2023-09-25T16:17:56.726572Z", + "created": "2023-09-28T21:25:13.297073Z", + "modified": "2023-09-28T21:25:13.297073Z", "name": "Encourage", "description": "Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. ", "kill_chain_phases": [ @@ -9713,10 +9713,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--22a3c794-41ac-4296-9e0a-d866a2ba91bc", + "id": "attack-pattern--1ba99e5a-e7f0-4075-a9bf-9da7bd87f15d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.728285Z", - "modified": "2023-09-25T16:17:56.728285Z", + "created": "2023-09-28T21:25:13.297331Z", + "modified": "2023-09-28T21:25:13.297331Z", "name": "Provoke", "description": "Instigate, incite, or arouse a target to act. Social media manipulators exploit moral outrage to propel targets to spread hate, take to the streets to protest, or engage in acts of violence. ", "kill_chain_phases": [ @@ -9746,10 +9746,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--72539ca4-1fad-49fb-be40-0e7dd128b65b", + "id": "attack-pattern--e1afdaea-cb95-4cdf-95a2-0bf8518b872d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.728554Z", - "modified": "2023-09-25T16:17:56.728554Z", + "created": "2023-09-28T21:25:13.297622Z", + "modified": "2023-09-28T21:25:13.297622Z", "name": "Compel", "description": "Force target to take an action or to stop taking an action it has already started. Actors can use the threat of reputational damage alongside military or economic threats to compel a target.", "kill_chain_phases": [ @@ -9779,10 +9779,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--31c33890-0c7e-4060-ae8a-b154af12740d", + "id": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.728771Z", - "modified": "2023-09-25T16:17:56.728771Z", + "created": "2023-09-28T21:25:13.297901Z", + "modified": "2023-09-28T21:25:13.297901Z", "name": "Dissuade from Acting", "description": "Discourage, deter, or inhibit the target from actions which would be unfavourable to the attacker. The actor may want the target to refrain from voting, buying, fighting, or supplying. ", "kill_chain_phases": [ @@ -9812,12 +9812,12 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b12c0b9c-8791-4c05-8026-07eb66aeaaaa", + "id": "attack-pattern--20e074c4-9010-41b8-b097-65091268531c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.72908Z", - "modified": "2023-09-25T16:17:56.72908Z", + "created": "2023-09-28T21:25:13.298168Z", + "modified": "2023-09-28T21:25:13.298168Z", "name": "Discourage", - "description": "Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. ", + "description": "To make a target disinclined or reluctant to act. Manipulators use disinformation to cause targets to question the utility, legality, or morality of taking an action. ", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", @@ -9845,10 +9845,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--8c7335f6-03b2-4f9f-bd2e-f6edb94826a8", + "id": "attack-pattern--b602bd0a-6b29-4f87-8093-55c879f588ec", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.729506Z", - "modified": "2023-09-25T16:17:56.729506Z", + "created": "2023-09-28T21:25:13.298433Z", + "modified": "2023-09-28T21:25:13.298433Z", "name": "Silence", "description": "Intimidate or incentivise target into remaining silent or prevent target from speaking out. A threat actor may cow a target into silence as a special case of deterrence. Or they may buy the target\u2019s silence. Or they may repress or restrict the target\u2019s speech. ", "kill_chain_phases": [ @@ -9878,10 +9878,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b4ec53d3-8050-41ac-a3eb-e75b3b1195b7", + "id": "attack-pattern--4ecd424d-11a8-4471-9ccc-a870a337284d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.730212Z", - "modified": "2023-09-25T16:17:56.730212Z", + "created": "2023-09-28T21:25:13.29877Z", + "modified": "2023-09-28T21:25:13.29877Z", "name": "Deter", "description": "Prevent target from taking an action for fear of the consequences. Deterrence occurs in the mind of the target, who fears they will be worse off if they take an action than if they don\u2019t. When making threats, aggressors may bluff, feign irrationality, or engage in brinksmanship.", "kill_chain_phases": [ @@ -9911,10 +9911,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--cb9fde57-634c-4660-9e27-e28bd371e650", + "id": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.731253Z", - "modified": "2023-09-25T16:17:56.731253Z", + "created": "2023-09-28T21:25:13.299034Z", + "modified": "2023-09-28T21:25:13.299034Z", "name": "Cause Harm", "description": "Persecute, malign, or inflict pain upon a target. The objective of a campaign may be to cause fear or emotional distress in a target. In some cases, harm is instrumental to achieving a primary objective, as in coercion, repression, or intimidation. In other cases, harm may be inflicted for the satisfaction of the perpetrator, as in revenge or sadistic cruelty. ", "kill_chain_phases": [ @@ -9944,10 +9944,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3fc4c436-9d09-4f3e-9ade-afe37a30c362", + "id": "attack-pattern--9c01fab2-42dc-423b-96fe-a478a29e5b81", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.732466Z", - "modified": "2023-09-25T16:17:56.732466Z", + "created": "2023-09-28T21:25:13.299295Z", + "modified": "2023-09-28T21:25:13.299295Z", "name": "Defame", "description": "Attempt to damage the target\u2019s personal reputation by impugning their character. This can range from subtle attempts to misrepresent or insinuate, to obvious attempts to denigrate or disparage, to blatant attempts to malign or vilify. Slander applies to oral expression. Libel applies to written or pictorial material. Defamation is often carried out by online trolls. The sole aim here is to cause harm to the target. If the threat actor uses defamation as a means of undermining the target, then choose sub-technique \u201cSmear\u201d of technique \u201cUndermine\u201d instead. ", "kill_chain_phases": [ @@ -9977,10 +9977,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--634c7a17-a7b5-40bb-90cf-6ad6e8f92976", + "id": "attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.732889Z", - "modified": "2023-09-25T16:17:56.732889Z", + "created": "2023-09-28T21:25:13.299559Z", + "modified": "2023-09-28T21:25:13.299559Z", "name": "Intimidate", "description": "Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. ", "kill_chain_phases": [ @@ -10010,10 +10010,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f70cea06-5013-49ec-b6c5-7f905dda59f7", + "id": "attack-pattern--ad0ef979-9552-4906-8006-077db6789103", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.733411Z", - "modified": "2023-09-25T16:17:56.733411Z", + "created": "2023-09-28T21:25:13.299857Z", + "modified": "2023-09-28T21:25:13.299857Z", "name": "Spread Hate", "description": "Publish and/or propagate demeaning, derisive, or humiliating content targeting an individual or group of individuals with the intent to cause emotional, psychological, or physical distress. Hate speech can cause harm directly or incite others to harm the target. It often aims to stigmatise the target by singling out immutable characteristics such as colour, race, religion, national or ethnic origin, gender, gender identity, sexual orientation, age, disease, or mental or physical disability. Thus, promoting hatred online may involve racism, antisemitism, Islamophobia, xenophobia, sexism, misogyny, homophobia, transphobia, ageism, ableism, or any combination thereof. Motivations for hate speech range from group preservation to ideological superiority to the unbridled infliction of suffering. ", "kill_chain_phases": [ @@ -10043,9 +10043,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--0169b9d1-859d-4a73-936c-7e36b15325d8", - "created": "2023-09-25T16:17:56.734261Z", - "modified": "2023-09-25T16:17:56.734261Z", + "id": "relationship--ebf8a345-ad43-486d-b7b3-99b25aa902e6", + "created": "2023-09-28T21:25:13.30041Z", + "modified": "2023-09-28T21:25:13.30041Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f", @@ -10057,9 +10057,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a2462b4e-9060-4dbc-8aa3-3b9de5d266c6", - "created": "2023-09-25T16:17:56.734481Z", - "modified": "2023-09-25T16:17:56.734481Z", + "id": "relationship--86aaafb6-385d-4f76-a13d-84b696197c73", + "created": "2023-09-28T21:25:13.300623Z", + "modified": "2023-09-28T21:25:13.300623Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45", @@ -10071,9 +10071,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1bbc3e9d-34ac-420c-b0c6-b21769884774", - "created": "2023-09-25T16:17:56.734621Z", - "modified": "2023-09-25T16:17:56.734621Z", + "id": "relationship--8ec4675c-4364-459d-94f2-db98b532a70f", + "created": "2023-09-28T21:25:13.300769Z", + "modified": "2023-09-28T21:25:13.300769Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06", @@ -10085,9 +10085,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--19942b45-4951-406a-abb2-6366ba47f7d9", - "created": "2023-09-25T16:17:56.734754Z", - "modified": "2023-09-25T16:17:56.734754Z", + "id": "relationship--65c01586-dc82-44fc-aba8-2dfa81cd26d7", + "created": "2023-09-28T21:25:13.300902Z", + "modified": "2023-09-28T21:25:13.300902Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28", @@ -10099,9 +10099,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--29a7c5be-559d-4865-96b8-64b662cb9f89", - "created": "2023-09-25T16:17:56.734883Z", - "modified": "2023-09-25T16:17:56.734883Z", + "id": "relationship--840b805f-2f68-4c54-aa18-425ed6420f66", + "created": "2023-09-28T21:25:13.301032Z", + "modified": "2023-09-28T21:25:13.301032Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--dd9f940d-3970-45b2-8549-12e321567657", @@ -10113,9 +10113,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--0824956f-3c6c-4ed4-beb9-a74b17552464", - "created": "2023-09-25T16:17:56.735063Z", - "modified": "2023-09-25T16:17:56.735063Z", + "id": "relationship--59564f74-5b78-4798-ba7e-2b1c3cbbd9b8", + "created": "2023-09-28T21:25:13.301194Z", + "modified": "2023-09-28T21:25:13.301194Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590", @@ -10127,9 +10127,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--acd6ce3e-cfd4-416c-9cc5-11d5dac5c548", - "created": "2023-09-25T16:17:56.73523Z", - "modified": "2023-09-25T16:17:56.73523Z", + "id": "relationship--7ae5953c-846b-4015-886b-db49bb66aa6d", + "created": "2023-09-28T21:25:13.301326Z", + "modified": "2023-09-28T21:25:13.301326Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c", @@ -10141,9 +10141,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--502cb2c0-842e-43a6-a6d1-41ebf41c1eff", - "created": "2023-09-25T16:17:56.735501Z", - "modified": "2023-09-25T16:17:56.735501Z", + "id": "relationship--45abe113-7744-427c-8fea-aa9aa3e6e75e", + "created": "2023-09-28T21:25:13.301453Z", + "modified": "2023-09-28T21:25:13.301453Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3", @@ -10155,9 +10155,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--02003b4e-da5e-4ec9-8055-1f2466d1881c", - "created": "2023-09-25T16:17:56.735941Z", - "modified": "2023-09-25T16:17:56.735941Z", + "id": "relationship--dc3d7ab5-2308-45ac-997a-2cb8af2adcde", + "created": "2023-09-28T21:25:13.30158Z", + "modified": "2023-09-28T21:25:13.30158Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733", @@ -10169,9 +10169,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--d7876a09-94ef-4029-8c83-eedda5bba576", - "created": "2023-09-25T16:17:56.737044Z", - "modified": "2023-09-25T16:17:56.737044Z", + "id": "relationship--2a792d57-5ddc-4108-8deb-72589e1807ac", + "created": "2023-09-28T21:25:13.301714Z", + "modified": "2023-09-28T21:25:13.301714Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6", @@ -10183,9 +10183,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--17d1462d-d004-4426-be21-e02164e59533", - "created": "2023-09-25T16:17:56.738724Z", - "modified": "2023-09-25T16:17:56.738724Z", + "id": "relationship--e8c8543d-247f-4d46-ba54-916a94d15321", + "created": "2023-09-28T21:25:13.301842Z", + "modified": "2023-09-28T21:25:13.301842Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16", @@ -10197,9 +10197,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--826c94ae-1be0-4a92-a621-c8ee964549eb", - "created": "2023-09-25T16:17:56.739142Z", - "modified": "2023-09-25T16:17:56.739142Z", + "id": "relationship--9a27c192-6cae-4928-a640-5850933da1a9", + "created": "2023-09-28T21:25:13.301968Z", + "modified": "2023-09-28T21:25:13.301968Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9", @@ -10211,9 +10211,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--e246960e-b71f-45be-a84b-1561e61742f9", - "created": "2023-09-25T16:17:56.739374Z", - "modified": "2023-09-25T16:17:56.739374Z", + "id": "relationship--6e9206f1-505a-46a4-b46c-7bd6319a3fdf", + "created": "2023-09-28T21:25:13.302108Z", + "modified": "2023-09-28T21:25:13.302108Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8", @@ -10225,9 +10225,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1dbca1e6-0fcf-4adc-8f7d-6c565efd35a9", - "created": "2023-09-25T16:17:56.739632Z", - "modified": "2023-09-25T16:17:56.739632Z", + "id": "relationship--c9a2d298-9f8f-482a-a642-efb0841bd17a", + "created": "2023-09-28T21:25:13.302545Z", + "modified": "2023-09-28T21:25:13.302545Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e", @@ -10239,9 +10239,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--6575aac3-b06e-4313-8184-40980706ab7f", - "created": "2023-09-25T16:17:56.739858Z", - "modified": "2023-09-25T16:17:56.739858Z", + "id": "relationship--38fc584f-23ba-4b00-b931-7e58184534a9", + "created": "2023-09-28T21:25:13.302678Z", + "modified": "2023-09-28T21:25:13.302678Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb", @@ -10253,9 +10253,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--dc095758-9fb4-48de-8b33-bd0f80a1967d", - "created": "2023-09-25T16:17:56.740107Z", - "modified": "2023-09-25T16:17:56.740107Z", + "id": "relationship--354db141-46a3-4702-8d58-a281a85d1741", + "created": "2023-09-28T21:25:13.302833Z", + "modified": "2023-09-28T21:25:13.302833Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d", @@ -10267,9 +10267,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--e5deb451-2b30-4466-b141-e1f9b1fe140e", - "created": "2023-09-25T16:17:56.740327Z", - "modified": "2023-09-25T16:17:56.740327Z", + "id": "relationship--da229950-65f7-4561-b8c7-c48e84a888b8", + "created": "2023-09-28T21:25:13.302952Z", + "modified": "2023-09-28T21:25:13.302952Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635", @@ -10281,9 +10281,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--cc263ce0-ca81-447e-bda8-76845643bc7b", - "created": "2023-09-25T16:17:56.740569Z", - "modified": "2023-09-25T16:17:56.740569Z", + "id": "relationship--e2521498-37a1-47c2-beb8-add02a338fea", + "created": "2023-09-28T21:25:13.303063Z", + "modified": "2023-09-28T21:25:13.303063Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2", @@ -10295,9 +10295,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--846cd3a7-e39e-4cb8-9b45-9fd80e7f04e2", - "created": "2023-09-25T16:17:56.740795Z", - "modified": "2023-09-25T16:17:56.740795Z", + "id": "relationship--d39d5c01-a64b-4df4-b4c4-10be08a7bac2", + "created": "2023-09-28T21:25:13.303245Z", + "modified": "2023-09-28T21:25:13.303245Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e6ab2793-a059-4354-bb60-045afb019833", @@ -10309,9 +10309,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--cf01ed1d-f087-4b5d-be86-63bbabdd2279", - "created": "2023-09-25T16:17:56.741066Z", - "modified": "2023-09-25T16:17:56.741066Z", + "id": "relationship--776d5e5b-4ff2-4651-a34d-39c60bb15e76", + "created": "2023-09-28T21:25:13.303412Z", + "modified": "2023-09-28T21:25:13.303412Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--4282febe-c8a6-46da-863c-f19081615d80", @@ -10323,9 +10323,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--fecefd18-ac83-4054-9af6-6d2d5ef186a1", - "created": "2023-09-25T16:17:56.741429Z", - "modified": "2023-09-25T16:17:56.741429Z", + "id": "relationship--5a4d7b35-8c11-4dd1-804a-93705ecb600c", + "created": "2023-09-28T21:25:13.303506Z", + "modified": "2023-09-28T21:25:13.303506Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--ce5b400c-6f82-4095-936b-617857800da8", @@ -10337,9 +10337,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--724b6ff6-9bde-4485-9ee1-c97e008c024a", - "created": "2023-09-25T16:17:56.74165Z", - "modified": "2023-09-25T16:17:56.74165Z", + "id": "relationship--1203e47b-8b98-41f1-86e7-8a56c676a00d", + "created": "2023-09-28T21:25:13.303596Z", + "modified": "2023-09-28T21:25:13.303596Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69", @@ -10351,9 +10351,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--2cbe8b87-fd71-4bb0-977d-c276c3947155", - "created": "2023-09-25T16:17:56.741861Z", - "modified": "2023-09-25T16:17:56.741861Z", + "id": "relationship--242058fd-ea97-4dfe-8efc-cdd2b42ef1d5", + "created": "2023-09-28T21:25:13.303684Z", + "modified": "2023-09-28T21:25:13.303684Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef", @@ -10365,9 +10365,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--0b09909a-cf01-4e1b-b2ca-164549502d9d", - "created": "2023-09-25T16:17:56.742116Z", - "modified": "2023-09-25T16:17:56.742116Z", + "id": "relationship--4bc5bed3-f769-4cd5-a122-d09a2c5eab3f", + "created": "2023-09-28T21:25:13.303786Z", + "modified": "2023-09-28T21:25:13.303786Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397", @@ -10379,9 +10379,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--423d9ab0-8538-499d-913c-edce86b622ed", - "created": "2023-09-25T16:17:56.742335Z", - "modified": "2023-09-25T16:17:56.742335Z", + "id": "relationship--2dd34581-f3ee-4ee7-9fdc-ac2ec2f7fd91", + "created": "2023-09-28T21:25:13.303881Z", + "modified": "2023-09-28T21:25:13.303881Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd", @@ -10393,9 +10393,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--98232530-f054-4352-9be4-e45f3a56a0ab", - "created": "2023-09-25T16:17:56.742552Z", - "modified": "2023-09-25T16:17:56.742552Z", + "id": "relationship--a22cba70-5b73-40b4-ad49-51e76d2f378e", + "created": "2023-09-28T21:25:13.303972Z", + "modified": "2023-09-28T21:25:13.303972Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa", @@ -10407,9 +10407,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--05fb4345-1787-42c6-9d15-a5fead9c7268", - "created": "2023-09-25T16:17:56.742695Z", - "modified": "2023-09-25T16:17:56.742695Z", + "id": "relationship--d986b4c4-c99a-4153-a962-fc14533bce5e", + "created": "2023-09-28T21:25:13.304059Z", + "modified": "2023-09-28T21:25:13.304059Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4", @@ -10421,9 +10421,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--d03354b2-3256-43a6-80f3-b67001ce8012", - "created": "2023-09-25T16:17:56.742888Z", - "modified": "2023-09-25T16:17:56.742888Z", + "id": "relationship--1d13cd3a-7048-4c24-bceb-183a60a5ccd8", + "created": "2023-09-28T21:25:13.304146Z", + "modified": "2023-09-28T21:25:13.304146Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--1d917530-027d-4f82-b380-404c320dc783", @@ -10435,9 +10435,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--cc06d4cc-c46d-4726-8f83-7596ae1c6667", - "created": "2023-09-25T16:17:56.743319Z", - "modified": "2023-09-25T16:17:56.743319Z", + "id": "relationship--aa29f612-ac6d-43b1-ad96-023f098ba1f1", + "created": "2023-09-28T21:25:13.304233Z", + "modified": "2023-09-28T21:25:13.304233Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14", @@ -10449,9 +10449,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--b6e3317a-6d03-4521-b7c0-964150527bef", - "created": "2023-09-25T16:17:56.743606Z", - "modified": "2023-09-25T16:17:56.743606Z", + "id": "relationship--31fc417f-6b34-4eaa-a0f4-cb2e207bb397", + "created": "2023-09-28T21:25:13.304321Z", + "modified": "2023-09-28T21:25:13.304321Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86", @@ -10463,12 +10463,12 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--40104c0c-bb47-4c69-8850-2702357cf682", - "created": "2023-09-25T16:17:56.743824Z", - "modified": "2023-09-25T16:17:56.743824Z", + "id": "relationship--3a3a2972-cd03-4067-aadc-1c82aa6728f0", + "created": "2023-09-28T21:25:13.30444Z", + "modified": "2023-09-28T21:25:13.30444Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--dc068bb2-cb65-427b-a4d1-9a76e50ff4ce", + "source_ref": "attack-pattern--e499df14-e898-4e4f-be58-67266915e7b2", "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" @@ -10477,12 +10477,12 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--56ef04df-79d0-4c0f-b628-c207be41e492", - "created": "2023-09-25T16:17:56.744179Z", - "modified": "2023-09-25T16:17:56.744179Z", + "id": "relationship--82ae40ae-fd9b-4cf0-8be0-0a7bc8c4ce28", + "created": "2023-09-28T21:25:13.304558Z", + "modified": "2023-09-28T21:25:13.304558Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--c992a74a-a70d-40b4-bf9c-47044c81cabb", + "source_ref": "attack-pattern--456e7902-1294-4ee0-aeb1-cfed13346a72", "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" @@ -10491,12 +10491,12 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--27dbccf1-eeef-4c6e-a1c9-667bbe267507", - "created": "2023-09-25T16:17:56.744515Z", - "modified": "2023-09-25T16:17:56.744515Z", + "id": "relationship--9721571a-8c57-41a7-8b35-cb464f27331b", + "created": "2023-09-28T21:25:13.304669Z", + "modified": "2023-09-28T21:25:13.304669Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--2e8ddb66-1cf8-425b-8eea-8cc21d86d9f5", + "source_ref": "attack-pattern--b463442a-ee7a-4ddb-83fe-c1de27b65c43", "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" @@ -10505,12 +10505,12 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--e39cc529-ab5f-46a1-89e1-ba30117d3522", - "created": "2023-09-25T16:17:56.745076Z", - "modified": "2023-09-25T16:17:56.745076Z", + "id": "relationship--7447145f-b9e1-479d-9b2d-cfbda80c6b9d", + "created": "2023-09-28T21:25:13.304793Z", + "modified": "2023-09-28T21:25:13.304793Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--6733ed94-5779-4756-b84d-1d6ee932b9b2", + "source_ref": "attack-pattern--6921234b-a646-4a18-88cf-e70fc8ffc874", "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" @@ -10519,9 +10519,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--ac4dcd7d-ba27-4bff-b2cd-67da990b511a", - "created": "2023-09-25T16:17:56.74549Z", - "modified": "2023-09-25T16:17:56.74549Z", + "id": "relationship--2cd939f3-d2f7-4280-8a22-fd8de7108808", + "created": "2023-09-28T21:25:13.304912Z", + "modified": "2023-09-28T21:25:13.304912Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745", @@ -10533,9 +10533,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--bf7e0404-dd25-4856-84b5-cb138ccca4e6", - "created": "2023-09-25T16:17:56.746089Z", - "modified": "2023-09-25T16:17:56.746089Z", + "id": "relationship--800c2d54-cc69-4258-9d9e-43fe0aee0246", + "created": "2023-09-28T21:25:13.305032Z", + "modified": "2023-09-28T21:25:13.305032Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166", @@ -10547,9 +10547,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4508df19-7dbb-4a0b-ab88-1f2f2a19799b", - "created": "2023-09-25T16:17:56.746468Z", - "modified": "2023-09-25T16:17:56.746468Z", + "id": "relationship--6edf2c3d-d8fa-4d0c-b671-be651390453a", + "created": "2023-09-28T21:25:13.305145Z", + "modified": "2023-09-28T21:25:13.305145Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1", @@ -10561,9 +10561,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--74288708-8443-4067-8d1f-adca8d6beebb", - "created": "2023-09-25T16:17:56.746663Z", - "modified": "2023-09-25T16:17:56.746663Z", + "id": "relationship--5f02d567-ad54-4355-8bbf-6b1e991d6921", + "created": "2023-09-28T21:25:13.305255Z", + "modified": "2023-09-28T21:25:13.305255Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7", @@ -10575,9 +10575,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--3eecfdf4-a52b-465d-96e9-813223a2c556", - "created": "2023-09-25T16:17:56.746846Z", - "modified": "2023-09-25T16:17:56.746846Z", + "id": "relationship--222f23fe-c21d-4ec6-b727-3a96c489e27e", + "created": "2023-09-28T21:25:13.305365Z", + "modified": "2023-09-28T21:25:13.305365Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34", @@ -10589,9 +10589,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4def325e-5b1a-423e-a46f-c0c776757f48", - "created": "2023-09-25T16:17:56.747171Z", - "modified": "2023-09-25T16:17:56.747171Z", + "id": "relationship--ba8e089e-2945-49cf-a0e6-476e553964d0", + "created": "2023-09-28T21:25:13.305477Z", + "modified": "2023-09-28T21:25:13.305477Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec", @@ -10603,9 +10603,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--41d072ce-5209-4689-afb2-4882f4d8d8b8", - "created": "2023-09-25T16:17:56.747614Z", - "modified": "2023-09-25T16:17:56.747614Z", + "id": "relationship--49b6e6aa-a64c-4446-8075-68ae68ad0649", + "created": "2023-09-28T21:25:13.30559Z", + "modified": "2023-09-28T21:25:13.30559Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157", @@ -10617,9 +10617,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--aaae4c76-6556-452c-8435-83f6c630083c", - "created": "2023-09-25T16:17:56.747956Z", - "modified": "2023-09-25T16:17:56.747956Z", + "id": "relationship--ac3efada-0afe-4f43-95ac-2e66a10ff19e", + "created": "2023-09-28T21:25:13.305697Z", + "modified": "2023-09-28T21:25:13.305697Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648", @@ -10631,9 +10631,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1513e4f6-7ab3-45ef-94fd-ec08f7eeee84", - "created": "2023-09-25T16:17:56.748193Z", - "modified": "2023-09-25T16:17:56.748193Z", + "id": "relationship--4b02b327-9691-48a2-b709-c0065adfba7c", + "created": "2023-09-28T21:25:13.305835Z", + "modified": "2023-09-28T21:25:13.305835Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732", @@ -10645,9 +10645,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--38e0c424-adea-422b-8d6b-c2122b189f73", - "created": "2023-09-25T16:17:56.748405Z", - "modified": "2023-09-25T16:17:56.748405Z", + "id": "relationship--9b502d56-3276-4f1a-8ec2-7da58753fc65", + "created": "2023-09-28T21:25:13.305927Z", + "modified": "2023-09-28T21:25:13.305927Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb", @@ -10659,9 +10659,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--3b411994-5eda-4169-b055-7a7c4325dafb", - "created": "2023-09-25T16:17:56.748612Z", - "modified": "2023-09-25T16:17:56.748612Z", + "id": "relationship--01a87f65-50f3-4747-baa6-d20e467d2100", + "created": "2023-09-28T21:25:13.306017Z", + "modified": "2023-09-28T21:25:13.306017Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85", @@ -10673,9 +10673,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--b30ce9aa-6296-422b-a8e4-0c4181e172eb", - "created": "2023-09-25T16:17:56.748811Z", - "modified": "2023-09-25T16:17:56.748811Z", + "id": "relationship--3e7b3e82-9ff6-4d5a-8736-871eaf0dcaac", + "created": "2023-09-28T21:25:13.306105Z", + "modified": "2023-09-28T21:25:13.306105Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93", @@ -10687,9 +10687,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--2d547bc6-814b-4cb0-ae5b-b79d90af7486", - "created": "2023-09-25T16:17:56.749053Z", - "modified": "2023-09-25T16:17:56.749053Z", + "id": "relationship--5110d730-2ef5-4f87-a9ae-60c99a3499a2", + "created": "2023-09-28T21:25:13.306193Z", + "modified": "2023-09-28T21:25:13.306193Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce", @@ -10701,9 +10701,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1f29ecd9-84b7-46be-8936-f92ed1c84541", - "created": "2023-09-25T16:17:56.749268Z", - "modified": "2023-09-25T16:17:56.749268Z", + "id": "relationship--1c14050f-fa1c-4364-b969-f7dffc582a95", + "created": "2023-09-28T21:25:13.306281Z", + "modified": "2023-09-28T21:25:13.306281Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661", @@ -10715,9 +10715,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a189edb0-28b0-4f95-85b8-2725f0ff0041", - "created": "2023-09-25T16:17:56.749653Z", - "modified": "2023-09-25T16:17:56.749653Z", + "id": "relationship--e30726e8-b394-4e94-a9d5-a0c3d23c7fd2", + "created": "2023-09-28T21:25:13.306369Z", + "modified": "2023-09-28T21:25:13.306369Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35", @@ -10729,9 +10729,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--bcc51a6b-99a5-4748-978d-2cc564c17209", - "created": "2023-09-25T16:17:56.750061Z", - "modified": "2023-09-25T16:17:56.750061Z", + "id": "relationship--2e33fea8-7a87-40d4-ab64-ac6ec4734c62", + "created": "2023-09-28T21:25:13.306468Z", + "modified": "2023-09-28T21:25:13.306468Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68", @@ -10743,9 +10743,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--76afcebe-c6fa-4fa4-a653-98d04347b835", - "created": "2023-09-25T16:17:56.750525Z", - "modified": "2023-09-25T16:17:56.750525Z", + "id": "relationship--1c8e6cfa-2173-485c-b929-4961b40f52be", + "created": "2023-09-28T21:25:13.306589Z", + "modified": "2023-09-28T21:25:13.306589Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a", @@ -10757,9 +10757,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--12cf6293-e63f-4501-86cd-d7042d5df57d", - "created": "2023-09-25T16:17:56.751083Z", - "modified": "2023-09-25T16:17:56.751083Z", + "id": "relationship--93918c94-daa2-4e6d-931b-66901ff1c479", + "created": "2023-09-28T21:25:13.306708Z", + "modified": "2023-09-28T21:25:13.306708Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421", @@ -10771,9 +10771,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--19be421c-362b-4213-9ead-a3a8e95db30d", - "created": "2023-09-25T16:17:56.751315Z", - "modified": "2023-09-25T16:17:56.751315Z", + "id": "relationship--ceee8fee-33e8-492c-a8b6-855089b5e570", + "created": "2023-09-28T21:25:13.306858Z", + "modified": "2023-09-28T21:25:13.306858Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03", @@ -10785,9 +10785,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--8bbe772b-b559-451c-a5b9-ab46d7c4a33d", - "created": "2023-09-25T16:17:56.751608Z", - "modified": "2023-09-25T16:17:56.751608Z", + "id": "relationship--a2c05e41-abeb-4932-a587-f7aa1aa6a566", + "created": "2023-09-28T21:25:13.306978Z", + "modified": "2023-09-28T21:25:13.306978Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db", @@ -10799,9 +10799,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--9575d509-2aa5-447d-8a0e-5660c65ddb59", - "created": "2023-09-25T16:17:56.751826Z", - "modified": "2023-09-25T16:17:56.751826Z", + "id": "relationship--c9bb953b-5337-400d-89fb-bad965c43520", + "created": "2023-09-28T21:25:13.307094Z", + "modified": "2023-09-28T21:25:13.307094Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8", @@ -10813,9 +10813,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--75209afe-d52b-4986-a9f8-9756d2200141", - "created": "2023-09-25T16:17:56.752048Z", - "modified": "2023-09-25T16:17:56.752048Z", + "id": "relationship--e2b08baa-2534-43a5-8b86-7363dab5d08e", + "created": "2023-09-28T21:25:13.307209Z", + "modified": "2023-09-28T21:25:13.307209Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4", @@ -10827,9 +10827,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--eee6df78-de64-4a6c-8140-720640016174", - "created": "2023-09-25T16:17:56.752244Z", - "modified": "2023-09-25T16:17:56.752244Z", + "id": "relationship--d23070e0-d1f6-44ed-a1a9-90c6f745a12e", + "created": "2023-09-28T21:25:13.307296Z", + "modified": "2023-09-28T21:25:13.307296Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3", @@ -10841,9 +10841,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--8567fc84-f335-4b98-b51c-c3c01969970c", - "created": "2023-09-25T16:17:56.752464Z", - "modified": "2023-09-25T16:17:56.752464Z", + "id": "relationship--ba020956-91cf-4415-a332-262097da5f4c", + "created": "2023-09-28T21:25:13.307382Z", + "modified": "2023-09-28T21:25:13.307382Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e", @@ -10855,9 +10855,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1798b25b-5545-4bc1-86ba-907e72522dfc", - "created": "2023-09-25T16:17:56.752684Z", - "modified": "2023-09-25T16:17:56.752684Z", + "id": "relationship--c67c1802-41c6-4f2f-90a5-371952c6eacc", + "created": "2023-09-28T21:25:13.30747Z", + "modified": "2023-09-28T21:25:13.30747Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f", @@ -10869,9 +10869,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c878517e-064d-4007-bf68-30e2944522b5", - "created": "2023-09-25T16:17:56.752881Z", - "modified": "2023-09-25T16:17:56.752881Z", + "id": "relationship--7a73aba3-02a4-4dab-8cbf-d49218183fef", + "created": "2023-09-28T21:25:13.307556Z", + "modified": "2023-09-28T21:25:13.307556Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5", @@ -10883,9 +10883,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--33e0c3b7-78d6-41d9-bd69-f1a1aa3b1659", - "created": "2023-09-25T16:17:56.753138Z", - "modified": "2023-09-25T16:17:56.753138Z", + "id": "relationship--a1ecaaf6-b033-46b9-b868-30139ca696c3", + "created": "2023-09-28T21:25:13.307643Z", + "modified": "2023-09-28T21:25:13.307643Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc", @@ -10897,9 +10897,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--9553d778-2dcd-43eb-8cc9-ba9db1ad72c4", - "created": "2023-09-25T16:17:56.753391Z", - "modified": "2023-09-25T16:17:56.753391Z", + "id": "relationship--0ce4bd8a-2656-46ba-a33b-ad0b649e8cd8", + "created": "2023-09-28T21:25:13.307739Z", + "modified": "2023-09-28T21:25:13.307739Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae", @@ -10911,9 +10911,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--2328fc85-14fa-42b6-a47a-35fcca0689f5", - "created": "2023-09-25T16:17:56.753698Z", - "modified": "2023-09-25T16:17:56.753698Z", + "id": "relationship--b782580e-e04a-46b2-ba8b-1fe00cca80bc", + "created": "2023-09-28T21:25:13.307882Z", + "modified": "2023-09-28T21:25:13.307882Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4", @@ -10925,9 +10925,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--488bde43-e83e-43ae-a05e-b85c30fb8d17", - "created": "2023-09-25T16:17:56.753993Z", - "modified": "2023-09-25T16:17:56.753993Z", + "id": "relationship--b56f527e-46bd-4ed9-8265-a41a381df79c", + "created": "2023-09-28T21:25:13.308002Z", + "modified": "2023-09-28T21:25:13.308002Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d", @@ -10939,9 +10939,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--2547b233-c3d9-4e59-9e31-a5a004609fcb", - "created": "2023-09-25T16:17:56.754378Z", - "modified": "2023-09-25T16:17:56.754378Z", + "id": "relationship--c99eb9bc-03d8-48e9-aaf4-9c3329dadc06", + "created": "2023-09-28T21:25:13.308121Z", + "modified": "2023-09-28T21:25:13.308121Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba", @@ -10953,9 +10953,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--f52220be-d13e-460a-819a-db86e655ba4c", - "created": "2023-09-25T16:17:56.754987Z", - "modified": "2023-09-25T16:17:56.754987Z", + "id": "relationship--fd7ee722-73fb-44c9-987c-c10a6b7b9a12", + "created": "2023-09-28T21:25:13.308214Z", + "modified": "2023-09-28T21:25:13.308214Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea", @@ -10967,9 +10967,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--f3e35961-8934-45cd-a04e-eff2ee35d424", - "created": "2023-09-25T16:17:56.756173Z", - "modified": "2023-09-25T16:17:56.756173Z", + "id": "relationship--52b0d991-78dd-4dd6-bce1-51dbc4f68dc2", + "created": "2023-09-28T21:25:13.308324Z", + "modified": "2023-09-28T21:25:13.308324Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1", @@ -10981,9 +10981,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--9d715b2d-e7c8-42fa-bd4a-40a08b7a287f", - "created": "2023-09-25T16:17:56.756767Z", - "modified": "2023-09-25T16:17:56.756767Z", + "id": "relationship--5438b7e4-45ef-4962-932d-c49145ba7afe", + "created": "2023-09-28T21:25:13.308464Z", + "modified": "2023-09-28T21:25:13.308464Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9", @@ -10995,9 +10995,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a5c058b7-79a7-47b1-8841-4dbf791e86ac", - "created": "2023-09-25T16:17:56.757214Z", - "modified": "2023-09-25T16:17:56.757214Z", + "id": "relationship--0f328003-fa9d-482a-96a0-e98c0861afc2", + "created": "2023-09-28T21:25:13.308642Z", + "modified": "2023-09-28T21:25:13.308642Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7", @@ -11009,9 +11009,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--6840a40a-4c02-4cb6-9a1c-f179fde4c776", - "created": "2023-09-25T16:17:56.757686Z", - "modified": "2023-09-25T16:17:56.757686Z", + "id": "relationship--41d3b54b-e7d9-454b-98c1-4c8ea8828504", + "created": "2023-09-28T21:25:13.308741Z", + "modified": "2023-09-28T21:25:13.308741Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7", @@ -11023,9 +11023,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--49c85ac8-70b7-496d-acc7-441e3b0f68e5", - "created": "2023-09-25T16:17:56.758337Z", - "modified": "2023-09-25T16:17:56.758337Z", + "id": "relationship--5193e359-4f2e-413c-85bf-f660c207345b", + "created": "2023-09-28T21:25:13.308828Z", + "modified": "2023-09-28T21:25:13.308828Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99", @@ -11037,9 +11037,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--7d86741a-decf-47c2-9418-cb861eaf5d0a", - "created": "2023-09-25T16:17:56.758811Z", - "modified": "2023-09-25T16:17:56.758811Z", + "id": "relationship--75309c18-b540-47bd-83a1-8a46cc297145", + "created": "2023-09-28T21:25:13.308914Z", + "modified": "2023-09-28T21:25:13.308914Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319", @@ -11051,9 +11051,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--bafdd7f4-a886-4851-8906-f175fb2ae111", - "created": "2023-09-25T16:17:56.759284Z", - "modified": "2023-09-25T16:17:56.759284Z", + "id": "relationship--71241744-f535-4ce0-93fd-bb426f41bbf1", + "created": "2023-09-28T21:25:13.308999Z", + "modified": "2023-09-28T21:25:13.308999Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979", @@ -11065,9 +11065,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--aa323e78-4b31-4679-93ce-da0db76ad076", - "created": "2023-09-25T16:17:56.759821Z", - "modified": "2023-09-25T16:17:56.759821Z", + "id": "relationship--1cd1484b-6de4-434e-8a8a-7085c9a12a3a", + "created": "2023-09-28T21:25:13.309094Z", + "modified": "2023-09-28T21:25:13.309094Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d", @@ -11079,9 +11079,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--542f03fe-1b0a-4e54-af37-9580e1e7d9dd", - "created": "2023-09-25T16:17:56.760542Z", - "modified": "2023-09-25T16:17:56.760542Z", + "id": "relationship--ccab419b-063c-4983-82ec-1fcc988af64c", + "created": "2023-09-28T21:25:13.309187Z", + "modified": "2023-09-28T21:25:13.309187Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9", @@ -11093,9 +11093,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1f3d58ef-c712-495f-8a60-e2974b671a2c", - "created": "2023-09-25T16:17:56.761322Z", - "modified": "2023-09-25T16:17:56.761322Z", + "id": "relationship--ce493e21-16ab-4560-895c-a751877a2779", + "created": "2023-09-28T21:25:13.309307Z", + "modified": "2023-09-28T21:25:13.309307Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4", @@ -11107,9 +11107,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--72612cfb-09d7-4d36-ad19-f05abccd7891", - "created": "2023-09-25T16:17:56.762095Z", - "modified": "2023-09-25T16:17:56.762095Z", + "id": "relationship--e30857c9-921f-4918-b4b4-8717d4e82ad0", + "created": "2023-09-28T21:25:13.309438Z", + "modified": "2023-09-28T21:25:13.309438Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6", @@ -11121,9 +11121,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--0e0002dd-e689-4587-8f30-4fa093db549b", - "created": "2023-09-25T16:17:56.763244Z", - "modified": "2023-09-25T16:17:56.763244Z", + "id": "relationship--360b5943-0c7e-46fb-8dd9-36d772c89ef5", + "created": "2023-09-28T21:25:13.309566Z", + "modified": "2023-09-28T21:25:13.309566Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--c7017017-4965-4dad-a970-e748b7080a19", @@ -11135,9 +11135,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--6a1b84c9-0cec-4764-97d9-a956a75c15a0", - "created": "2023-09-25T16:17:56.764442Z", - "modified": "2023-09-25T16:17:56.764442Z", + "id": "relationship--b3aea206-4346-4f69-997d-3576e1e3abca", + "created": "2023-09-28T21:25:13.309689Z", + "modified": "2023-09-28T21:25:13.309689Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc", @@ -11149,9 +11149,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--15013b10-242c-4fb5-a2f9-60793d88eee7", - "created": "2023-09-25T16:17:56.764709Z", - "modified": "2023-09-25T16:17:56.764709Z", + "id": "relationship--600f39f7-93a6-4d29-a2d1-dfd6a249e015", + "created": "2023-09-28T21:25:13.309808Z", + "modified": "2023-09-28T21:25:13.309808Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f", @@ -11163,9 +11163,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--d2d1622e-2480-404a-80ef-148230db59a9", - "created": "2023-09-25T16:17:56.764988Z", - "modified": "2023-09-25T16:17:56.764988Z", + "id": "relationship--b177bb83-d0c0-4966-b86e-370ab7c4361f", + "created": "2023-09-28T21:25:13.309929Z", + "modified": "2023-09-28T21:25:13.309929Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85", @@ -11177,9 +11177,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--0c0fe322-69cf-48cc-ac1a-7586b70b0c06", - "created": "2023-09-25T16:17:56.765223Z", - "modified": "2023-09-25T16:17:56.765223Z", + "id": "relationship--6d62413f-450d-46ee-9e4c-7c2ce85627fa", + "created": "2023-09-28T21:25:13.310052Z", + "modified": "2023-09-28T21:25:13.310052Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3", @@ -11191,9 +11191,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--f1d73c00-dc33-4bad-a532-b6e63a161668", - "created": "2023-09-25T16:17:56.765483Z", - "modified": "2023-09-25T16:17:56.765483Z", + "id": "relationship--1cbb29f2-ac70-4b71-bd04-aae043dd8ab7", + "created": "2023-09-28T21:25:13.310174Z", + "modified": "2023-09-28T21:25:13.310174Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7", @@ -11205,9 +11205,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4a8735bb-c0a2-4ec4-ae1d-f6375d2aa4be", - "created": "2023-09-25T16:17:56.765733Z", - "modified": "2023-09-25T16:17:56.765733Z", + "id": "relationship--bf7d8d83-63a9-474f-a618-5a0079746bcc", + "created": "2023-09-28T21:25:13.310329Z", + "modified": "2023-09-28T21:25:13.310329Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea", @@ -11219,9 +11219,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c5d547b8-40ad-4a65-a4ac-7b4d8f6c55b4", - "created": "2023-09-25T16:17:56.765999Z", - "modified": "2023-09-25T16:17:56.765999Z", + "id": "relationship--3baa67d4-db7a-4f55-9296-6b8d101eeba0", + "created": "2023-09-28T21:25:13.310461Z", + "modified": "2023-09-28T21:25:13.310461Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321", @@ -11233,9 +11233,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--72b75a6e-ede4-4080-bec2-31e8092b4586", - "created": "2023-09-25T16:17:56.766329Z", - "modified": "2023-09-25T16:17:56.766329Z", + "id": "relationship--78686461-9ab8-42dd-9f9c-045e33a61bd0", + "created": "2023-09-28T21:25:13.310581Z", + "modified": "2023-09-28T21:25:13.310581Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce", @@ -11247,9 +11247,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--69e0a693-290c-4fe9-818e-b0d78a603628", - "created": "2023-09-25T16:17:56.766801Z", - "modified": "2023-09-25T16:17:56.766801Z", + "id": "relationship--5cd15fbc-6838-493f-8761-a22f3fdc8512", + "created": "2023-09-28T21:25:13.310699Z", + "modified": "2023-09-28T21:25:13.310699Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2", @@ -11261,9 +11261,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c53600a7-edf2-4e57-9226-7a16d193d056", - "created": "2023-09-25T16:17:56.767263Z", - "modified": "2023-09-25T16:17:56.767263Z", + "id": "relationship--dc2b4103-a1d1-4f95-ae0d-e86b1858f58e", + "created": "2023-09-28T21:25:13.31082Z", + "modified": "2023-09-28T21:25:13.31082Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa", @@ -11275,9 +11275,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--211d9a8c-0a91-4082-869c-a36b66e4c57b", - "created": "2023-09-25T16:17:56.767849Z", - "modified": "2023-09-25T16:17:56.767849Z", + "id": "relationship--195bbbea-b00d-47a3-b58d-e1c80fbf7d8e", + "created": "2023-09-28T21:25:13.310939Z", + "modified": "2023-09-28T21:25:13.310939Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b", @@ -11289,9 +11289,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4f837939-8d90-4143-b11f-46e8a095f3b9", - "created": "2023-09-25T16:17:56.768487Z", - "modified": "2023-09-25T16:17:56.768487Z", + "id": "relationship--2c56f3c2-d331-4c72-ba1f-8eeda6504938", + "created": "2023-09-28T21:25:13.311052Z", + "modified": "2023-09-28T21:25:13.311052Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2", @@ -11303,9 +11303,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--541e715e-0dfd-4cb4-ac4c-a1017af903ab", - "created": "2023-09-25T16:17:56.769271Z", - "modified": "2023-09-25T16:17:56.769271Z", + "id": "relationship--fcf5a909-516b-4729-b74c-9a75d4938a26", + "created": "2023-09-28T21:25:13.311148Z", + "modified": "2023-09-28T21:25:13.311148Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72", @@ -11317,9 +11317,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--0f6e068f-d248-4856-940e-3845d2e08f85", - "created": "2023-09-25T16:17:56.770022Z", - "modified": "2023-09-25T16:17:56.770022Z", + "id": "relationship--0573ea47-7438-42a4-95c6-9e4f82a46b19", + "created": "2023-09-28T21:25:13.311248Z", + "modified": "2023-09-28T21:25:13.311248Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46", @@ -11331,9 +11331,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--b564adb5-c556-439c-b77e-413323e39094", - "created": "2023-09-25T16:17:56.770806Z", - "modified": "2023-09-25T16:17:56.770806Z", + "id": "relationship--a6595f42-44a8-444b-8068-4de2cea40c05", + "created": "2023-09-28T21:25:13.31139Z", + "modified": "2023-09-28T21:25:13.31139Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c", @@ -11345,9 +11345,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c699cd9d-7a8a-49d7-b050-3b85731382fe", - "created": "2023-09-25T16:17:56.77158Z", - "modified": "2023-09-25T16:17:56.77158Z", + "id": "relationship--7a84f767-5918-4182-83d0-0283139c8216", + "created": "2023-09-28T21:25:13.311527Z", + "modified": "2023-09-28T21:25:13.311527Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99", @@ -11359,9 +11359,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a2bac343-8d9b-4eeb-b540-2dedeb0a7f32", - "created": "2023-09-25T16:17:56.772686Z", - "modified": "2023-09-25T16:17:56.772686Z", + "id": "relationship--a08bff03-c5c1-4127-a69f-e1d600ad2e68", + "created": "2023-09-28T21:25:13.311646Z", + "modified": "2023-09-28T21:25:13.311646Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0", @@ -11373,9 +11373,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--b44496e7-e6a2-4d00-bebd-0dd63834354f", - "created": "2023-09-25T16:17:56.773535Z", - "modified": "2023-09-25T16:17:56.773535Z", + "id": "relationship--99492dce-8790-4dcc-8d36-7e8d4ef2adcb", + "created": "2023-09-28T21:25:13.311779Z", + "modified": "2023-09-28T21:25:13.311779Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271", @@ -11387,9 +11387,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--37bcc45a-ce05-4405-ab9a-2578320dfce6", - "created": "2023-09-25T16:17:56.773926Z", - "modified": "2023-09-25T16:17:56.773926Z", + "id": "relationship--accff777-5143-4263-847d-7ec30b3e8bbe", + "created": "2023-09-28T21:25:13.311937Z", + "modified": "2023-09-28T21:25:13.311937Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3", @@ -11401,9 +11401,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--364a1876-2281-4c82-b60f-8514d313aefe", - "created": "2023-09-25T16:17:56.774274Z", - "modified": "2023-09-25T16:17:56.774274Z", + "id": "relationship--ea0325cb-dcc4-44c1-8ec4-b509d74ec8ad", + "created": "2023-09-28T21:25:13.312059Z", + "modified": "2023-09-28T21:25:13.312059Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403", @@ -11415,9 +11415,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--e4073f25-7f1e-4f10-9482-7827553a1a98", - "created": "2023-09-25T16:17:56.774778Z", - "modified": "2023-09-25T16:17:56.774778Z", + "id": "relationship--cac7c4fd-e714-4ec3-9ec7-2dcd79ce252f", + "created": "2023-09-28T21:25:13.312185Z", + "modified": "2023-09-28T21:25:13.312185Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4", @@ -11429,9 +11429,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--9e3ead29-c397-436c-9aa7-d8b15e87ff13", - "created": "2023-09-25T16:17:56.775328Z", - "modified": "2023-09-25T16:17:56.775328Z", + "id": "relationship--6de3e6d0-345d-4188-b2aa-3e40e728063f", + "created": "2023-09-28T21:25:13.312294Z", + "modified": "2023-09-28T21:25:13.312294Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda", @@ -11443,9 +11443,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--16215e3a-1e21-4544-9112-cfc4d6abd2d1", - "created": "2023-09-25T16:17:56.776008Z", - "modified": "2023-09-25T16:17:56.776008Z", + "id": "relationship--600710ac-d759-49a3-bb55-ae1a647c7e48", + "created": "2023-09-28T21:25:13.312447Z", + "modified": "2023-09-28T21:25:13.312447Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12", @@ -11457,9 +11457,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--e505cfc9-4e87-4041-8e9b-4e575abf40d1", - "created": "2023-09-25T16:17:56.776628Z", - "modified": "2023-09-25T16:17:56.776628Z", + "id": "relationship--c1a55ae5-1c97-47c1-8694-473b16e470fc", + "created": "2023-09-28T21:25:13.312572Z", + "modified": "2023-09-28T21:25:13.312572Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d", @@ -11471,9 +11471,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c42624ab-210c-4ea8-abc0-2cc35e4168d9", - "created": "2023-09-25T16:17:56.777335Z", - "modified": "2023-09-25T16:17:56.777335Z", + "id": "relationship--c2b101b7-6460-4657-9a81-c30d40b92a9f", + "created": "2023-09-28T21:25:13.312678Z", + "modified": "2023-09-28T21:25:13.312678Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8", @@ -11485,9 +11485,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--261a5df2-406c-4742-bfb5-d6d160195f85", - "created": "2023-09-25T16:17:56.778122Z", - "modified": "2023-09-25T16:17:56.778122Z", + "id": "relationship--720361b2-ad44-48da-8ba3-76da7617caa0", + "created": "2023-09-28T21:25:13.312783Z", + "modified": "2023-09-28T21:25:13.312783Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930", @@ -11499,9 +11499,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4ce40985-a2d4-4c3b-9ff8-f8f0bfdf05a5", - "created": "2023-09-25T16:17:56.779017Z", - "modified": "2023-09-25T16:17:56.779017Z", + "id": "relationship--c419c77c-7dc6-4e93-86e9-4e112a4a8750", + "created": "2023-09-28T21:25:13.312908Z", + "modified": "2023-09-28T21:25:13.312908Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488", @@ -11513,9 +11513,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--fc0a54bc-8633-4771-a602-7be7d3156cce", - "created": "2023-09-25T16:17:56.779467Z", - "modified": "2023-09-25T16:17:56.779467Z", + "id": "relationship--f6fb3fe1-9f71-4aa5-8298-7e003d62c5b2", + "created": "2023-09-28T21:25:13.313016Z", + "modified": "2023-09-28T21:25:13.313016Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a", @@ -11527,9 +11527,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--64dd6c9e-47ba-4375-a7ae-0a41ddb12e80", - "created": "2023-09-25T16:17:56.779705Z", - "modified": "2023-09-25T16:17:56.779705Z", + "id": "relationship--814e1126-b6c7-4024-920f-c183d3e20110", + "created": "2023-09-28T21:25:13.313122Z", + "modified": "2023-09-28T21:25:13.313122Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5", @@ -11541,9 +11541,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--d5e1829a-7898-43bb-aec0-5493b98fa02b", - "created": "2023-09-25T16:17:56.780195Z", - "modified": "2023-09-25T16:17:56.780195Z", + "id": "relationship--5abf77c7-3b18-41f7-b920-1dfe7dd21a6d", + "created": "2023-09-28T21:25:13.313231Z", + "modified": "2023-09-28T21:25:13.313231Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5", @@ -11555,9 +11555,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a4e24bcf-d59b-45dc-a9a8-86e2b21b51d0", - "created": "2023-09-25T16:17:56.780702Z", - "modified": "2023-09-25T16:17:56.780702Z", + "id": "relationship--54ab5bff-ae5b-4bd4-9393-eda93a8af259", + "created": "2023-09-28T21:25:13.313347Z", + "modified": "2023-09-28T21:25:13.313347Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca", @@ -11569,9 +11569,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1a9a54f2-f67b-4a8c-bdf8-802256951707", - "created": "2023-09-25T16:17:56.781044Z", - "modified": "2023-09-25T16:17:56.781044Z", + "id": "relationship--21083b4e-b03c-4557-a65f-ba301b65a977", + "created": "2023-09-28T21:25:13.313462Z", + "modified": "2023-09-28T21:25:13.313462Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139", @@ -11583,9 +11583,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--90ae3161-e11e-4c0b-8d54-11326d93af0b", - "created": "2023-09-25T16:17:56.781368Z", - "modified": "2023-09-25T16:17:56.781368Z", + "id": "relationship--d5218728-49f8-435a-9b5d-d8a3b38d6558", + "created": "2023-09-28T21:25:13.313584Z", + "modified": "2023-09-28T21:25:13.313584Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4", @@ -11597,9 +11597,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--8f5af300-3ea4-4746-b3e5-a7af80c2e1d8", - "created": "2023-09-25T16:17:56.781752Z", - "modified": "2023-09-25T16:17:56.781752Z", + "id": "relationship--bdc02a0f-64ee-4a0a-abc2-1b53c99fb185", + "created": "2023-09-28T21:25:13.313702Z", + "modified": "2023-09-28T21:25:13.313702Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370", @@ -11611,9 +11611,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4d7c5f2a-7280-40dc-a264-3d3bc2dfb4bc", - "created": "2023-09-25T16:17:56.782049Z", - "modified": "2023-09-25T16:17:56.782049Z", + "id": "relationship--6ad713fd-04c7-4a8f-a367-d4a6e122af19", + "created": "2023-09-28T21:25:13.313867Z", + "modified": "2023-09-28T21:25:13.313867Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51", @@ -11625,9 +11625,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c6ea1a66-ed28-4267-9136-2d6069e5f7f2", - "created": "2023-09-25T16:17:56.782424Z", - "modified": "2023-09-25T16:17:56.782424Z", + "id": "relationship--74ba9cc0-cf78-4020-b648-e87d0255a902", + "created": "2023-09-28T21:25:13.31399Z", + "modified": "2023-09-28T21:25:13.31399Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1", @@ -11639,9 +11639,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--51e1e8e3-b7b3-4f18-b5e3-b673e2788d70", - "created": "2023-09-25T16:17:56.782696Z", - "modified": "2023-09-25T16:17:56.782696Z", + "id": "relationship--901d5907-f2a9-4ef0-8254-d094f806fb68", + "created": "2023-09-28T21:25:13.314109Z", + "modified": "2023-09-28T21:25:13.314109Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944", @@ -11653,9 +11653,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--ed34c2f4-5d61-407b-948b-ec33d6165902", - "created": "2023-09-25T16:17:56.782953Z", - "modified": "2023-09-25T16:17:56.782953Z", + "id": "relationship--c05b7820-d21d-4d6e-aaf5-af3836dbfb64", + "created": "2023-09-28T21:25:13.314231Z", + "modified": "2023-09-28T21:25:13.314231Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe", @@ -11667,9 +11667,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4a4ac151-a227-47f9-9daf-9d694b60824a", - "created": "2023-09-25T16:17:56.783329Z", - "modified": "2023-09-25T16:17:56.783329Z", + "id": "relationship--eedba334-395a-4372-9047-768e8842d748", + "created": "2023-09-28T21:25:13.314349Z", + "modified": "2023-09-28T21:25:13.314349Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9", @@ -11681,9 +11681,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--28b1c818-95a9-4d62-b1ea-d24994d92db5", - "created": "2023-09-25T16:17:56.783558Z", - "modified": "2023-09-25T16:17:56.783558Z", + "id": "relationship--1b54ee55-410b-44a6-8d9f-9c47efde1b74", + "created": "2023-09-28T21:25:13.314466Z", + "modified": "2023-09-28T21:25:13.314466Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d", @@ -11695,9 +11695,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--7d96264f-79dd-472b-a972-bbdf90315222", - "created": "2023-09-25T16:17:56.783786Z", - "modified": "2023-09-25T16:17:56.783786Z", + "id": "relationship--23d6f2b7-e5a8-46b3-bf33-871d9913382a", + "created": "2023-09-28T21:25:13.314581Z", + "modified": "2023-09-28T21:25:13.314581Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce", @@ -11709,9 +11709,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c4c2b9ed-c72c-40c8-97a1-7a6ff144797b", - "created": "2023-09-25T16:17:56.784268Z", - "modified": "2023-09-25T16:17:56.784268Z", + "id": "relationship--d841b5dc-21e6-47dc-9bc5-50a618807bc7", + "created": "2023-09-28T21:25:13.314695Z", + "modified": "2023-09-28T21:25:13.314695Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab", @@ -11723,9 +11723,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--64c46fe7-557e-4f58-a725-828849a2ab1f", - "created": "2023-09-25T16:17:56.784845Z", - "modified": "2023-09-25T16:17:56.784845Z", + "id": "relationship--75f294b6-baa9-4be0-803b-65e309d42522", + "created": "2023-09-28T21:25:13.314829Z", + "modified": "2023-09-28T21:25:13.314829Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac", @@ -11737,9 +11737,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c446e114-fe76-4ff7-81ac-9ad294299783", - "created": "2023-09-25T16:17:56.785406Z", - "modified": "2023-09-25T16:17:56.785406Z", + "id": "relationship--26a97319-2b6f-4e55-a9ab-7cb1c88edf64", + "created": "2023-09-28T21:25:13.314953Z", + "modified": "2023-09-28T21:25:13.314953Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d", @@ -11751,9 +11751,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--e1ddbab7-5032-4ada-a219-7af3af3c660f", - "created": "2023-09-25T16:17:56.785614Z", - "modified": "2023-09-25T16:17:56.785614Z", + "id": "relationship--3dbcafc5-32cc-470b-b465-09ce53ef2a82", + "created": "2023-09-28T21:25:13.315071Z", + "modified": "2023-09-28T21:25:13.315071Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5", @@ -11765,9 +11765,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--d9b7ea78-a043-4e78-bca2-1348143d67a3", - "created": "2023-09-25T16:17:56.785749Z", - "modified": "2023-09-25T16:17:56.785749Z", + "id": "relationship--c361e92d-be90-4430-9c0d-75d4b0de2066", + "created": "2023-09-28T21:25:13.315188Z", + "modified": "2023-09-28T21:25:13.315188Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291", @@ -11779,9 +11779,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--672a4b60-940f-4b22-bb6b-42db90a6b11d", - "created": "2023-09-25T16:17:56.785877Z", - "modified": "2023-09-25T16:17:56.785877Z", + "id": "relationship--fc6d9723-b04c-4613-8ca6-5da7fc663dc4", + "created": "2023-09-28T21:25:13.31532Z", + "modified": "2023-09-28T21:25:13.31532Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425", @@ -11793,9 +11793,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--34cce136-f81d-44d9-a4f5-f1f4cc6fb865", - "created": "2023-09-25T16:17:56.786089Z", - "modified": "2023-09-25T16:17:56.786089Z", + "id": "relationship--abf67e18-7b65-4652-a013-ce2431b1534f", + "created": "2023-09-28T21:25:13.315463Z", + "modified": "2023-09-28T21:25:13.315463Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1", @@ -11807,9 +11807,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--38866542-b70d-4481-abd7-7855d0bdbbe3", - "created": "2023-09-25T16:17:56.786304Z", - "modified": "2023-09-25T16:17:56.786304Z", + "id": "relationship--6992cfbd-e0c4-472d-833c-be1002939dce", + "created": "2023-09-28T21:25:13.315583Z", + "modified": "2023-09-28T21:25:13.315583Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa", @@ -11821,9 +11821,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--3afd31a3-8ee9-4d96-9001-1b80c492e0e2", - "created": "2023-09-25T16:17:56.786492Z", - "modified": "2023-09-25T16:17:56.786492Z", + "id": "relationship--1f1585aa-9a8e-4a21-a408-823316fe099d", + "created": "2023-09-28T21:25:13.315703Z", + "modified": "2023-09-28T21:25:13.315703Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4", @@ -11835,9 +11835,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--218fac29-75a7-4534-ac74-d07fba2536d1", - "created": "2023-09-25T16:17:56.786758Z", - "modified": "2023-09-25T16:17:56.786758Z", + "id": "relationship--abd69a00-47ff-4a1f-99e8-f1123d63336d", + "created": "2023-09-28T21:25:13.31582Z", + "modified": "2023-09-28T21:25:13.31582Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1", @@ -11849,9 +11849,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--5a024946-e33d-4249-82ad-b907b159c036", - "created": "2023-09-25T16:17:56.786992Z", - "modified": "2023-09-25T16:17:56.786992Z", + "id": "relationship--7d259bf3-bd15-48c5-9841-77061387ba9b", + "created": "2023-09-28T21:25:13.315939Z", + "modified": "2023-09-28T21:25:13.315939Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82", @@ -11863,9 +11863,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--180c1e0e-664a-4b94-aa65-d0a16cde1f2c", - "created": "2023-09-25T16:17:56.787292Z", - "modified": "2023-09-25T16:17:56.787292Z", + "id": "relationship--b8e23a24-d680-40be-bbbd-438292131505", + "created": "2023-09-28T21:25:13.316057Z", + "modified": "2023-09-28T21:25:13.316057Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e", @@ -11877,9 +11877,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--6fdf0112-aa49-4bfe-adb6-79107e846933", - "created": "2023-09-25T16:17:56.788041Z", - "modified": "2023-09-25T16:17:56.788041Z", + "id": "relationship--a1083514-150c-4405-9702-de14cb7c0c56", + "created": "2023-09-28T21:25:13.316211Z", + "modified": "2023-09-28T21:25:13.316211Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8", @@ -11891,9 +11891,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4e5c7704-a069-4375-9b61-f28af0b8009b", - "created": "2023-09-25T16:17:56.788604Z", - "modified": "2023-09-25T16:17:56.788604Z", + "id": "relationship--7c576fca-ccfd-485a-b647-22271104eb56", + "created": "2023-09-28T21:25:13.31635Z", + "modified": "2023-09-28T21:25:13.31635Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae", @@ -11905,9 +11905,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--50e19d54-401c-4e88-8b4c-3b22edc9865a", - "created": "2023-09-25T16:17:56.789162Z", - "modified": "2023-09-25T16:17:56.789162Z", + "id": "relationship--2f835e5e-a5db-48bf-b4c7-f5d88d87b5b6", + "created": "2023-09-28T21:25:13.316471Z", + "modified": "2023-09-28T21:25:13.316471Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020", @@ -11919,9 +11919,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1e9d35f9-35b2-4c81-8250-6ed720be3bed", - "created": "2023-09-25T16:17:56.789727Z", - "modified": "2023-09-25T16:17:56.789727Z", + "id": "relationship--2b9a7413-22f8-42eb-8a03-a17ac2c84842", + "created": "2023-09-28T21:25:13.31659Z", + "modified": "2023-09-28T21:25:13.31659Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803", @@ -11933,9 +11933,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1047fb0e-5706-4a49-8661-ef0f3cbae709", - "created": "2023-09-25T16:17:56.790389Z", - "modified": "2023-09-25T16:17:56.790389Z", + "id": "relationship--416d66ec-fb1e-4f04-9cc2-4cb309acbe47", + "created": "2023-09-28T21:25:13.316713Z", + "modified": "2023-09-28T21:25:13.316713Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3", @@ -11947,9 +11947,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--38e7c72a-c775-4de0-b5af-615f01d0d41e", - "created": "2023-09-25T16:17:56.791038Z", - "modified": "2023-09-25T16:17:56.791038Z", + "id": "relationship--841a90d4-3869-478f-b358-13845de1ad20", + "created": "2023-09-28T21:25:13.316835Z", + "modified": "2023-09-28T21:25:13.316835Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588", @@ -11961,9 +11961,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--225928dc-e030-48b3-860f-1228b0bd5276", - "created": "2023-09-25T16:17:56.791695Z", - "modified": "2023-09-25T16:17:56.791695Z", + "id": "relationship--e70a6b66-7629-408b-aac6-6845b29a57a1", + "created": "2023-09-28T21:25:13.316953Z", + "modified": "2023-09-28T21:25:13.316953Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c", @@ -11975,9 +11975,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--d8d697a5-1fd3-4dc9-b9b8-71be8fc60b13", - "created": "2023-09-25T16:17:56.792341Z", - "modified": "2023-09-25T16:17:56.792341Z", + "id": "relationship--c959081a-60c0-40d3-9dcd-6039936bf8da", + "created": "2023-09-28T21:25:13.317069Z", + "modified": "2023-09-28T21:25:13.317069Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--3437993c-c521-4145-a2d8-b860399876b0", @@ -11989,9 +11989,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--8b46dbcc-b8a9-42a2-9dea-a4b36dbd16d9", - "created": "2023-09-25T16:17:56.793094Z", - "modified": "2023-09-25T16:17:56.793094Z", + "id": "relationship--f3bd25c3-b90b-4ba4-ba59-752d3c5d7918", + "created": "2023-09-28T21:25:13.317186Z", + "modified": "2023-09-28T21:25:13.317186Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9", @@ -12003,9 +12003,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1974b645-52d3-4c3a-8631-a9e6fbf7bda1", - "created": "2023-09-25T16:17:56.793753Z", - "modified": "2023-09-25T16:17:56.793753Z", + "id": "relationship--abedeb8a-37ba-4094-96e5-e9b056d8e25a", + "created": "2023-09-28T21:25:13.317324Z", + "modified": "2023-09-28T21:25:13.317324Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5", @@ -12017,9 +12017,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--042b3d7e-4aed-42da-ba7f-44ed4ee27d56", - "created": "2023-09-25T16:17:56.794604Z", - "modified": "2023-09-25T16:17:56.794604Z", + "id": "relationship--1b78090f-9ec6-4d14-8347-47e651ea0d07", + "created": "2023-09-28T21:25:13.31769Z", + "modified": "2023-09-28T21:25:13.31769Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f", @@ -12031,9 +12031,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--0bfa2fbf-f578-4452-b5c7-a37802ad9af8", - "created": "2023-09-25T16:17:56.79486Z", - "modified": "2023-09-25T16:17:56.79486Z", + "id": "relationship--d93dd97a-12e2-4d7b-8c6a-cc113777e7dc", + "created": "2023-09-28T21:25:13.317907Z", + "modified": "2023-09-28T21:25:13.317907Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79", @@ -12045,9 +12045,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a176a66d-f374-44ca-851d-3f22d5877fe7", - "created": "2023-09-25T16:17:56.795119Z", - "modified": "2023-09-25T16:17:56.795119Z", + "id": "relationship--8792d47a-0bf4-4d49-82b3-a5842ab9c296", + "created": "2023-09-28T21:25:13.318039Z", + "modified": "2023-09-28T21:25:13.318039Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6", @@ -12059,9 +12059,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--b25b62f2-282c-4e4e-bfa6-39c9e258ed4a", - "created": "2023-09-25T16:17:56.795308Z", - "modified": "2023-09-25T16:17:56.795308Z", + "id": "relationship--d51a90a6-094b-48c1-990d-8430cccba6eb", + "created": "2023-09-28T21:25:13.318136Z", + "modified": "2023-09-28T21:25:13.318136Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313", @@ -12073,9 +12073,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--13805edb-0936-42db-91a5-8adec868a3ab", - "created": "2023-09-25T16:17:56.795459Z", - "modified": "2023-09-25T16:17:56.795459Z", + "id": "relationship--4db60e48-5e6d-4f8c-be48-c83b9ea4a0c6", + "created": "2023-09-28T21:25:13.318233Z", + "modified": "2023-09-28T21:25:13.318233Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3", @@ -12087,9 +12087,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--08d2a8eb-3145-48f1-ab1b-bd1d0413f456", - "created": "2023-09-25T16:17:56.79559Z", - "modified": "2023-09-25T16:17:56.79559Z", + "id": "relationship--4671ee5d-89c1-44d5-aa6e-19a3bbf6d7a8", + "created": "2023-09-28T21:25:13.318328Z", + "modified": "2023-09-28T21:25:13.318328Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb", @@ -12101,9 +12101,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--4950590e-b40f-417c-bfc7-00ed5e78a6e2", - "created": "2023-09-25T16:17:56.795795Z", - "modified": "2023-09-25T16:17:56.795795Z", + "id": "relationship--38065edb-340a-442c-b9db-cfd32663655d", + "created": "2023-09-28T21:25:13.318421Z", + "modified": "2023-09-28T21:25:13.318421Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb", @@ -12115,9 +12115,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c3868cc0-b27f-4191-8565-feb67229286b", - "created": "2023-09-25T16:17:56.796019Z", - "modified": "2023-09-25T16:17:56.796019Z", + "id": "relationship--9445b8fc-0573-4f56-ae7a-0a64715cd17a", + "created": "2023-09-28T21:25:13.318513Z", + "modified": "2023-09-28T21:25:13.318513Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39", @@ -12129,9 +12129,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--eae0b310-ffb1-4d8c-b17c-c5e6c5f603e1", - "created": "2023-09-25T16:17:56.796161Z", - "modified": "2023-09-25T16:17:56.796161Z", + "id": "relationship--754f3571-2849-4406-a4c8-9478e275ea74", + "created": "2023-09-28T21:25:13.318605Z", + "modified": "2023-09-28T21:25:13.318605Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53", @@ -12143,9 +12143,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--de517077-3958-4c9c-93ea-fd2c7d84c1f1", - "created": "2023-09-25T16:17:56.796291Z", - "modified": "2023-09-25T16:17:56.796291Z", + "id": "relationship--28ad3c67-ffbd-4dc0-a1ba-6fc973414137", + "created": "2023-09-28T21:25:13.318753Z", + "modified": "2023-09-28T21:25:13.318753Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5", @@ -12157,9 +12157,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--ba45636f-e410-4654-a603-897758b3cb26", - "created": "2023-09-25T16:17:56.796456Z", - "modified": "2023-09-25T16:17:56.796456Z", + "id": "relationship--d4388e79-ff30-4294-8ffb-cc2e9283f9fc", + "created": "2023-09-28T21:25:13.318908Z", + "modified": "2023-09-28T21:25:13.318908Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e", @@ -12171,9 +12171,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--85a3dd6f-88b7-476f-9a68-6f9399165756", - "created": "2023-09-25T16:17:56.796674Z", - "modified": "2023-09-25T16:17:56.796674Z", + "id": "relationship--917abd46-b70a-4a8f-b0c2-9c41dbf4db4b", + "created": "2023-09-28T21:25:13.319018Z", + "modified": "2023-09-28T21:25:13.319018Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf", @@ -12185,9 +12185,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--486bac5f-2be3-4df4-9d99-4a37b5c88a90", - "created": "2023-09-25T16:17:56.796936Z", - "modified": "2023-09-25T16:17:56.796936Z", + "id": "relationship--0fd18b9e-3957-4383-a49a-2a986e3fc993", + "created": "2023-09-28T21:25:13.319122Z", + "modified": "2023-09-28T21:25:13.319122Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9", @@ -12199,9 +12199,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1c2b6024-d6b2-4e3f-b976-09a51912d227", - "created": "2023-09-25T16:17:56.797235Z", - "modified": "2023-09-25T16:17:56.797235Z", + "id": "relationship--940f7211-3dd6-464b-9b4b-dccbb770284e", + "created": "2023-09-28T21:25:13.319225Z", + "modified": "2023-09-28T21:25:13.319225Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166", @@ -12213,9 +12213,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--b700f713-bbc2-47ba-b2d5-5349ec1bbfaf", - "created": "2023-09-25T16:17:56.797495Z", - "modified": "2023-09-25T16:17:56.797495Z", + "id": "relationship--584b0c90-bedb-4800-8eb4-4bfa8d42ab61", + "created": "2023-09-28T21:25:13.319327Z", + "modified": "2023-09-28T21:25:13.319327Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e", @@ -12227,9 +12227,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--19292dd9-21a9-4af1-b2a2-c18167c77a6c", - "created": "2023-09-25T16:17:56.797682Z", - "modified": "2023-09-25T16:17:56.797682Z", + "id": "relationship--26980a38-e560-4c54-ac4d-97bc0748d477", + "created": "2023-09-28T21:25:13.31943Z", + "modified": "2023-09-28T21:25:13.31943Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c", @@ -12241,9 +12241,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--78550985-211c-49ed-b1c4-28e35900b27b", - "created": "2023-09-25T16:17:56.797858Z", - "modified": "2023-09-25T16:17:56.797858Z", + "id": "relationship--8263c052-070b-4a5e-893e-c4fc5649d2fc", + "created": "2023-09-28T21:25:13.319539Z", + "modified": "2023-09-28T21:25:13.319539Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde", @@ -12255,9 +12255,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--b41f1ed7-4eca-4ea2-879b-e6ccd75362d1", - "created": "2023-09-25T16:17:56.798113Z", - "modified": "2023-09-25T16:17:56.798113Z", + "id": "relationship--8ffceae4-1cf1-4f88-97d8-0e7014a8ab8d", + "created": "2023-09-28T21:25:13.319648Z", + "modified": "2023-09-28T21:25:13.319648Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f", @@ -12269,9 +12269,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--bf4cbd82-fcec-459b-a0f3-23bf974e72b5", - "created": "2023-09-25T16:17:56.79837Z", - "modified": "2023-09-25T16:17:56.79837Z", + "id": "relationship--b6678ab9-1860-4974-9ada-c5887723527e", + "created": "2023-09-28T21:25:13.319783Z", + "modified": "2023-09-28T21:25:13.319783Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0", @@ -12283,9 +12283,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--6a612e08-bff9-4f46-8a1a-e2bc39972a7f", - "created": "2023-09-25T16:17:56.798647Z", - "modified": "2023-09-25T16:17:56.798647Z", + "id": "relationship--8223d3e7-7444-45a7-a185-2490fb34181c", + "created": "2023-09-28T21:25:13.319893Z", + "modified": "2023-09-28T21:25:13.319893Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c", @@ -12297,9 +12297,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a2dce4bf-3cfe-4b23-aed1-f4799512692d", - "created": "2023-09-25T16:17:56.798882Z", - "modified": "2023-09-25T16:17:56.798882Z", + "id": "relationship--3d7e29f5-b52b-4303-977a-831d14b8e9fc", + "created": "2023-09-28T21:25:13.320002Z", + "modified": "2023-09-28T21:25:13.320002Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8", @@ -12311,9 +12311,9 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--78199341-0901-4071-82b2-3e24ff223f85", - "created": "2023-09-25T16:17:56.79923Z", - "modified": "2023-09-25T16:17:56.79923Z", + "id": "relationship--e8b1de3d-7880-4c7f-be61-ed3bff8f61f8", + "created": "2023-09-28T21:25:13.320109Z", + "modified": "2023-09-28T21:25:13.320109Z", "relationship_type": "subtechnique-of", "description": "", "source_ref": "attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc", @@ -12325,13 +12325,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--170766b0-582e-4b6f-9875-cd892dd990da", - "created": "2023-09-25T16:17:56.799677Z", - "modified": "2023-09-25T16:17:56.799677Z", + "id": "relationship--d8eb9fe8-ace5-493e-a11c-d5dace85a93f", + "created": "2023-09-28T21:25:13.320265Z", + "modified": "2023-09-28T21:25:13.320265Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--abce7f18-537e-43fa-85f5-d6e682b802f1", - "target_ref": "attack-pattern--bf00e553-c89f-40b3-8cec-3f2f996366f8", + "source_ref": "attack-pattern--ca3d3bb7-d3eb-4c2b-9b83-8b8579185636", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12339,13 +12339,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--56a059f1-8d20-47c7-b6da-bd0603fd6854", - "created": "2023-09-25T16:17:56.800143Z", - "modified": "2023-09-25T16:17:56.800143Z", + "id": "relationship--e68f8a83-ea71-48f6-a991-abf47ad0c044", + "created": "2023-09-28T21:25:13.320422Z", + "modified": "2023-09-28T21:25:13.320422Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--c059fec5-ae27-4b80-8dfa-19d17df2e5b7", - "target_ref": "attack-pattern--bf00e553-c89f-40b3-8cec-3f2f996366f8", + "source_ref": "attack-pattern--924eb596-25cc-4c13-8395-56ed892e5771", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12353,13 +12353,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--e39feeed-5c3c-4678-9a68-853ee17e0346", - "created": "2023-09-25T16:17:56.800747Z", - "modified": "2023-09-25T16:17:56.800747Z", + "id": "relationship--38a3f8f3-c6d8-4e08-8ba6-3bbb88a5201f", + "created": "2023-09-28T21:25:13.320537Z", + "modified": "2023-09-28T21:25:13.320537Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--01449efe-95f9-4480-bc5e-1fe6ee04e333", - "target_ref": "attack-pattern--bf00e553-c89f-40b3-8cec-3f2f996366f8", + "source_ref": "attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12367,13 +12367,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--60f6ded3-f3ff-45fc-8453-2c8c30a8114b", - "created": "2023-09-25T16:17:56.801388Z", - "modified": "2023-09-25T16:17:56.801388Z", + "id": "relationship--cd3d7703-d6fc-49d1-9776-563143f865e6", + "created": "2023-09-28T21:25:13.320652Z", + "modified": "2023-09-28T21:25:13.320652Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--3aa19ee4-7c0f-4108-b4ff-d7cbb37f7f66", - "target_ref": "attack-pattern--bf00e553-c89f-40b3-8cec-3f2f996366f8", + "source_ref": "attack-pattern--2b17f29f-f65f-4398-9e35-1c1d8836c20d", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12381,13 +12381,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--3e7ed126-f8b2-44cb-830d-02d972ef3b8b", - "created": "2023-09-25T16:17:56.802079Z", - "modified": "2023-09-25T16:17:56.802079Z", + "id": "relationship--b5a1948f-07dc-4e84-9225-aaa7b652b047", + "created": "2023-09-28T21:25:13.320768Z", + "modified": "2023-09-28T21:25:13.320768Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--872ec72b-0270-4d64-83f8-2588ea76577a", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--c28a0edd-a7af-4651-8e11-8e7284009174", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12395,13 +12395,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--1465bfb5-2967-42a1-aad8-8aea4bccac4b", - "created": "2023-09-25T16:17:56.802681Z", - "modified": "2023-09-25T16:17:56.802681Z", + "id": "relationship--2f422aa3-6991-4604-acca-b919414096d4", + "created": "2023-09-28T21:25:13.320884Z", + "modified": "2023-09-28T21:25:13.320884Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--f7430ba5-3391-4a7c-9890-d625cd051ee8", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--afb60a6d-8299-4b2c-abda-6e11e4a65a4b", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12409,13 +12409,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a14e2bca-ca63-4b72-ab53-5d9a3d4dd697", - "created": "2023-09-25T16:17:56.803309Z", - "modified": "2023-09-25T16:17:56.803309Z", + "id": "relationship--0b4a6753-47bf-4e8e-9776-bcfdcd251b8b", + "created": "2023-09-28T21:25:13.320998Z", + "modified": "2023-09-28T21:25:13.320998Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--a8cd34a2-a724-4b50-bd4e-fea85ecaf9c2", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--665d4984-25b7-4bd5-9dcb-e81c7ed7f1c9", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12423,13 +12423,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--3fe529d1-be36-48c2-8032-957e5f174f76", - "created": "2023-09-25T16:17:56.803613Z", - "modified": "2023-09-25T16:17:56.803613Z", + "id": "relationship--23fcb11f-ec59-4635-874e-364c42fda046", + "created": "2023-09-28T21:25:13.321113Z", + "modified": "2023-09-28T21:25:13.321113Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--23e51ece-142b-48c4-bc1a-8ec4abd0ab14", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--7ff061e5-cc6e-4d6a-9d0c-dbdf4c869c57", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12437,13 +12437,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--f6a1f068-b6bd-4bdf-a994-c3bc690b6c89", - "created": "2023-09-25T16:17:56.803738Z", - "modified": "2023-09-25T16:17:56.803738Z", + "id": "relationship--8fc322df-1c2f-4eb3-a9e2-a1e50d210c84", + "created": "2023-09-28T21:25:13.32129Z", + "modified": "2023-09-28T21:25:13.32129Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--95cc1720-8644-47ac-af79-de410621c75b", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--c2397671-33fb-4486-ad90-50653a169781", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12451,13 +12451,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--bf7b4117-746b-4044-b7d8-fce3173685e4", - "created": "2023-09-25T16:17:56.803859Z", - "modified": "2023-09-25T16:17:56.803859Z", + "id": "relationship--18f4e035-d1a1-405a-bd83-7a80d49f2405", + "created": "2023-09-28T21:25:13.321429Z", + "modified": "2023-09-28T21:25:13.321429Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--08e50234-c956-48ed-a89c-41d112253317", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--acab804f-184f-4602-9201-5e518bc72202", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12465,13 +12465,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--5196cc1b-1053-4ce1-811e-8972a8126468", - "created": "2023-09-25T16:17:56.804014Z", - "modified": "2023-09-25T16:17:56.804014Z", + "id": "relationship--d84c5543-5820-482d-a457-0cb9efe5cab2", + "created": "2023-09-28T21:25:13.321548Z", + "modified": "2023-09-28T21:25:13.321548Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--7db25360-8e4c-45dd-b172-112db2d3e80b", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--b8a49b7d-5a2e-44ff-9c18-6f6501231f15", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12479,13 +12479,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a149ec47-6dd0-4a74-9ead-7ff656caef30", - "created": "2023-09-25T16:17:56.804175Z", - "modified": "2023-09-25T16:17:56.804175Z", + "id": "relationship--b1cf88c2-e614-48be-87e2-18cb3e3355c0", + "created": "2023-09-28T21:25:13.321666Z", + "modified": "2023-09-28T21:25:13.321666Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--2f4b79f6-74d1-4951-8e01-4abc1ae514f6", - "target_ref": "attack-pattern--d97440d2-98f7-4509-8367-06e50ab91d7f", + "source_ref": "attack-pattern--f8fc8cda-8dbe-4f8a-8c62-e06b975582df", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12493,13 +12493,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--567db1ba-0c48-439f-b4a5-ef085bc24a84", - "created": "2023-09-25T16:17:56.804425Z", - "modified": "2023-09-25T16:17:56.804425Z", + "id": "relationship--f9d57280-0e6e-4305-866d-f1db779e1dd3", + "created": "2023-09-28T21:25:13.321782Z", + "modified": "2023-09-28T21:25:13.321782Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--7d3b5bb6-81d3-41d2-afd7-2c5c050d9f55", - "target_ref": "attack-pattern--861d74ed-4290-4445-af3d-12c4b43feb41", + "source_ref": "attack-pattern--4c06f94a-13d2-4b86-9505-38684b317bcb", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12507,13 +12507,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--196acf76-6269-4d4a-8142-db03d4cf0f8a", - "created": "2023-09-25T16:17:56.804645Z", - "modified": "2023-09-25T16:17:56.804645Z", + "id": "relationship--b96d53ef-d168-4993-983a-256bbcf3d618", + "created": "2023-09-28T21:25:13.321902Z", + "modified": "2023-09-28T21:25:13.321902Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--b61e1242-4b43-48b7-94e5-acbbfcdfdbd4", - "target_ref": "attack-pattern--861d74ed-4290-4445-af3d-12c4b43feb41", + "source_ref": "attack-pattern--f08df5bc-7cea-42b8-be2c-b07c0d62c982", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12521,13 +12521,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--557e7a98-860b-48b2-aba2-84305cf39692", - "created": "2023-09-25T16:17:56.804771Z", - "modified": "2023-09-25T16:17:56.804771Z", + "id": "relationship--73ce76e6-993e-49cd-ba9a-c34cb77e3e87", + "created": "2023-09-28T21:25:13.322019Z", + "modified": "2023-09-28T21:25:13.322019Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--c0b7ddc2-47d1-4d81-afe4-453df6e729ee", - "target_ref": "attack-pattern--861d74ed-4290-4445-af3d-12c4b43feb41", + "source_ref": "attack-pattern--37d7a656-a425-4ec8-8128-c39848350716", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12535,13 +12535,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--a2c22800-f15c-4bdc-958f-866118b21bf7", - "created": "2023-09-25T16:17:56.804947Z", - "modified": "2023-09-25T16:17:56.804947Z", + "id": "relationship--2a7181ec-b4e6-4cb4-8c5b-9eda82fb3951", + "created": "2023-09-28T21:25:13.322148Z", + "modified": "2023-09-28T21:25:13.322148Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--3a9b4f90-2f59-4200-91a6-1cfd29157a28", - "target_ref": "attack-pattern--861d74ed-4290-4445-af3d-12c4b43feb41", + "source_ref": "attack-pattern--07070de8-0d3f-41f6-9861-33c090bbeaf2", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12549,13 +12549,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--f31a3bf4-4a03-4846-b15d-a546d1b36a4c", - "created": "2023-09-25T16:17:56.805079Z", - "modified": "2023-09-25T16:17:56.805079Z", + "id": "relationship--221adc47-6d21-449a-8b5f-76fe164694b5", + "created": "2023-09-28T21:25:13.32232Z", + "modified": "2023-09-28T21:25:13.32232Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--9f7d3455-40f1-4f79-a1c7-1f5bb597b494", - "target_ref": "attack-pattern--861d74ed-4290-4445-af3d-12c4b43feb41", + "source_ref": "attack-pattern--719b15f1-fb7d-49f4-97ca-7ba5ab09da6d", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12563,13 +12563,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--677bcfc0-9139-4a02-a51a-d296f55d523b", - "created": "2023-09-25T16:17:56.805199Z", - "modified": "2023-09-25T16:17:56.805199Z", + "id": "relationship--daa30fdf-bce7-4950-a4a1-ff73ed6e9f21", + "created": "2023-09-28T21:25:13.322439Z", + "modified": "2023-09-28T21:25:13.322439Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--a23bc5de-9afb-4928-bcb6-63be576dfb56", - "target_ref": "attack-pattern--861d74ed-4290-4445-af3d-12c4b43feb41", + "source_ref": "attack-pattern--54edae40-39dc-45c4-a473-cef151d299ff", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12577,13 +12577,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--13808a53-7bc9-4815-9631-d202c1bfdb85", - "created": "2023-09-25T16:17:56.805322Z", - "modified": "2023-09-25T16:17:56.805322Z", + "id": "relationship--3e433283-4102-42b5-8481-dc6be7a6345a", + "created": "2023-09-28T21:25:13.322558Z", + "modified": "2023-09-28T21:25:13.322558Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--735ad880-563f-43f7-8596-7069eeaa76fb", - "target_ref": "attack-pattern--0f6e5675-c9b0-4f22-b2f2-6d12a301c113", + "source_ref": "attack-pattern--acc70582-c43a-4ed1-ab78-19e56ad4d4ed", + "target_ref": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12591,13 +12591,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--ecb99980-54a8-4fb1-8ae4-f22bd4fa456f", - "created": "2023-09-25T16:17:56.805469Z", - "modified": "2023-09-25T16:17:56.805469Z", + "id": "relationship--e6c21d05-0d5e-4189-a5e1-ef63f0503607", + "created": "2023-09-28T21:25:13.322676Z", + "modified": "2023-09-28T21:25:13.322676Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--22a3c794-41ac-4296-9e0a-d866a2ba91bc", - "target_ref": "attack-pattern--0f6e5675-c9b0-4f22-b2f2-6d12a301c113", + "source_ref": "attack-pattern--1ba99e5a-e7f0-4075-a9bf-9da7bd87f15d", + "target_ref": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12605,13 +12605,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--2e9f6e2c-6764-42a7-aa03-8a818c6c1544", - "created": "2023-09-25T16:17:56.805735Z", - "modified": "2023-09-25T16:17:56.805735Z", + "id": "relationship--00079bb3-57d6-4e10-a333-1390d67a93d6", + "created": "2023-09-28T21:25:13.322794Z", + "modified": "2023-09-28T21:25:13.322794Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--72539ca4-1fad-49fb-be40-0e7dd128b65b", - "target_ref": "attack-pattern--0f6e5675-c9b0-4f22-b2f2-6d12a301c113", + "source_ref": "attack-pattern--e1afdaea-cb95-4cdf-95a2-0bf8518b872d", + "target_ref": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12619,13 +12619,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--c1fb34c2-f014-412c-a76d-dca8ee62b4c6", - "created": "2023-09-25T16:17:56.805937Z", - "modified": "2023-09-25T16:17:56.805937Z", + "id": "relationship--b311908f-8938-4cc2-bd98-881878ac17bb", + "created": "2023-09-28T21:25:13.322912Z", + "modified": "2023-09-28T21:25:13.322912Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--b12c0b9c-8791-4c05-8026-07eb66aeaaaa", - "target_ref": "attack-pattern--31c33890-0c7e-4060-ae8a-b154af12740d", + "source_ref": "attack-pattern--20e074c4-9010-41b8-b097-65091268531c", + "target_ref": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12633,13 +12633,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--758d793b-c6ba-417c-900a-86dc1e1a7de4", - "created": "2023-09-25T16:17:56.806194Z", - "modified": "2023-09-25T16:17:56.806194Z", + "id": "relationship--7a66ba85-3cb5-45e8-b37a-437ccfa77dfb", + "created": "2023-09-28T21:25:13.32303Z", + "modified": "2023-09-28T21:25:13.32303Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--8c7335f6-03b2-4f9f-bd2e-f6edb94826a8", - "target_ref": "attack-pattern--31c33890-0c7e-4060-ae8a-b154af12740d", + "source_ref": "attack-pattern--b602bd0a-6b29-4f87-8093-55c879f588ec", + "target_ref": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12647,13 +12647,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--7eb9671f-c237-494c-8590-5f0bce60bb10", - "created": "2023-09-25T16:17:56.806489Z", - "modified": "2023-09-25T16:17:56.806489Z", + "id": "relationship--bd80c0e0-5a7c-4b1a-8bb1-ecc0a44609a6", + "created": "2023-09-28T21:25:13.323146Z", + "modified": "2023-09-28T21:25:13.323146Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--b4ec53d3-8050-41ac-a3eb-e75b3b1195b7", - "target_ref": "attack-pattern--31c33890-0c7e-4060-ae8a-b154af12740d", + "source_ref": "attack-pattern--4ecd424d-11a8-4471-9ccc-a870a337284d", + "target_ref": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12661,13 +12661,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--427b08c7-5575-461c-bb1a-a31feff1a4b7", - "created": "2023-09-25T16:17:56.806707Z", - "modified": "2023-09-25T16:17:56.806707Z", + "id": "relationship--2cf3a76e-c3af-41ef-b2fa-a76d38b5e610", + "created": "2023-09-28T21:25:13.323285Z", + "modified": "2023-09-28T21:25:13.323285Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--3fc4c436-9d09-4f3e-9ade-afe37a30c362", - "target_ref": "attack-pattern--cb9fde57-634c-4660-9e27-e28bd371e650", + "source_ref": "attack-pattern--9c01fab2-42dc-423b-96fe-a478a29e5b81", + "target_ref": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12675,13 +12675,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--75c238ab-1263-439c-88ea-9b88bcca70b6", - "created": "2023-09-25T16:17:56.807008Z", - "modified": "2023-09-25T16:17:56.807008Z", + "id": "relationship--39bfb524-e80f-42a8-ac7a-80dfb3d89686", + "created": "2023-09-28T21:25:13.323403Z", + "modified": "2023-09-28T21:25:13.323403Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--634c7a17-a7b5-40bb-90cf-6ad6e8f92976", - "target_ref": "attack-pattern--cb9fde57-634c-4660-9e27-e28bd371e650", + "source_ref": "attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40", + "target_ref": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12689,13 +12689,13 @@ { "type": "relationship", "spec_version": "2.1", - "id": "relationship--30780dd4-3198-43ee-98d7-0e701daefafb", - "created": "2023-09-25T16:17:56.807233Z", - "modified": "2023-09-25T16:17:56.807233Z", + "id": "relationship--2638243c-f883-4310-a286-5cc04fd50672", + "created": "2023-09-28T21:25:13.32352Z", + "modified": "2023-09-28T21:25:13.32352Z", "relationship_type": "subtechnique-of", "description": "", - "source_ref": "attack-pattern--f70cea06-5013-49ec-b6c5-7f905dda59f7", - "target_ref": "attack-pattern--cb9fde57-634c-4660-9e27-e28bd371e650", + "source_ref": "attack-pattern--ad0ef979-9552-4906-8006-077db6789103", + "target_ref": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", "object_marking_refs": [ "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" ] @@ -12704,8 +12704,8 @@ "type": "identity", "spec_version": "2.1", "id": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.52336Z", - "modified": "2023-09-25T16:17:56.52336Z", + "created": "2023-09-28T21:25:13.178304Z", + "modified": "2023-09-28T21:25:13.178304Z", "name": "DISARM Foundation", "description": "DISARM is a framework designed for describing and understanding disinformation incidents.", "identity_class": "organization" @@ -12715,7 +12715,7 @@ "spec_version": "2.1", "id": "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.52498Z", + "created": "2023-09-28T21:25:13.178561Z", "definition_type": "statement", "name": "DISARM Foundation", "definition": { @@ -12726,8 +12726,8 @@ "type": "x-mitre-matrix", "spec_version": "2.1", "id": "x-mitre-matrix--0e0c1597-4b7d-43f1-b768-1c4a253c44df", - "created": "2023-09-25T16:17:56.814047Z", - "modified": "2023-09-25T16:17:56.814047Z", + "created": "2023-09-28T21:25:13.324673Z", + "modified": "2023-09-28T21:25:13.324673Z", "name": "DISARM Framework", "description": "DISARM is a framework designed for describing and understanding disinformation incidents.", "tactic_refs": [ @@ -12742,7 +12742,7 @@ "x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9", "x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4", "x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9", - "x-mitre-tactic--963a9c59-5e4d-433b-9fbe-485d3ceb0ce0", + "x-mitre-tactic--9e114812-fcc3-4b44-b259-18a32d7babbc", "x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db", "x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b", "x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9", diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99.json index c444687..803f658 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ab87e5c2-32ad-41df-af71-14f4483f792a", + "id": "bundle--96866e90-4a43-44b5-ad9c-948c09670963", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.646696Z", - "modified": "2023-09-25T16:17:56.646696Z", + "created": "2023-09-28T21:25:13.256885Z", + "modified": "2023-09-28T21:25:13.256885Z", "name": "Video Livestream", "description": "A video livestream refers to an online video broadcast capability that allows for real-time communication to closed or open networks.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0102376a-e896-4191-b3fb-e58188301822.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0102376a-e896-4191-b3fb-e58188301822.json index d3deeb1..6e1ada4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0102376a-e896-4191-b3fb-e58188301822.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0102376a-e896-4191-b3fb-e58188301822.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6cda89ac-9536-4420-94c0-ea3b9bfcb766", + "id": "bundle--7e0b8688-d125-484c-a4f9-13137341b898", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--0102376a-e896-4191-b3fb-e58188301822", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57895Z", - "modified": "2023-09-25T16:17:56.57895Z", + "created": "2023-09-28T21:25:13.212125Z", + "modified": "2023-09-28T21:25:13.212125Z", "name": "Organise Events", "description": "Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d.json index edf5f38..71220d6 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--bcdbc88c-d981-4b2e-b70e-61fb74e64c50", + "id": "bundle--6bdc0034-a9ad-43e7-91b0-c54757577c9e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.664206Z", - "modified": "2023-09-25T16:17:56.664206Z", + "created": "2023-09-28T21:25:13.266843Z", + "modified": "2023-09-28T21:25:13.266843Z", "name": "Deliver Ads", "description": "Delivering content via any form of paid media or advertising.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe.json index 303f8f0..42ba0af 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e6ea6a34-499b-4e95-a58f-f5bcf2730aa1", + "id": "bundle--482fef6d-55ff-4da9-a49e-ceb149aae6ea", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.675524Z", - "modified": "2023-09-25T16:17:56.675524Z", + "created": "2023-09-28T21:25:13.273066Z", + "modified": "2023-09-28T21:25:13.273066Z", "name": "Post across Platform", "description": "An influence operation may post content across platforms to spread narratives and content to new communities within the target audiences or to new target audiences. Posting across platforms can also remove opposition and context, helping the narrative spread with less opposition on the cross-posted platform.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733.json index cde77d9..64837c0 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e85d853b-c1df-42eb-bdef-64412710540c", + "id": "bundle--9325ea08-ba9a-444a-ab34-842dcc82d190", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.555276Z", - "modified": "2023-09-25T16:17:56.555276Z", + "created": "2023-09-28T21:25:13.201279Z", + "modified": "2023-09-28T21:25:13.201279Z", "name": "Reframe Context", "description": "Reframing context refers to removing an event from its surrounding context to distort its intended meaning. Rather than deny that an event occurred, reframing context frames an event in a manner that may lead the target audience to draw a different conclusion about its intentions.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5.json index 01cdc75..5a6d3c3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6a71f847-648c-4764-92f2-5105eefba46f", + "id": "bundle--2942a238-1b75-45e3-9022-ad5e15b3dd6c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.584821Z", - "modified": "2023-09-25T16:17:56.584821Z", + "created": "2023-09-28T21:25:13.214551Z", + "modified": "2023-09-28T21:25:13.214551Z", "name": "Segment Audiences", "description": "Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403.json index 22909be..aca903b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--995f0482-f315-44ff-a701-5e1d764887fb", + "id": "bundle--d4a83f50-42d8-434f-95a7-f36433f65d3a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.648664Z", - "modified": "2023-09-25T16:17:56.648664Z", + "created": "2023-09-28T21:25:13.257984Z", + "modified": "2023-09-28T21:25:13.257984Z", "name": "Private/Closed Social Networks", "description": "Social networks that are not open to people outside of family, friends, neighbours, or co-workers. Non-work-related examples include Couple, FamilyWall, 23snaps, and Nextdoor. Some of the larger social network platforms enable closed communities: examples are Instagram Close Friends and Twitter (X) Circle. Work-related examples of private social networks include LinkedIn, Facebook Workplace, and enterprise communication platforms such as Slack or Microsoft Teams.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--07070de8-0d3f-41f6-9861-33c090bbeaf2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--07070de8-0d3f-41f6-9861-33c090bbeaf2.json new file mode 100644 index 0000000..5ee38fb --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--07070de8-0d3f-41f6-9861-33c090bbeaf2.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--c3c5b525-2432-4594-a38a-acd5d2e3b52e", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--07070de8-0d3f-41f6-9861-33c090bbeaf2", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.295946Z", + "modified": "2023-09-28T21:25:13.295946Z", + "name": "Sell Items under False Pretences", + "description": "Offer products for sale under false pretences. Campaigns may hijack or create causes built on disinformation to sell promotional merchandise. Or charlatans may amplify victims\u2019 unfounded fears to sell them items of questionable utility such as supplements or survival gear. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0137.004.md", + "external_id": "T0137.004" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051.json index eab2604..3d4d789 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--36d33f3d-7581-4699-96d5-7aab68125405", + "id": "bundle--d6e00044-58a7-4ddb-bf88-30f8653b5f09", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.689689Z", - "modified": "2023-09-25T16:17:56.689689Z", + "created": "2023-09-28T21:25:13.279115Z", + "modified": "2023-09-28T21:25:13.279115Z", "name": "Conceal Operational Activity", "description": "Conceal the campaign's operational activity to avoid takedown and attribution.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69.json index e8260d3..ccc96e9 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--de6a7958-0c59-4eae-a7db-26b3f704457a", + "id": "bundle--c1247e3b-818a-4a71-b381-cbedbde5efe1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57684Z", - "modified": "2023-09-25T16:17:56.57684Z", + "created": "2023-09-28T21:25:13.211835Z", + "modified": "2023-09-28T21:25:13.211835Z", "name": "Conduct Keyword Squatting", "description": "Keyword squatting refers to the creation of online content, such as websites, articles, or social media accounts, around a specific search engine-optimized term to overwhelm the search results of that term. An influence may keyword squat to increase content exposure to target audience members who query the exploited term in a search engine and manipulate the narrative around the term.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7.json index 4d187b7..3450342 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--9c63027f-3307-413e-8dde-f3b20f260f46", + "id": "bundle--869a9a71-029c-4338-8243-0d7ee648acaa", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.633319Z", - "modified": "2023-09-25T16:17:56.633319Z", + "created": "2023-09-28T21:25:13.247708Z", + "modified": "2023-09-28T21:25:13.247708Z", "name": "Leverage Content Farms", "description": "Using the services of large-scale content providers for creating and amplifying campaign artefacts at scale.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c.json index 5965f26..2cd3442 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--996d0e8f-1580-403b-b8a8-ae54cfaf9030", + "id": "bundle--6fe400a2-cb0f-4888-9675-1a4c8851c2fd", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.549871Z", - "modified": "2023-09-25T16:17:56.549871Z", + "created": "2023-09-28T21:25:13.196968Z", + "modified": "2023-09-28T21:25:13.196968Z", "name": "Generate Information Pollution", "description": "Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. \"Nothing is true, but everything is possible.\" Akin to astroturfing campaign.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b.json index 1cf6429..581c415 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--74f81e91-b0b4-4914-aea7-66a2d9d87597", + "id": "bundle--806c52c7-049a-4309-9cc4-54e8ef929b0c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.68687Z", - "modified": "2023-09-25T16:17:56.68687Z", + "created": "2023-09-28T21:25:13.27669Z", + "modified": "2023-09-28T21:25:13.27669Z", "name": "Encourage Attendance at Events", "description": "Operation encourages attendance at existing real world event.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc.json index c4f5f8b..4c76704 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--70d072bd-7d72-4ac1-9f1c-9ca8fb648753", + "id": "bundle--6ac57769-ec69-4864-9538-3087bbba30c8", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.56869Z", - "modified": "2023-09-25T16:17:56.56869Z", + "created": "2023-09-28T21:25:13.21044Z", + "modified": "2023-09-28T21:25:13.21044Z", "name": "Flooding the Information Space", "description": "Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944.json index 46b844d..b20de2e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--59e63da9-73f0-44ac-9111-f773bc4df112", + "id": "bundle--df5f361a-9a5c-46e4-a3b9-3c67065697c5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.674845Z", - "modified": "2023-09-25T16:17:56.674845Z", + "created": "2023-09-28T21:25:13.272851Z", + "modified": "2023-09-28T21:25:13.272851Z", "name": "Post across Groups", "description": "An influence operation may post content across groups to spread narratives and content to new communities within the target audiences or to new target audiences.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d8138a8-8690-491d-97b5-a330af054b39.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d8138a8-8690-491d-97b5-a330af054b39.json index 1942e75..0b29a7a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d8138a8-8690-491d-97b5-a330af054b39.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d8138a8-8690-491d-97b5-a330af054b39.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--903a86a1-9de1-457f-8945-90e0c8bfc2e1", + "id": "bundle--3a92da8a-6f8d-4cee-a3f1-c71f43c3cd5a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--0d8138a8-8690-491d-97b5-a330af054b39", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.563226Z", - "modified": "2023-09-25T16:17:56.563226Z", + "created": "2023-09-28T21:25:13.206512Z", + "modified": "2023-09-28T21:25:13.206512Z", "name": "Use Fake Experts", "description": "Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give \"credility\" to misinformation. Take advantage of credential bias", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9.json index 4c8fbcc..9ae3fc7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--d487a4d3-63a0-4c72-8a39-e394d28a0fcb", + "id": "bundle--d03b0d2a-e3bd-4077-8b6a-e0a3b8c23a76", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.646329Z", - "modified": "2023-09-25T16:17:56.646329Z", + "created": "2023-09-28T21:25:13.256347Z", + "modified": "2023-09-28T21:25:13.256347Z", "name": "Livestream", "description": "A livestream refers to an online broadcast capability that allows for real-time communication to closed or open networks.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40.json new file mode 100644 index 0000000..efbfb53 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--a07c8ff9-d999-4940-9987-1481c4674073", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.299559Z", + "modified": "2023-09-28T21:25:13.299559Z", + "name": "Intimidate", + "description": "Coerce, bully, or frighten the target. An influence operation may use intimidation to compel the target to act against their will. Or the goal may be to frighten or even terrify the target into silence or submission. In some cases, the goal is simply to make the victim suffer. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0140.002.md", + "external_id": "T0140.002" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--11352e9a-a52b-4ade-ad4f-ec64a15fa1d5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--11352e9a-a52b-4ade-ad4f-ec64a15fa1d5.json index b52bb3a..0557929 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--11352e9a-a52b-4ade-ad4f-ec64a15fa1d5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--11352e9a-a52b-4ade-ad4f-ec64a15fa1d5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--fca4ebcc-a1a3-493f-9780-de3843f815bc", + "id": "bundle--92bb24f3-0189-4c1b-8650-52ee3c63e2fa", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--11352e9a-a52b-4ade-ad4f-ec64a15fa1d5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.640838Z", - "modified": "2023-09-25T16:17:56.640838Z", + "created": "2023-09-28T21:25:13.254922Z", + "modified": "2023-09-28T21:25:13.254922Z", "name": "Create Localised Content", "description": "Localised content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localised content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localised content may help an operation increase legitimacy, avoid detection, and complicate external attribution.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb.json index 3a076f8..c0bfa74 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0e81137e-8125-468e-a3e2-8dd6433586c9", + "id": "bundle--815c8801-b5bf-4ce1-9cc8-8502206826eb", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.567162Z", - "modified": "2023-09-25T16:17:56.567162Z", + "created": "2023-09-28T21:25:13.2094Z", + "modified": "2023-09-28T21:25:13.2094Z", "name": "Threaten to Dox", "description": "Doxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14bec5aa-0823-4dde-9223-ec49a1cea65e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14bec5aa-0823-4dde-9223-ec49a1cea65e.json index 7f4bd00..a5b6d2c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14bec5aa-0823-4dde-9223-ec49a1cea65e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14bec5aa-0823-4dde-9223-ec49a1cea65e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--d32f9a59-6055-46ed-b265-609b91baed95", + "id": "bundle--16d67122-d992-4258-9654-4e144f7db6a3", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--14bec5aa-0823-4dde-9223-ec49a1cea65e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.611628Z", - "modified": "2023-09-25T16:17:56.611628Z", + "created": "2023-09-28T21:25:13.227448Z", + "modified": "2023-09-28T21:25:13.227448Z", "name": "Develop New Narratives", "description": "Actors may develop new narratives to further strategic or tactical goals, especially when existing narratives adequately align with the campaign goals. New narratives provide more control in terms of crafting the message to achieve specific goals. However, new narratives may require more effort to disseminate than adapting or adopting existing narratives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9.json index 686648d..cd44028 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a288e8f7-a0a9-45d5-84a9-b3ad51b13116", + "id": "bundle--ce822db7-2c37-44b2-bb15-40bfcf69c926", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.683246Z", - "modified": "2023-09-25T16:17:56.683246Z", + "created": "2023-09-28T21:25:13.274372Z", + "modified": "2023-09-28T21:25:13.274372Z", "name": "Control Information Environment through Offensive Cyberspace Operations", "description": "Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritise operation messaging or block opposition messaging.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03.json index 8ee8640..15cb568 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--25c47e08-838b-4399-830b-a62f9b0ca43c", + "id": "bundle--f217bf9f-cbe8-40f1-b842-2c589fa35221", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.615991Z", - "modified": "2023-09-25T16:17:56.615991Z", + "created": "2023-09-28T21:25:13.230922Z", + "modified": "2023-09-28T21:25:13.230922Z", "name": "Develop AI-Generated Text", "description": "AI-generated texts refers to synthetic text composed by computers using text-generating AI technology. Autonomous generation refers to content created by a bot without human input, also known as bot-created content generation. Autonomous generation represents the next step in automation after language generation and may lead to automated journalism. An influence operation may use read fakes or autonomous generation to quickly develop and distribute content to the target audience.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1997947a-7e08-4ea9-802c-85391d561266.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1997947a-7e08-4ea9-802c-85391d561266.json index 39691d6..56a961f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1997947a-7e08-4ea9-802c-85391d561266.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1997947a-7e08-4ea9-802c-85391d561266.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c417b21d-cb16-49d7-8789-09121c474c55", + "id": "bundle--80ec494f-bad1-4f84-85b0-cf9cfde169f7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1997947a-7e08-4ea9-802c-85391d561266", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.667424Z", - "modified": "2023-09-25T16:17:56.667424Z", + "created": "2023-09-28T21:25:13.268338Z", + "modified": "2023-09-28T21:25:13.268338Z", "name": "Post Content", "description": "Delivering content by posting via owned media (assets that the operator controls).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1a85cb33-f7cc-49d9-a23f-4b7ce82a2146.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1a85cb33-f7cc-49d9-a23f-4b7ce82a2146.json index 4d2c5b7..145cd90 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1a85cb33-f7cc-49d9-a23f-4b7ce82a2146.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1a85cb33-f7cc-49d9-a23f-4b7ce82a2146.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--2823d85e-f8de-4b66-87e7-3f805383f78d", + "id": "bundle--1fe5fb34-dbda-44e4-acac-d0e5f45ebf40", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1a85cb33-f7cc-49d9-a23f-4b7ce82a2146", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.593982Z", - "modified": "2023-09-25T16:17:56.593982Z", + "created": "2023-09-28T21:25:13.22009Z", + "modified": "2023-09-28T21:25:13.22009Z", "name": "Distort", "description": "Twist the narrative. Take information, or artefacts like images, and change the framing around them.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c.json index a7bf660..8362d10 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--27f7ef9e-63f8-4ac1-a16c-dd21aa0cd228", + "id": "bundle--305e5346-1792-4b24-baa9-68ccbcf07386", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.70866Z", - "modified": "2023-09-25T16:17:56.70866Z", + "created": "2023-09-28T21:25:13.289879Z", + "modified": "2023-09-28T21:25:13.289879Z", "name": "Action/Attitude", "description": "Measure current system state with respect to the effectiveness of influencing action/attitude.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1ba99e5a-e7f0-4075-a9bf-9da7bd87f15d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1ba99e5a-e7f0-4075-a9bf-9da7bd87f15d.json new file mode 100644 index 0000000..dbbc599 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1ba99e5a-e7f0-4075-a9bf-9da7bd87f15d.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--947a1974-2a16-4785-bf46-059fa05ebf72", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--1ba99e5a-e7f0-4075-a9bf-9da7bd87f15d", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.297331Z", + "modified": "2023-09-28T21:25:13.297331Z", + "name": "Provoke", + "description": "Instigate, incite, or arouse a target to act. Social media manipulators exploit moral outrage to propel targets to spread hate, take to the streets to protest, or engage in acts of violence. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0138.002.md", + "external_id": "T0138.002" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635.json index 83d8974..5533c31 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f1b39e2e-740b-4232-a0c0-e795a35d5aed", + "id": "bundle--6110421d-886d-4664-87e0-fe3072ad1829", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.569998Z", - "modified": "2023-09-25T16:17:56.569998Z", + "created": "2023-09-28T21:25:13.210665Z", + "modified": "2023-09-28T21:25:13.210665Z", "name": "Trolls Amplify and Manipulate", "description": "Use trolls to amplify narratives and/or manipulate narratives. Fake profiles/sockpuppets operating to support individuals/narratives from the entire political spectrum (left/right binary). Operating with increased emphasis on promoting local content and promoting real Twitter users generating their own, often divisive political content, as it's easier to amplify existing content than create new/original content. Trolls operate where ever there's a socially divisive issue (issues that can/are be politicized).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d48fe65-5062-4262-b9e2-890aca1da132.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d48fe65-5062-4262-b9e2-890aca1da132.json index d4918aa..8dab523 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d48fe65-5062-4262-b9e2-890aca1da132.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d48fe65-5062-4262-b9e2-890aca1da132.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--901d77bc-86b4-4df5-915f-4d8bb3715126", + "id": "bundle--3fcf4a8d-335e-4e1f-9906-9bde08ced2fe", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1d48fe65-5062-4262-b9e2-890aca1da132", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.601045Z", - "modified": "2023-09-25T16:17:56.601045Z", + "created": "2023-09-28T21:25:13.221608Z", + "modified": "2023-09-28T21:25:13.221608Z", "name": "Divide", "description": "Create conflict between subgroups, to widen divisions in a community", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8.json index b37a24b..0a0453b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ba47c2f0-8810-49fd-bf31-9d671d07c417", + "id": "bundle--885db17d-b390-4455-9431-59a8034e8fc2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651719Z", - "modified": "2023-09-25T16:17:56.651719Z", + "created": "2023-09-28T21:25:13.260018Z", + "modified": "2023-09-28T21:25:13.260018Z", "name": "Video Sharing", "description": "Examples include Youtube, TikTok, ShareChat, Rumble, etc", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d917530-027d-4f82-b380-404c320dc783.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d917530-027d-4f82-b380-404c320dc783.json index 94fb68d..903f12f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d917530-027d-4f82-b380-404c320dc783.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1d917530-027d-4f82-b380-404c320dc783.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ae49aa92-8ba4-4522-aeb2-9e06598220aa", + "id": "bundle--f8a98b0c-d415-42ed-bd09-d92bbede864d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1d917530-027d-4f82-b380-404c320dc783", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.585969Z", - "modified": "2023-09-25T16:17:56.585969Z", + "created": "2023-09-28T21:25:13.216032Z", + "modified": "2023-09-28T21:25:13.216032Z", "name": "Economic Segmentation", "description": "An influence operation may target populations based on their income bracket, wealth, or other financial or economic division.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28.json new file mode 100644 index 0000000..289d9b2 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--92369578-5d8a-4a5b-a4c4-0246c467b8c9", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.291932Z", + "modified": "2023-09-28T21:25:13.291932Z", + "name": "Cultivate Support", + "description": "Grow or maintain the base of support for the actor, ally, or action. This includes hard core recruitment, managing alliances, and generating or maintaining sympathy among a wider audience, including reputation management and public relations. Sub-techniques assume support for actor (self) unless otherwise specified. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.md", + "external_id": "T0136" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4.json index 902f25e..5ce1a3d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--16f0f600-500b-4a91-a8ea-c419c4a7bb48", + "id": "bundle--b902ec75-3655-428a-b579-e421b5f22f6e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687102Z", - "modified": "2023-09-25T16:17:56.687102Z", + "created": "2023-09-28T21:25:13.276828Z", + "modified": "2023-09-28T21:25:13.276828Z", "name": "Call to Action to Attend", "description": "Call to action to attend an event", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae.json index d7b7b7b..0cc2bef 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--57260b3f-1b97-4db9-a84f-1d96d4232e09", + "id": "bundle--4f658070-6407-496d-9da4-52ffdff60192", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688597Z", - "modified": "2023-09-25T16:17:56.688597Z", + "created": "2023-09-28T21:25:13.27818Z", + "modified": "2023-09-28T21:25:13.27818Z", "name": "Conceal Network Identity", "description": "Concealing network identity aims to hide the existence an influence operation\u2019s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--20e074c4-9010-41b8-b097-65091268531c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--20e074c4-9010-41b8-b097-65091268531c.json new file mode 100644 index 0000000..a4dce1d --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--20e074c4-9010-41b8-b097-65091268531c.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--3f5f338b-96a6-4197-b8a6-060498c7edb6", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--20e074c4-9010-41b8-b097-65091268531c", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.298168Z", + "modified": "2023-09-28T21:25:13.298168Z", + "name": "Discourage", + "description": "To make a target disinclined or reluctant to act. Manipulators use disinformation to cause targets to question the utility, legality, or morality of taking an action. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0139.001.md", + "external_id": "T0139.001" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794.json index d45acf4..6522085 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--420c71d5-845b-47eb-bf0b-6bcf4df6d48f", + "id": "bundle--47a925ff-1268-4aa7-b09f-adb1dd5ac364", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.546873Z", - "modified": "2023-09-25T16:17:56.546873Z", + "created": "2023-09-28T21:25:13.195168Z", + "modified": "2023-09-28T21:25:13.195168Z", "name": "Prepare Fundraising Campaigns", "description": "Fundraising campaigns refer to an influence operation\u2019s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9.json index aa6dacf..cf2b381 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e9142697-6949-498a-b2fa-2747fcc12268", + "id": "bundle--bd956c8e-2b1e-4b2d-9d3b-7a72a2bf0b9f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.561233Z", - "modified": "2023-09-25T16:17:56.561233Z", + "created": "2023-09-28T21:25:13.204367Z", + "modified": "2023-09-28T21:25:13.204367Z", "name": "Chat Apps", "description": "Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--245d117b-2700-462e-97d4-be9b4b3745c4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--245d117b-2700-462e-97d4-be9b4b3745c4.json index 840c284..1ffee57 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--245d117b-2700-462e-97d4-be9b4b3745c4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--245d117b-2700-462e-97d4-be9b4b3745c4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--29d77994-26c8-4911-935e-d7c19694c427", + "id": "bundle--6932f059-0b1f-4ac7-9479-aa083f500e32", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--245d117b-2700-462e-97d4-be9b4b3745c4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.663835Z", - "modified": "2023-09-25T16:17:56.663835Z", + "created": "2023-09-28T21:25:13.266341Z", + "modified": "2023-09-28T21:25:13.266341Z", "name": "Employ Commercial Analytic Firms", "description": "Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5.json index a74ff29..9dbfa9c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e3ebbeba-6868-4c0f-9f18-e4f2325027cd", + "id": "bundle--b8903b69-42ef-4c7f-8d29-e0664ebf3893", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.662034Z", - "modified": "2023-09-25T16:17:56.662034Z", + "created": "2023-09-28T21:25:13.265297Z", + "modified": "2023-09-28T21:25:13.265297Z", "name": "Radio", "description": "Radio", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283333f5-e161-4195-9070-5a7c22505adf.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283333f5-e161-4195-9070-5a7c22505adf.json index 889190f..1d979bd 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283333f5-e161-4195-9070-5a7c22505adf.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283333f5-e161-4195-9070-5a7c22505adf.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f3339f2a-fe80-445b-91be-a3e7b9fde7a2", + "id": "bundle--793cc6ec-dc65-4bf2-a3a5-425e83da0a68", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--283333f5-e161-4195-9070-5a7c22505adf", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.637907Z", - "modified": "2023-09-25T16:17:56.637907Z", + "created": "2023-09-28T21:25:13.252865Z", + "modified": "2023-09-28T21:25:13.252865Z", "name": "Co-Opt Trusted Sources", "description": "An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: - National or local new outlets - Research or academic publications - Online blogs or websites", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1.json index 83941d6..9c0e1d8 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--1a0a7cea-9346-4b64-858f-921cf5a91016", + "id": "bundle--6217b633-fcd8-470f-bf91-16f51d9b02db", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.623306Z", - "modified": "2023-09-25T16:17:56.623306Z", + "created": "2023-09-28T21:25:13.24035Z", + "modified": "2023-09-28T21:25:13.24035Z", "name": "Create Anonymous Accounts", "description": "Anonymous accounts or anonymous users refer to users that access network resources without providing a username or password. An influence operation may use anonymous accounts to spread content without direct attribution to the operation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9.json index e37bcba..1f23167 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--1a57a61b-44d9-4f1c-9aeb-c83510a1b4e4", + "id": "bundle--d2c4d87c-409f-4f32-9a31-9e337e970741", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.675855Z", - "modified": "2023-09-25T16:17:56.675855Z", + "created": "2023-09-28T21:25:13.273283Z", + "modified": "2023-09-28T21:25:13.273283Z", "name": "Post across Disciplines", "description": "Post Across Disciplines", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2b17f29f-f65f-4398-9e35-1c1d8836c20d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2b17f29f-f65f-4398-9e35-1c1d8836c20d.json new file mode 100644 index 0000000..e80236e --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2b17f29f-f65f-4398-9e35-1c1d8836c20d.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--15fe208a-ffe0-4c8a-9641-7e3d50bffe88", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--2b17f29f-f65f-4398-9e35-1c1d8836c20d", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.291627Z", + "modified": "2023-09-28T21:25:13.291627Z", + "name": "Polarise", + "description": "To cause a target audience to divide into two completely opposing groups. This is a special case of subversion. To divide and conquer is an age-old approach to subverting and overcoming an enemy.", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0135.004.md", + "external_id": "T0135.004" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e.json index 0a919ee..34c4d89 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0ec8031a-afdc-4610-8b51-b2e33efb1dba", + "id": "bundle--707137b3-6225-472e-a07c-4a92d0a22b6c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687957Z", - "modified": "2023-09-25T16:17:56.687957Z", + "created": "2023-09-28T21:25:13.277436Z", + "modified": "2023-09-28T21:25:13.277436Z", "name": "Encourage Physical Violence", "description": "An influence operation may Encourage others to engage in Physical Violence to achieve campaign goals.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1.json index fb42c05..71af7ee 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c5f8db5e-d6c3-4a1c-8069-c257d2bf994b", + "id": "bundle--44f9daac-a4fc-4e7e-9682-03efa042ab82", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.602362Z", - "modified": "2023-09-25T16:17:56.602362Z", + "created": "2023-09-28T21:25:13.222968Z", + "modified": "2023-09-28T21:25:13.222968Z", "name": "Evaluate Media Surveys", "description": "An influence operation may evaluate its own or third-party media surveys to determine what type of content appeals to its target audience. Media surveys may provide insight into an audience\u2019s political views, social class, general interests, or other indicators used to tailor operation messaging to its target audience.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9.json index cdb31d9..1ae133e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--1e740e7e-7716-4bba-a102-e30d9cd2e144", + "id": "bundle--c7ea2d2f-edf4-491f-9d18-8a26b73d30ff", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.562266Z", - "modified": "2023-09-25T16:17:56.562266Z", + "created": "2023-09-28T21:25:13.205471Z", + "modified": "2023-09-28T21:25:13.205471Z", "name": "Use Unencrypted Chats Apps", "description": "Examples include SMS, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321.json index bddeeff..f62111e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--70cae426-7cb8-46d0-b192-66a18437220b", + "id": "bundle--386d5b67-da78-41e2-a782-36e8d364c8bd", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.635795Z", - "modified": "2023-09-25T16:17:56.635795Z", + "created": "2023-09-28T21:25:13.250986Z", + "modified": "2023-09-28T21:25:13.250986Z", "name": "Leverage Existing Inauthentic News Sites", "description": "Leverage Existing Inauthentic News Sites", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e.json index ea88131..f1a92a2 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--49274f7c-7e51-4a10-9f41-224176d246b6", + "id": "bundle--597df03d-5951-42b5-a04b-a2aab5bc9ecf", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.656146Z", - "modified": "2023-09-25T16:17:56.656146Z", + "created": "2023-09-28T21:25:13.263697Z", + "modified": "2023-09-28T21:25:13.263697Z", "name": "Traditional Media", "description": "Examples include TV, Newspaper, Radio, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--318f2a34-07b6-4c4b-9bb0-58f5bca681fc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--318f2a34-07b6-4c4b-9bb0-58f5bca681fc.json index dcff9f3..f46bf67 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--318f2a34-07b6-4c4b-9bb0-58f5bca681fc.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--318f2a34-07b6-4c4b-9bb0-58f5bca681fc.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--d88a72dc-ab3b-427c-84fd-5f854abd8a62", + "id": "bundle--411884ce-8862-403a-ac58-1ebf7cb5fb49", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--318f2a34-07b6-4c4b-9bb0-58f5bca681fc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.671099Z", - "modified": "2023-09-25T16:17:56.671099Z", + "created": "2023-09-28T21:25:13.270307Z", + "modified": "2023-09-28T21:25:13.270307Z", "name": "Comment or Reply on Content", "description": "Delivering content by replying or commenting via owned media (assets that the operator controls).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7.json index 2e428a0..6f2b703 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c1e7df4e-e357-491c-abc2-52824aeb0374", + "id": "bundle--9f1138e3-d221-4fb8-9853-210f71b9fd2e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--328ce801-be1a-4596-9961-008e1d9b85f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.560097Z", - "modified": "2023-09-25T16:17:56.560097Z", + "created": "2023-09-28T21:25:13.203339Z", + "modified": "2023-09-28T21:25:13.203339Z", "name": "Demand Insurmountable Proof", "description": "Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the \"firehose of misinformation\". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of \"questions\" while the truth teller is burdened with higher and higher standards of proof.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6.json index 725f45d..23f895c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--fde745b8-b26b-4ec6-998a-d0df32e6b3ed", + "id": "bundle--c25a4ed5-ff5c-4184-af40-63185fd027f0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.694715Z", - "modified": "2023-09-25T16:17:56.694715Z", + "created": "2023-09-28T21:25:13.282451Z", + "modified": "2023-09-28T21:25:13.282451Z", "name": "Redirect URLs", "description": "An influence operation may redirect its falsified or typosquatted URLs to legitimate websites to increase the operation's appearance of legitimacy, complicate attribution, and avoid detection.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8.json index f06b1b9..a73651d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e4fe910d-5992-4c9e-9700-21358991eca5", + "id": "bundle--4d5be5ab-9066-40d6-af57-347d231e4fb6", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.616791Z", - "modified": "2023-09-25T16:17:56.616791Z", + "created": "2023-09-28T21:25:13.231884Z", + "modified": "2023-09-28T21:25:13.231884Z", "name": "Develop Inauthentic News Articles", "description": "An influence operation may develop false or misleading news articles aligned to their campaign goals or narratives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb.json index 8781537..27501b1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e09ee49f-efc8-46b5-ad8b-a4f0c337c00d", + "id": "bundle--dedb20af-a3ed-4eb4-8daf-16cd2e08c1e6", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.697724Z", - "modified": "2023-09-25T16:17:56.697724Z", + "created": "2023-09-28T21:25:13.285122Z", + "modified": "2023-09-28T21:25:13.285122Z", "name": "Utilise Bulletproof Hosting", "description": "Hosting refers to services through which storage and computing resources are provided to an individual or organisation for the accommodation and maintenance of one or more websites and related services. Services may include web hosting, file sharing, and email distribution. Bulletproof hosting refers to services provided by an entity, such as a domain hosting or web hosting firm, that allows its customer considerable leniency in use of the service. An influence operation may utilise bulletproof hosting to maintain continuity of service for suspicious, illegal, or disruptive operation activities that stricter hosting services would limit, report, or suspend.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3437993c-c521-4145-a2d8-b860399876b0.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3437993c-c521-4145-a2d8-b860399876b0.json index 3ff19f6..0d73677 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3437993c-c521-4145-a2d8-b860399876b0.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3437993c-c521-4145-a2d8-b860399876b0.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--70957dad-c2fd-42d4-9b1d-a64946ae8178", + "id": "bundle--eeaf0531-be7c-45b6-afc0-dbed1617f77c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--3437993c-c521-4145-a2d8-b860399876b0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.690653Z", - "modified": "2023-09-25T16:17:56.690653Z", + "created": "2023-09-28T21:25:13.2801Z", + "modified": "2023-09-28T21:25:13.2801Z", "name": "Break Association with Content", "description": "Breaking association with content occurs when an influence operation actively separates itself from its own content. An influence operation may break association with content by unfollowing, unliking, or unsharing its content, removing attribution from its content, or otherwise taking actions that distance the operation from its messaging. An influence operation may break association with its content to complicate attribution or regain credibility for a new operation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590.json index 58b73a7..49b955d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f0c6c5c7-8d81-4426-aac7-51a3ac94a32b", + "id": "bundle--5de819f5-8460-41e6-8d44-e7259c9e748e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.550971Z", - "modified": "2023-09-25T16:17:56.550971Z", + "created": "2023-09-28T21:25:13.198072Z", + "modified": "2023-09-28T21:25:13.198072Z", "name": "Hijack Hashtags", "description": "Hashtag hijacking occurs when users \u201c[use] a trending hashtag to promote topics that are substantially different from its recent context\u201d (VanDam and Tan, 2016) or \u201cto promote one\u2019s own social media agenda\u201d (Darius and Stephany, 2019).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--34cda40c-8d27-48a0-b27c-c953b75c453d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--34cda40c-8d27-48a0-b27c-c953b75c453d.json index d0b826d..cd0658f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--34cda40c-8d27-48a0-b27c-c953b75c453d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--34cda40c-8d27-48a0-b27c-c953b75c453d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--b0b0c190-2e34-47d8-88de-a4aa362dc713", + "id": "bundle--a6d496d1-d241-4852-b5d4-327c5ffd64e2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--34cda40c-8d27-48a0-b27c-c953b75c453d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.548384Z", - "modified": "2023-09-25T16:17:56.548384Z", + "created": "2023-09-28T21:25:13.195892Z", + "modified": "2023-09-28T21:25:13.195892Z", "name": "Create Clickbait", "description": "Create attention grabbing headlines (outrage, doubt, humour) required to drive traffic & engagement. This is a key asset.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca.json index 33d3987..fb17305 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--1a37af76-1674-4215-b070-436efe42e556", + "id": "bundle--bcd1ecab-1563-4d85-8e3b-80064349facd", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.665004Z", - "modified": "2023-09-25T16:17:56.665004Z", + "created": "2023-09-28T21:25:13.267305Z", + "modified": "2023-09-28T21:25:13.267305Z", "name": "Social Media", "description": "Social Media", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12.json index 6ecacff..f757749 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--941bb670-63e1-41b6-9395-7d4c33cbad42", + "id": "bundle--1d1a0b5f-1be3-4c52-8c8c-6f7466953698", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.650615Z", - "modified": "2023-09-25T16:17:56.650615Z", + "created": "2023-09-28T21:25:13.258959Z", + "modified": "2023-09-28T21:25:13.258959Z", "name": "Create Dedicated Hashtag", "description": "Create a campaign/incident specific hashtag.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291.json index 352394f..b4c2ae1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--06885429-f9cf-4ca5-997d-4df6140844e9", + "id": "bundle--3713c941-49b8-4f24-8083-6c506a11ce72", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.684273Z", - "modified": "2023-09-25T16:17:56.684273Z", + "created": "2023-09-28T21:25:13.275328Z", + "modified": "2023-09-28T21:25:13.275328Z", "name": "Conduct Server Redirect", "description": "A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side or client-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16.json index 62b51eb..ae96523 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--57b9d162-1470-49b9-8921-f4a66278588d", + "id": "bundle--6a0de0a1-88d4-4005-8a2c-e41f4063bb91", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.561668Z", - "modified": "2023-09-25T16:17:56.561668Z", + "created": "2023-09-28T21:25:13.204899Z", + "modified": "2023-09-28T21:25:13.204899Z", "name": "Use Encrypted Chat Apps", "description": "Examples include Signal, WhatsApp, Discord, Wire, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9.json index 38f26d0..0d2b9bb 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f4b16241-d9ec-4469-93c9-33593829021b", + "id": "bundle--f9bab428-c384-4942-b2de-195baf6ac01b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.630048Z", - "modified": "2023-09-25T16:17:56.630048Z", + "created": "2023-09-28T21:25:13.243236Z", + "modified": "2023-09-28T21:25:13.243236Z", "name": "Use Follow Trains", "description": "A follow train is a group of people who follow each other on a social media platform, often as a way for an individual or campaign to grow its social media following. Follow trains may be a violation of platform Terms of Service. They are also known as follow-for-follow groups.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37d7a656-a425-4ec8-8128-c39848350716.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37d7a656-a425-4ec8-8128-c39848350716.json new file mode 100644 index 0000000..aeb7568 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37d7a656-a425-4ec8-8128-c39848350716.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--964f3842-e0ee-4236-8477-a2430a41938a", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--37d7a656-a425-4ec8-8128-c39848350716", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.295682Z", + "modified": "2023-09-28T21:25:13.295682Z", + "name": "Raise Funds", + "description": "Solicit donations for a cause. Popular conspiracy theorists can attract financial contributions from their followers. Fighting back against the establishment is a popular crowdfunding narrative. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0137.003.md", + "external_id": "T0137.003" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea.json index 495c341..102e8e9 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8a8d6b6f-e087-409f-bc08-3150760a4ed0", + "id": "bundle--597354a2-caf2-4a4f-937b-3ba4210154dd", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.622228Z", - "modified": "2023-09-25T16:17:56.622228Z", + "created": "2023-09-28T21:25:13.239371Z", + "modified": "2023-09-28T21:25:13.239371Z", "name": "Alter Authentic Documents", "description": "Alter authentic documents (public or non-public) to achieve campaign goals. The altered documents are intended to appear as if they are authentic can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85.json index 450f9f3..d2ff672 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6b76d491-eab9-45bd-ae52-9cc36b2acf32", + "id": "bundle--9763ce34-ff06-439f-9e5a-6189eb3500d7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.633693Z", - "modified": "2023-09-25T16:17:56.633693Z", + "created": "2023-09-28T21:25:13.248135Z", + "modified": "2023-09-28T21:25:13.248135Z", "name": "Create Content Farms", "description": "An influence operation may create an organisation for creating and amplifying campaign artefacts at scale.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1.json index f6a34b9..ac3aca8 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--fbdc843e-96fc-46b8-9914-be814206754d", + "id": "bundle--7930ed30-e163-4178-b29d-60e7e54310ff", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.68731Z", - "modified": "2023-09-25T16:17:56.68731Z", + "created": "2023-09-28T21:25:13.276967Z", + "modified": "2023-09-28T21:25:13.276967Z", "name": "Facilitate Logistics or Support for Attendance", "description": "Facilitate logistics or support for travel, food, housing, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72.json index fb5f660..118b0f2 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4d401c0a-8949-4b06-8392-c83f69b24f4d", + "id": "bundle--7b84f97c-4639-43b1-a7b5-a15b77650011", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.644763Z", - "modified": "2023-09-25T16:17:56.644763Z", + "created": "2023-09-28T21:25:13.255837Z", + "modified": "2023-09-28T21:25:13.255837Z", "name": "Use Existing Echo Chambers/Filter Bubbles", "description": "Use existing Echo Chambers/Filter Bubbles", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272.json index ecc9be8..75f3196 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--839afbed-8398-44e9-83e2-ab119851aafb", + "id": "bundle--807eca38-8021-4c57-922b-8ff2179acd1a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.636164Z", - "modified": "2023-09-25T16:17:56.636164Z", + "created": "2023-09-28T21:25:13.251463Z", + "modified": "2023-09-28T21:25:13.251463Z", "name": "Prepare Assets Impersonating Legitimate Entities", "description": "An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organisations, or state entities. An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity\u2019s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45.json index 3d6f8c9..ee2380e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3c001660-0994-46bb-a356-b0d180d2afbe", + "id": "bundle--524c667d-ba42-44dc-99ff-f0341f294492", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.547204Z", - "modified": "2023-09-25T16:17:56.547204Z", + "created": "2023-09-28T21:25:13.195475Z", + "modified": "2023-09-28T21:25:13.195475Z", "name": "Raise Funds from Malign Actors", "description": "Raising funds from malign actors may include contributions from foreign agents, cutouts or proxies, shell companies, dark money groups, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14.json index 6288119..afa2c3d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e222b4e4-f6d8-48a3-918a-81eb82e53356", + "id": "bundle--e270b35a-fd95-4c34-879c-ef98af69a7a2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.586611Z", - "modified": "2023-09-25T16:17:56.586611Z", + "created": "2023-09-28T21:25:13.216489Z", + "modified": "2023-09-28T21:25:13.216489Z", "name": "Psychographic Segmentation", "description": "An influence operation may target populations based on psychographic segmentation, which uses audience values and decision-making processes. An operation may individually gather psychographic data with its own surveys or collection tools or externally purchase data from social media companies or online surveys, such as personality quizzes.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271.json index c6350ed..6174655 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--1e5fc844-3f42-4cde-9772-07f1df06135a", + "id": "bundle--8df61d22-73e4-42fe-81f8-88f17e1f440a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.647861Z", - "modified": "2023-09-25T16:17:56.647861Z", + "created": "2023-09-28T21:25:13.257668Z", + "modified": "2023-09-28T21:25:13.257668Z", "name": "Mainstream Social Networks", "description": "Examples include Facebook, Twitter, LinkedIn, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c.json index dbb14b9..a1c3b39 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--babba90b-5cfa-4f2e-8896-ce7cfad22e93", + "id": "bundle--b83086c0-b76a-45b4-b775-b336e4f5b623", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.645644Z", - "modified": "2023-09-25T16:17:56.645644Z", + "created": "2023-09-28T21:25:13.256193Z", + "modified": "2023-09-28T21:25:13.256193Z", "name": "Exploit Data Voids", "description": "A data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. A 2019 report by Michael Golebiewski identifies five types of data voids. (1) \u201cBreaking news\u201d data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a \u201cstrategic new terms\u201d data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on \u201coutdated terms\u201d that have decreased in popularity, capitalising on most search engines\u2019 preferences for recency. (4) \u201cFragmented concepts\u201d data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use \u201cproblematic queries\u201d that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b.json index fe95e43..9276957 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--64a79515-06e4-4c33-8deb-aa9a7b38448e", + "id": "bundle--d36d25dd-ffcd-4218-853b-23d09e3325d4", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.606169Z", - "modified": "2023-09-25T16:17:56.606169Z", + "created": "2023-09-28T21:25:13.223959Z", + "modified": "2023-09-28T21:25:13.223959Z", "name": "Identify Social and Technical Vulnerabilities", "description": "Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4282febe-c8a6-46da-863c-f19081615d80.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4282febe-c8a6-46da-863c-f19081615d80.json index 72fb37b..49d639e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4282febe-c8a6-46da-863c-f19081615d80.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4282febe-c8a6-46da-863c-f19081615d80.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--9f222bb2-514d-428c-a048-f310b6766320", + "id": "bundle--790268d5-f369-403b-a46d-5ad509c30df0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--4282febe-c8a6-46da-863c-f19081615d80", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57385Z", - "modified": "2023-09-25T16:17:56.57385Z", + "created": "2023-09-28T21:25:13.21143Z", + "modified": "2023-09-28T21:25:13.21143Z", "name": "Utilise Spamoflauge", "description": "Spamoflauge refers to the practice of disguising spam messages as legitimate. Spam refers to the use of electronic messaging systems to send out unrequested or unwanted messages in bulk. Simple methods of spamoflauge include replacing letters with numbers to fool keyword-based email spam filters, for example, \"you've w0n our jackp0t!\". Spamoflauge may extend to more complex techniques such as modifying the grammar or word choice of the language, casting messages as images which spam detectors cannot automatically read, or encapsulating messages in password protected attachments, such as .pdf or .zip files. Influence operations may use spamoflauge to avoid spam filtering systems and increase the likelihood of the target audience receiving operation messaging.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--444c403e-a73f-4b78-9ffd-556f1dd29039.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--444c403e-a73f-4b78-9ffd-556f1dd29039.json index 008c3ff..ac30419 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--444c403e-a73f-4b78-9ffd-556f1dd29039.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--444c403e-a73f-4b78-9ffd-556f1dd29039.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3838a234-bf8c-4cfb-ab62-e2979906641d", + "id": "bundle--38165465-d447-4aad-8084-f23ebfbfb2da", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--444c403e-a73f-4b78-9ffd-556f1dd29039", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.632961Z", - "modified": "2023-09-25T16:17:56.632961Z", + "created": "2023-09-28T21:25:13.247214Z", + "modified": "2023-09-28T21:25:13.247214Z", "name": "Develop Owned Media Assets", "description": "An owned media asset refers to an agency or organisation through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organisation of content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--456e7902-1294-4ee0-aeb1-cfed13346a72.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--456e7902-1294-4ee0-aeb1-cfed13346a72.json new file mode 100644 index 0000000..20543d8 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--456e7902-1294-4ee0-aeb1-cfed13346a72.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--baedd8cd-24dd-4bdb-a75d-283f44a93339", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--456e7902-1294-4ee0-aeb1-cfed13346a72", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.217706Z", + "modified": "2023-09-28T21:25:13.217706Z", + "name": "Domestic Political Advantage", + "description": "Favourable position vis-\u00e0-vis national or sub-national political opponents such as political parties, interest groups, politicians, candidates. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-strategy" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0074.002.md", + "external_id": "T0074.002" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34.json index be765f8..9729007 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0137cfa4-b0ba-41da-869a-9e79398db70a", + "id": "bundle--8d9d6aaf-d143-4278-b601-05613e12dfcb", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.603123Z", - "modified": "2023-09-25T16:17:56.603123Z", + "created": "2023-09-28T21:25:13.223372Z", + "modified": "2023-09-28T21:25:13.223372Z", "name": "Conduct Web Traffic Analysis", "description": "An influence operation may conduct web traffic analysis to determine which search engines, keywords, websites, and advertisements gain the most traction with its target audience.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157.json index 9e09a6d..9cb0b69 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c736365e-18c7-4c46-adb4-c8abd29b935e", + "id": "bundle--fdec7679-d363-46e2-b4f0-eb885fcec3d2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.607352Z", - "modified": "2023-09-25T16:17:56.607352Z", + "created": "2023-09-28T21:25:13.224398Z", + "modified": "2023-09-28T21:25:13.224398Z", "name": "Find Echo Chambers", "description": "Find or plan to create areas (social media groups, search term groups, hashtag groups etc) where individuals only engage with people they agree with.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9.json index 81c6ee4..8a6192f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0e53788a-9453-4465-8f13-9226eec32027", + "id": "bundle--254ab946-c35a-4f26-9e74-9ad45e2ff842", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.554157Z", - "modified": "2023-09-25T16:17:56.554157Z", + "created": "2023-09-28T21:25:13.200791Z", + "modified": "2023-09-28T21:25:13.200791Z", "name": "Distort Facts", "description": "Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d.json index bea23b7..704c291 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e3de4a3b-78e1-458b-b410-44c260185b18", + "id": "bundle--af941b53-2a08-4b7e-8300-dd82dc395059", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.629682Z", - "modified": "2023-09-25T16:17:56.629682Z", + "created": "2023-09-28T21:25:13.243054Z", + "modified": "2023-09-28T21:25:13.243054Z", "name": "Create Organisations", "description": "Influence operations may establish organisations with legitimate or falsified hierarchies, staff, and content to structure operation assets, provide a sense of legitimacy to the operation, or provide institutional backing to operation activities.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc.json index 91737d3..451b30b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--61580419-8a54-4441-9726-f1432a13a237", + "id": "bundle--a66a21ef-a173-4cde-ba42-d60759c41c57", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.643292Z", - "modified": "2023-09-25T16:17:56.643292Z", + "created": "2023-09-28T21:25:13.255442Z", + "modified": "2023-09-28T21:25:13.255442Z", "name": "Leverage Echo Chambers/Filter Bubbles", "description": "An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with \u201cothers with which they are already in agreement.\u201d A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4c06f94a-13d2-4b86-9505-38684b317bcb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4c06f94a-13d2-4b86-9505-38684b317bcb.json new file mode 100644 index 0000000..ec4424e --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4c06f94a-13d2-4b86-9505-38684b317bcb.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--0d5a756b-bf16-49f0-bcfc-b6d4cbd17233", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--4c06f94a-13d2-4b86-9505-38684b317bcb", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.295155Z", + "modified": "2023-09-28T21:25:13.295155Z", + "name": "Generate Ad Revenue", + "description": "Earn income from digital advertisements published alongside inauthentic content. Conspiratorial, false, or provocative content drives internet traffic. Content owners earn money from impressions of, or clicks on, or conversions of ads published on their websites, social media profiles, or streaming services, or ads published when their content appears in search engine results. Fraudsters simulate impressions, clicks, and conversions, or they spin up inauthentic sites or social media profiles just to generate ad revenue. Conspiracy theorists and political operators generate ad revenue as a byproduct of their operation or as a means of sustaining their campaign. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0137.001.md", + "external_id": "T0137.001" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8.json index 83a13e8..b6bef0f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--cf67488e-2c88-4ca2-8506-5badeebad00a", + "id": "bundle--24d6d0eb-2e4c-41d5-bcd0-d96a3588d467", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.71158Z", - "modified": "2023-09-25T16:17:56.71158Z", + "created": "2023-09-28T21:25:13.290171Z", + "modified": "2023-09-28T21:25:13.290171Z", "name": "Message Reach", "description": "Monitor and evaluate message reach in misinformation incidents.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc.json index cbd50c0..24c9aed 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--09595db4-c32a-4abe-b0be-541ff5442607", + "id": "bundle--43f7eb05-0876-4b49-a574-4dd94a243847", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.632178Z", - "modified": "2023-09-25T16:17:56.632178Z", + "created": "2023-09-28T21:25:13.246267Z", + "modified": "2023-09-28T21:25:13.246267Z", "name": "Identify Susceptible Targets in Networks", "description": "When seeking to infiltrate an existing network, an influence operation may identify individuals and groups that might be susceptible to being co-opted or influenced.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35.json index bc10606..0ba85b9 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a55645b8-26b9-490a-9f5a-79e40d635fc1", + "id": "bundle--c8b9df5e-59ba-4442-8f92-91cde7dbcba9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.61373Z", - "modified": "2023-09-25T16:17:56.61373Z", + "created": "2023-09-28T21:25:13.228328Z", + "modified": "2023-09-28T21:25:13.228328Z", "name": "Use Copypasta", "description": "Copypasta refers to a piece of text that has been copied and pasted multiple times across various online platforms. A copypasta\u2019s final form may differ from its original source text as users add, delete, or otherwise edit the content as they repost the text.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4d86424a-26a1-4d9f-bc32-619620a18a8d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4d86424a-26a1-4d9f-bc32-619620a18a8d.json index 0e1d9f9..6866f89 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4d86424a-26a1-4d9f-bc32-619620a18a8d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4d86424a-26a1-4d9f-bc32-619620a18a8d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--84509329-7bf2-419e-957d-d8c382046344", + "id": "bundle--e5c4b351-10b3-46e7-9968-cd81945fe035", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--4d86424a-26a1-4d9f-bc32-619620a18a8d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.545329Z", - "modified": "2023-09-25T16:17:56.545329Z", + "created": "2023-09-28T21:25:13.193793Z", + "modified": "2023-09-28T21:25:13.193793Z", "name": "Compromise Legitimate Accounts", "description": "Hack or take over legimate accounts to distribute misinformation or damaging content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ecd424d-11a8-4471-9ccc-a870a337284d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ecd424d-11a8-4471-9ccc-a870a337284d.json new file mode 100644 index 0000000..cfc0b21 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ecd424d-11a8-4471-9ccc-a870a337284d.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--f1befdcf-3d25-41f8-a606-08f3d8d9dd4d", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--4ecd424d-11a8-4471-9ccc-a870a337284d", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.29877Z", + "modified": "2023-09-28T21:25:13.29877Z", + "name": "Deter", + "description": "Prevent target from taking an action for fear of the consequences. Deterrence occurs in the mind of the target, who fears they will be worse off if they take an action than if they don\u2019t. When making threats, aggressors may bluff, feign irrationality, or engage in brinksmanship.", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0139.003.md", + "external_id": "T0139.003" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--50f92bc8-f6ad-4267-bd00-f4c572370a72.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--50f92bc8-f6ad-4267-bd00-f4c572370a72.json index 42a5927..9c176bf 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--50f92bc8-f6ad-4267-bd00-f4c572370a72.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--50f92bc8-f6ad-4267-bd00-f4c572370a72.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--b99eed15-63a7-4a9e-8063-c1f4840a6c80", + "id": "bundle--b85c35ca-6b6b-4157-a1d0-3d17eb612378", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--50f92bc8-f6ad-4267-bd00-f4c572370a72", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.564081Z", - "modified": "2023-09-25T16:17:56.564081Z", + "created": "2023-09-28T21:25:13.206965Z", + "modified": "2023-09-28T21:25:13.206965Z", "name": "Use Search Engine Optimisation", "description": "Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka \"Black-hat SEO\"", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1.json index a2769d5..0533056 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--289770b3-6e12-44f0-9dca-a6a3b697bd2e", + "id": "bundle--76846529-cada-411b-bd11-af4b98c3f1f4", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.671832Z", - "modified": "2023-09-25T16:17:56.671832Z", + "created": "2023-09-28T21:25:13.270783Z", + "modified": "2023-09-28T21:25:13.270783Z", "name": "Post Inauthentic Social Media Comment", "description": "Use government-paid social media commenters, astroturfers, chat bots (programmed to reply to specific key words/hashtags) influence online conversations, product reviews, web-site comment forums.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5414f74d-0b10-4562-ad9d-e5e1093e255a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5414f74d-0b10-4562-ad9d-e5e1093e255a.json index 61b81c2..2519921 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5414f74d-0b10-4562-ad9d-e5e1093e255a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5414f74d-0b10-4562-ad9d-e5e1093e255a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--04f6aa22-9982-4cdf-8212-0bb451857c06", + "id": "bundle--bbd7a8b3-9663-4632-8a4d-b8bdd7f2f8e8", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5414f74d-0b10-4562-ad9d-e5e1093e255a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.592504Z", - "modified": "2023-09-25T16:17:56.592504Z", + "created": "2023-09-28T21:25:13.219041Z", + "modified": "2023-09-28T21:25:13.219041Z", "name": "Dismiss", "description": "Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biassed.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5.json new file mode 100644 index 0000000..2b4d1dc --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--02906a1b-afa4-47b6-a038-f4f50a04f0cb", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.290467Z", + "modified": "2023-09-28T21:25:13.290467Z", + "name": "Undermine", + "description": "Weaken, debilitate, or subvert a target or their actions. An influence operation may be designed to disparage an opponent; sabotage an opponent\u2019s systems or processes; compromise an opponent\u2019s relationships or support system; impair an opponent\u2019s capability; or thwart an opponent\u2019s initiative. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0135.md", + "external_id": "T0135" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--54edae40-39dc-45c4-a473-cef151d299ff.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--54edae40-39dc-45c4-a473-cef151d299ff.json new file mode 100644 index 0000000..7f6b6a2 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--54edae40-39dc-45c4-a473-cef151d299ff.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--2c82d82c-89e2-41d4-9f07-c59167626ecd", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--54edae40-39dc-45c4-a473-cef151d299ff", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.296499Z", + "modified": "2023-09-28T21:25:13.296499Z", + "name": "Manipulate Stocks", + "description": "Artificially inflate or deflate the price of stocks or other financial instruments and then trade on these to make profit. The most common securities fraud schemes are called \u201cpump and dump\u201d and \u201cpoop and scoop\u201d. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0137.006.md", + "external_id": "T0137.006" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5.json index 6b3ace7..51a5257 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--cf3ff00a-d0b8-40a4-842a-e75b27d83ec8", + "id": "bundle--c1b1845f-f5b0-4d07-abe1-d98f26c7c32f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.684021Z", - "modified": "2023-09-25T16:17:56.684021Z", + "created": "2023-09-28T21:25:13.27495Z", + "modified": "2023-09-28T21:25:13.27495Z", "name": "Destroy Information Generation Capabilities", "description": "Destroying information generation capabilities refers to actions taken to limit, degrade, or otherwise incapacitate an actor\u2019s ability to generate conflicting information. An influence operation may destroy an actor\u2019s information generation capabilities by physically dismantling the information infrastructure, disconnecting resources needed for information generation, or redirecting information generation personnel. An operation may destroy an adversary\u2019s information generation capabilities to limit conflicting content exposure to the target audience and crowd the information space with its own narratives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f.json index d7c86cf..f036a37 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--5bb27388-10ac-4aa1-9cd7-acee2a6f05d6", + "id": "bundle--9383febc-dd7c-454b-a110-1ccfd70d3b91", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.706462Z", - "modified": "2023-09-25T16:17:56.706462Z", + "created": "2023-09-28T21:25:13.289474Z", + "modified": "2023-09-28T21:25:13.289474Z", "name": "Awareness", "description": "Measure current system state with respect to the effectiveness of influencing awareness.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648.json index abb5675..b888910 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c879e6b7-35b5-455f-9030-11275001e409", + "id": "bundle--a4edde62-06aa-4210-a2ed-4ab9cd239c55", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.608622Z", - "modified": "2023-09-25T16:17:56.608622Z", + "created": "2023-09-28T21:25:13.224906Z", + "modified": "2023-09-28T21:25:13.224906Z", "name": "Identify Data Voids", "description": "A data void refers to a word or phrase that results in little, manipulative, or low-quality search engine data. Data voids are hard to detect and relatively harmless until exploited by an entity aiming to quickly proliferate false or misleading information during a phenomenon that causes a high number of individuals to query the term or phrase. In the Plan phase, an influence operation may identify data voids for later exploitation in the operation. A 2019 report by Michael Golebiewski identifies five types of data voids. (1) \u201cBreaking news\u201d data voids occur when a keyword gains popularity during a short period of time, allowing an influence operation to publish false content before legitimate news outlets have an opportunity to publish relevant information. (2) An influence operation may create a \u201cstrategic new terms\u201d data void by creating their own terms and publishing information online before promoting their keyword to the target audience. (3) An influence operation may publish content on \u201coutdated terms\u201d that have decreased in popularity, capitalising on most search engines\u2019 preferences for recency. (4) \u201cFragmented concepts\u201d data voids separate connections between similar ideas, isolating segment queries to distinct search engine results. (5) An influence operation may use \u201cproblematic queries\u201d that previously resulted in disturbing or inappropriate content to promote messaging until mainstream media recontextualizes the term.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63.json index 4dabadb..056057e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--b1ffeb61-505d-40b2-9150-5a42465e5b36", + "id": "bundle--edd394c2-0676-4441-b36d-8883b9eb6ccf", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687534Z", - "modified": "2023-09-25T16:17:56.687534Z", + "created": "2023-09-28T21:25:13.277105Z", + "modified": "2023-09-28T21:25:13.277105Z", "name": "Physical Violence", "description": "Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82.json index 6684f2c..b25629b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4cd40458-438b-4246-99dc-38c21c97413a", + "id": "bundle--354801d3-22ba-4123-ab59-e8facb7b8800", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.687738Z", - "modified": "2023-09-25T16:17:56.687738Z", + "created": "2023-09-28T21:25:13.277243Z", + "modified": "2023-09-28T21:25:13.277243Z", "name": "Conduct Physical Violence", "description": "An influence operation may directly Conduct Physical Violence to achieve campaign goals.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc.json index ac9cd3d..0ed9a2c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7b5c5a3a-e4d9-4713-9db8-71fd743f6312", + "id": "bundle--e04715f0-b252-4db3-977c-9e34cb387ab3", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.619753Z", - "modified": "2023-09-25T16:17:56.619753Z", + "created": "2023-09-28T21:25:13.235858Z", + "modified": "2023-09-28T21:25:13.235858Z", "name": "Deceptively Edit Video (Cheap Fakes)", "description": "Cheap fakes utilise less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99.json index 1fd0add..5b50aa6 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--dd1e526a-fa40-431a-a4ce-6fb0ad53b36c", + "id": "bundle--a3187df7-ce39-4a67-83cc-72bb0e1896b1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.627207Z", - "modified": "2023-09-25T16:17:56.627207Z", + "created": "2023-09-28T21:25:13.242366Z", + "modified": "2023-09-28T21:25:13.242366Z", "name": "Recruit Contractors", "description": "Operators recruit paid contractor to support the campaign.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f.json index b268264..a4efb04 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--63dda69f-3b0d-47a8-aded-719f059d4873", + "id": "bundle--29c900a0-3d71-4a1c-9708-126f036c3635", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.618702Z", - "modified": "2023-09-25T16:17:56.618702Z", + "created": "2023-09-28T21:25:13.23435Z", + "modified": "2023-09-28T21:25:13.23435Z", "name": "Aggregate Information into Evidence Collages", "description": "Image files that aggregate positive evidence (Joan Donovan)", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93.json index 5d8c803..084122c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--93304b10-2943-4cfc-a7d6-9bb61490f830", + "id": "bundle--fc23689c-583c-4a27-8169-a3e25ef68e3c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.610649Z", - "modified": "2023-09-25T16:17:56.610649Z", + "created": "2023-09-28T21:25:13.226785Z", + "modified": "2023-09-28T21:25:13.226785Z", "name": "Identify Wedge Issues", "description": "A wedge issue is a divisive political issue, usually concerning a social phenomenon, that divides individuals along a defined line. An influence operation may exploit wedge issues by intentionally polarising the public along the wedge issue line and encouraging opposition between factions.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7.json index f38ef10..4ddd9a5 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4485dec3-a69e-46d8-81ff-08c24ff3c8d0", + "id": "bundle--60871686-5e84-4b0f-9984-8a4b1c278af3", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.602724Z", - "modified": "2023-09-25T16:17:56.602724Z", + "created": "2023-09-28T21:25:13.223169Z", + "modified": "2023-09-28T21:25:13.223169Z", "name": "Identify Trending Topics/Hashtags", "description": "An influence operation may identify trending hashtags on social media platforms for later use in boosting operation content. A hashtag40 refers to a word or phrase preceded by the hash symbol (#) on social media used to identify messages and posts relating to a specific topic. All public posts that use the same hashtag are aggregated onto a centralised page dedicated to the word or phrase and sorted either chronologically or by popularity.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7.json index 51bcb53..70671be 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a4ef5834-7ecc-4cab-93c6-811e38a071f4", + "id": "bundle--8e15485e-1631-4178-8da2-e86150b9d873", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.620115Z", - "modified": "2023-09-25T16:17:56.620115Z", + "created": "2023-09-28T21:25:13.236325Z", + "modified": "2023-09-28T21:25:13.236325Z", "name": "Develop Audio-Based Content", "description": "Creating and editing false or misleading audio artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include creating completely new audio content, repurposing existing audio artefacts (including cheap fakes), or using AI-generated audio creation and editing technologies (including deepfakes).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d.json index c3a5502..1576b02 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e8bcf40c-8f8c-4447-978f-9edb11666cfb", + "id": "bundle--a387b741-b82e-4d20-8103-66107fb30e72", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.678764Z", - "modified": "2023-09-25T16:17:56.678764Z", + "created": "2023-09-28T21:25:13.273641Z", + "modified": "2023-09-28T21:25:13.273641Z", "name": "Use Affiliate Marketing Programmes", "description": "Use Affiliate Marketing Programmes", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d.json index b8bde8d..c3a60a6 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--584f008a-2316-4c43-aeb3-217f2829f5fe", + "id": "bundle--b72ed1a8-650b-4630-ace2-3cf62bb3b7e9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.567941Z", - "modified": "2023-09-25T16:17:56.567941Z", + "created": "2023-09-28T21:25:13.21013Z", + "modified": "2023-09-28T21:25:13.21013Z", "name": "Dox", "description": "Doxing refers to online harassment in which individuals publicly release private information about another individual, including names, addresses, employment information, pictures, family members, and other sensitive information. An influence operation may dox its opposition to encourage individuals aligned with operation narratives to harass the doxed individuals themselves or otherwise discourage the doxed individuals from posting or proliferating conflicting content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3.json index 6139529..5bcd146 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--74a6b91e-a11b-444c-8f76-968b1b1d815e", + "id": "bundle--978ff4cd-1e44-405b-a442-00e2316ef23c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.689297Z", - "modified": "2023-09-25T16:17:56.689297Z", + "created": "2023-09-28T21:25:13.278976Z", + "modified": "2023-09-28T21:25:13.278976Z", "name": "Change Names of Information Assets", "description": "Changing names or brand names of information assets such as accounts, channels, pages etc. An operation may change the names or brand names of its assets throughout an operation to avoid detection or alter the names of newly acquired or repurposed assets to fit operational narratives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5d4cafe2-42cc-4c41-8ce7-41256e1383f7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5d4cafe2-42cc-4c41-8ce7-41256e1383f7.json index 57e8f22..58f64fa 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5d4cafe2-42cc-4c41-8ce7-41256e1383f7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5d4cafe2-42cc-4c41-8ce7-41256e1383f7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f666a12e-d7f1-4a5b-a554-daced254ce35", + "id": "bundle--80f1b645-a5bc-4172-b736-c96f9e8872d3", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5d4cafe2-42cc-4c41-8ce7-41256e1383f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.559519Z", - "modified": "2023-09-25T16:17:56.559519Z", + "created": "2023-09-28T21:25:13.202853Z", + "modified": "2023-09-28T21:25:13.202853Z", "name": "Bait Legitimate Influencers", "description": "Credibility in a social media environment is often a function of the size of a user's network. \"Influencers\" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organisations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51.json index 52e8f9f..11bb94c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6f1826a3-a787-490d-a96b-60e958f80524", + "id": "bundle--1248df96-38fb-436f-a12e-c422f7877c8f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.670686Z", - "modified": "2023-09-25T16:17:56.670686Z", + "created": "2023-09-28T21:25:13.269813Z", + "modified": "2023-09-28T21:25:13.269813Z", "name": "One-Way Direct Posting", "description": "Direct posting refers to a method of posting content via a one-way messaging service, where the recipient cannot directly respond to the poster\u2019s messaging. An influence operation may post directly to promote operation narratives to the target audience without allowing opportunities for fact-checking or disagreement, creating a false sense of support for the narrative.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166.json index 1df8609..1a38e50 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f4a3b32c-1437-49d9-9562-44365d821643", + "id": "bundle--a312ddbb-cff2-46ba-8251-c28251b91dfa", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.703094Z", - "modified": "2023-09-25T16:17:56.703094Z", + "created": "2023-09-28T21:25:13.288478Z", + "modified": "2023-09-28T21:25:13.288478Z", "name": "Content Focused", "description": "Measure the performance of campaign content", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c.json index 1d3d6aa..e455f5a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--07deabf6-ee4a-46ad-a618-8b43888750fd", + "id": "bundle--0bbc8289-e38c-4a0d-a910-613213b96d98", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.677498Z", - "modified": "2023-09-25T16:17:56.677498Z", + "created": "2023-09-28T21:25:13.273494Z", + "modified": "2023-09-28T21:25:13.273494Z", "name": "Incentivize Sharing", "description": "Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf.json index 71c14d1..14d77ef 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--70ff29cb-5dae-4e3c-b8cc-1c9cf7cd8770", + "id": "bundle--4db02a9a-26f2-454e-be56-3a043e3a6794", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.617185Z", - "modified": "2023-09-25T16:17:56.617185Z", + "created": "2023-09-28T21:25:13.232379Z", + "modified": "2023-09-28T21:25:13.232379Z", "name": "Develop Image-Based Content", "description": "Creating and editing false or misleading visual artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include photographing staged real-life situations, repurposing existing digital images, or using image creation and editing technologies.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--61df6490-ca2c-41b7-a251-ded790a03a71.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--61df6490-ca2c-41b7-a251-ded790a03a71.json index f38013f..cb742c3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--61df6490-ca2c-41b7-a251-ded790a03a71.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--61df6490-ca2c-41b7-a251-ded790a03a71.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6894ce28-3acd-415d-a607-c59de4a1e37a", + "id": "bundle--c267cae6-67ed-4bdf-844a-e71d1b6b6faa", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--61df6490-ca2c-41b7-a251-ded790a03a71", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.548742Z", - "modified": "2023-09-25T16:17:56.548742Z", + "created": "2023-09-28T21:25:13.196042Z", + "modified": "2023-09-28T21:25:13.196042Z", "name": "Conduct Fundraising", "description": "Fundraising campaigns refer to an influence operation\u2019s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda.json index 231cf3b..d0f70d5 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8fe4f863-67eb-49be-b4fe-c5b73494bc7a", + "id": "bundle--f47cb1e5-935f-4a46-bc30-ea62bfd13d04", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.650118Z", - "modified": "2023-09-25T16:17:56.650118Z", + "created": "2023-09-28T21:25:13.258527Z", + "modified": "2023-09-28T21:25:13.258527Z", "name": "Use Hashtags", "description": "Use a dedicated, existing hashtag for the campaign/incident.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85.json index 60eb1a2..d86c160 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--81284c7c-f93d-4929-9fea-92c6ec050819", + "id": "bundle--f4eb45b9-d9f6-4f5d-9885-d74afc20cf6a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.610333Z", - "modified": "2023-09-25T16:17:56.610333Z", + "created": "2023-09-28T21:25:13.226454Z", + "modified": "2023-09-28T21:25:13.226454Z", "name": "Identify Existing Conspiracy Narratives/Suspicions", "description": "An influence operation may assess preexisting conspiracy theories or suspicions in a population to identify existing narratives that support operational objectives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4.json new file mode 100644 index 0000000..f9d6584 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--1fe0abde-ac9d-42d0-8e87-00923b74c16d", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.299034Z", + "modified": "2023-09-28T21:25:13.299034Z", + "name": "Cause Harm", + "description": "Persecute, malign, or inflict pain upon a target. The objective of a campaign may be to cause fear or emotional distress in a target. In some cases, harm is instrumental to achieving a primary objective, as in coercion, repression, or intimidation. In other cases, harm may be inflicted for the satisfaction of the perpetrator, as in revenge or sadistic cruelty. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0140.md", + "external_id": "T0140" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3.json index 4885ea3..58a4ccd 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--fa8feff0-2822-4fe2-bb3d-269bd0b5d163", + "id": "bundle--1bfb4da1-b2c7-4513-a1a0-ba3b41e7e8b4", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.634211Z", - "modified": "2023-09-25T16:17:56.634211Z", + "created": "2023-09-28T21:25:13.248612Z", + "modified": "2023-09-28T21:25:13.248612Z", "name": "Outsource Content Creation to External Organisations", "description": "An influence operation may outsource content creation to external companies to avoid attribution, increase the rate of content creation, or improve content quality, i.e., by employing an organisation that can create content in the target audience\u2019s native language. Employed organisations may include marketing companies for tailored advertisements or external content farms for high volumes of targeted media.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1.json index 94a1705..14e1c41 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--9c56ab6c-1e34-4dd8-9acb-247e531263e2", + "id": "bundle--bd950293-02f9-4b39-8300-902ec3a625f1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.686015Z", - "modified": "2023-09-25T16:17:56.686015Z", + "created": "2023-09-28T21:25:13.275963Z", + "modified": "2023-09-28T21:25:13.275963Z", "name": "Goad People into Harmful Action (Stop Hitting Yourself)", "description": "Goad people into actions that violate terms of service or will lead to having their content or accounts taken down.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4.json new file mode 100644 index 0000000..dd92d19 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--a2657de3-812b-4132-b3ec-e034a907698d", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.297901Z", + "modified": "2023-09-28T21:25:13.297901Z", + "name": "Dissuade from Acting", + "description": "Discourage, deter, or inhibit the target from actions which would be unfavourable to the attacker. The actor may want the target to refrain from voting, buying, fighting, or supplying. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0139.md", + "external_id": "T0139" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--665d4984-25b7-4bd5-9dcb-e81c7ed7f1c9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--665d4984-25b7-4bd5-9dcb-e81c7ed7f1c9.json new file mode 100644 index 0000000..71c9dac --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--665d4984-25b7-4bd5-9dcb-e81c7ed7f1c9.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--fd604bb1-8450-4a80-b9e4-e370e7fb1ca7", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--665d4984-25b7-4bd5-9dcb-e81c7ed7f1c9", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.292839Z", + "modified": "2023-09-28T21:25:13.292839Z", + "name": "Energise Supporters", + "description": "Raise the morale of those who support the organisation or group. Invigorate constituents with zeal for the mission or activity. Terrorist groups, political movements, and cults may indoctrinate their supporters with ideologies that are based on warped versions of religion or cause harm to others. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.003.md", + "external_id": "T0136.003" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf.json index 04b3e57..e434fd7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--aa31e868-418a-4836-b2bf-050619a0f944", + "id": "bundle--550cf650-4fca-47bf-99bf-38d539ff020f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.700839Z", - "modified": "2023-09-25T16:17:56.700839Z", + "created": "2023-09-28T21:25:13.287935Z", + "modified": "2023-09-28T21:25:13.287935Z", "name": "Post Borderline Content", "description": "Post Borderline Content", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--690761b6-8afd-4dd5-954e-174de362d1b0.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--690761b6-8afd-4dd5-954e-174de362d1b0.json index c1a9a01..dc2480a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--690761b6-8afd-4dd5-954e-174de362d1b0.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--690761b6-8afd-4dd5-954e-174de362d1b0.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--865e4369-3b8b-499b-9bec-76cd7ccf7bd8", + "id": "bundle--fe132d72-069e-4271-a67f-ed52829263fd", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--690761b6-8afd-4dd5-954e-174de362d1b0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.682265Z", - "modified": "2023-09-25T16:17:56.682265Z", + "created": "2023-09-28T21:25:13.274229Z", + "modified": "2023-09-28T21:25:13.274229Z", "name": "Direct Users to Alternative Platforms", "description": "Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6921234b-a646-4a18-88cf-e70fc8ffc874.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6921234b-a646-4a18-88cf-e70fc8ffc874.json new file mode 100644 index 0000000..6e7d730 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6921234b-a646-4a18-88cf-e70fc8ffc874.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--f211cc28-a6ef-4c4e-b0a0-231c7803a1e1", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--6921234b-a646-4a18-88cf-e70fc8ffc874", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.218536Z", + "modified": "2023-09-28T21:25:13.218536Z", + "name": "Ideological Advantage", + "description": "Favourable position domestically or internationally in the market for ideas, beliefs, and world views. Competition plays out among faith systems, political systems, and value systems. It can involve sub-national, national or supra-national movements. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-strategy" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0074.004.md", + "external_id": "T0074.004" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4.json index cce5720..da98474 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--333ab461-68bd-4163-9109-7591388f166e", + "id": "bundle--b8dd9a3e-54bb-497e-85a4-8defb61203a9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.585594Z", - "modified": "2023-09-25T16:17:56.585594Z", + "created": "2023-09-28T21:25:13.215512Z", + "modified": "2023-09-28T21:25:13.215512Z", "name": "Demographic Segmentation", "description": "An influence operation may target populations based on demographic segmentation, including age, gender, and income. Demographic segmentation may be useful for influence operations aiming to change state policies that affect a specific population sector. For example, an influence operation attempting to influence Medicare funding in the United States would likely target U.S. voters over 65 years of age.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db.json index 673f99f..fd87616 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ab049326-e5bf-4c10-b901-b3ca770006d7", + "id": "bundle--b886f90c-8e1a-4abf-a5d6-5b9d05ff1c0e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.616332Z", - "modified": "2023-09-25T16:17:56.616332Z", + "created": "2023-09-28T21:25:13.231426Z", + "modified": "2023-09-28T21:25:13.231426Z", "name": "Develop False or Altered Documents", "description": "Develop False or Altered Documents", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add.json index 13e10d3..88cf201 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6cf3b388-f1ec-42ee-8e62-59572101815d", + "id": "bundle--035818f7-856d-4ba5-95fc-958ee847e7a9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.710111Z", - "modified": "2023-09-25T16:17:56.710111Z", + "created": "2023-09-28T21:25:13.290026Z", + "modified": "2023-09-28T21:25:13.290026Z", "name": "Measure Effectiveness Indicators (or KPIs)", "description": "Ensuring that Key Performance Indicators are identified and tracked, so that the performance and effectiveness of campaigns, and elements of campaigns, can be measured, during and after their execution.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b23206e-6a5a-4173-ab1a-17e6cc9a9d2d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b23206e-6a5a-4173-ab1a-17e6cc9a9d2d.json index 175cfb5..5a1a8e4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b23206e-6a5a-4173-ab1a-17e6cc9a9d2d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b23206e-6a5a-4173-ab1a-17e6cc9a9d2d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a627b3b0-c083-4415-981d-7c40e404c61f", + "id": "bundle--0d797adb-8ff1-4179-8df8-d4745c497fac", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6b23206e-6a5a-4173-ab1a-17e6cc9a9d2d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.562924Z", - "modified": "2023-09-25T16:17:56.562924Z", + "created": "2023-09-28T21:25:13.205963Z", + "modified": "2023-09-28T21:25:13.205963Z", "name": "Seed Distortions", "description": "Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803.json index 2e2dd8c..285465e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--78c31b97-65a0-4476-bc95-ab8a21d4f8d1", + "id": "bundle--176fdd25-54ff-4895-b020-0f1dc02ca98c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.689063Z", - "modified": "2023-09-25T16:17:56.689063Z", + "created": "2023-09-28T21:25:13.278837Z", + "modified": "2023-09-28T21:25:13.278837Z", "name": "Launder Information Assets", "description": "Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0.json index 897230f..21cd232 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--827795a3-e0c3-4ced-8f06-d77ccdb248aa", + "id": "bundle--252f0334-ec98-439f-b90f-b31a46a96c3b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.647065Z", - "modified": "2023-09-25T16:17:56.647065Z", + "created": "2023-09-28T21:25:13.257306Z", + "modified": "2023-09-28T21:25:13.257306Z", "name": "Audio Livestream", "description": "An audio livestream refers to an online audio broadcast capability that allows for real-time communication to closed or open networks.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965.json index 7962613..152c202 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--dfac1f83-d280-42e0-a7b5-02d45cf60913", + "id": "bundle--24f54852-1d9e-42e7-8384-ace8434150ad", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.635104Z", - "modified": "2023-09-25T16:17:56.635104Z", + "created": "2023-09-28T21:25:13.250085Z", + "modified": "2023-09-28T21:25:13.250085Z", "name": "Establish Inauthentic News Sites", "description": "Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8.json index 6d08ad6..ee39736 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--02b32e47-3984-4297-8fef-f06530c586af", + "id": "bundle--e3f35a6b-10ed-42ac-94ca-4a8982b62f6f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651001Z", - "modified": "2023-09-25T16:17:56.651001Z", + "created": "2023-09-28T21:25:13.259452Z", + "modified": "2023-09-28T21:25:13.259452Z", "name": "Media Sharing Networks", "description": "Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a.json index 85524ab..28ad384 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--92bdf623-6641-40fe-9ff2-a8347f789423", + "id": "bundle--01d02a20-4b54-4cdb-a142-69019421de5b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.622758Z", - "modified": "2023-09-25T16:17:56.622758Z", + "created": "2023-09-28T21:25:13.239842Z", + "modified": "2023-09-28T21:25:13.239842Z", "name": "Create Inauthentic Accounts", "description": "Inauthentic accounts include bot accounts, cyborg accounts, sockpuppet accounts, and anonymous accounts.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6faf71ca-1e32-4134-8a7c-79b25f7f3615.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6faf71ca-1e32-4134-8a7c-79b25f7f3615.json index 4590252..3c74d65 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6faf71ca-1e32-4134-8a7c-79b25f7f3615.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6faf71ca-1e32-4134-8a7c-79b25f7f3615.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--b5a388fb-6958-4484-b67b-0136e5476c20", + "id": "bundle--e2690a89-3cc6-441f-99f4-60fa1607de73", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--6faf71ca-1e32-4134-8a7c-79b25f7f3615", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.588304Z", - "modified": "2023-09-25T16:17:56.588304Z", + "created": "2023-09-28T21:25:13.217222Z", + "modified": "2023-09-28T21:25:13.217222Z", "name": "Determine Target Audiences", "description": "Determining the target audiences (segments of the population) who will receive campaign narratives and artefacts intended to achieve the strategic ends.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--70717452-f7e3-4ce8-956f-39a4d34c5cfb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--70717452-f7e3-4ce8-956f-39a4d34c5cfb.json index 97ca766..8b1d349 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--70717452-f7e3-4ce8-956f-39a4d34c5cfb.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--70717452-f7e3-4ce8-956f-39a4d34c5cfb.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--73a56af2-a327-415f-bdf4-d61b80df87f6", + "id": "bundle--291fa157-975f-433f-8dd2-ca4f9a53979c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--70717452-f7e3-4ce8-956f-39a4d34c5cfb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.538776Z", - "modified": "2023-09-25T16:17:56.538776Z", + "created": "2023-09-28T21:25:13.190139Z", + "modified": "2023-09-28T21:25:13.190139Z", "name": "Facilitate State Propaganda", "description": "Organise citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--719b15f1-fb7d-49f4-97ca-7ba5ab09da6d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--719b15f1-fb7d-49f4-97ca-7ba5ab09da6d.json new file mode 100644 index 0000000..cef803f --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--719b15f1-fb7d-49f4-97ca-7ba5ab09da6d.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--91fedd8d-9313-40f4-83d9-50c02f37faba", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--719b15f1-fb7d-49f4-97ca-7ba5ab09da6d", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.296236Z", + "modified": "2023-09-28T21:25:13.296236Z", + "name": "Extort", + "description": "Coerce money or favours from a target by threatening to expose or corrupt information. Ransomware criminals typically demand money. Intelligence agencies demand national secrets. Sexual predators demand favours. The leverage may be critical, sensitive, or embarrassing information. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0137.005.md", + "external_id": "T0137.005" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28.json index feca8c0..ef43691 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--d75f518f-45d6-4ca3-b487-2c072ebbe3b4", + "id": "bundle--89c5bd5c-55e6-4a88-a00a-5b6dca031dcc", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.549167Z", - "modified": "2023-09-25T16:17:56.549167Z", + "created": "2023-09-28T21:25:13.19624Z", + "modified": "2023-09-28T21:25:13.19624Z", "name": "Conduct Crowdfunding Campaigns", "description": "An influence operation may Conduct Crowdfunding Campaigns on platforms such as GoFundMe, GiveSendGo, Tipeee, Patreon, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72df7e55-dc60-4a7e-9928-ed41ac0e1581.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72df7e55-dc60-4a7e-9928-ed41ac0e1581.json index a0ece38..1e59cee 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72df7e55-dc60-4a7e-9928-ed41ac0e1581.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--72df7e55-dc60-4a7e-9928-ed41ac0e1581.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--91aa0d8f-7beb-4941-8a68-f1938aa1558e", + "id": "bundle--0fdeeeff-528e-4912-9c08-1764c2aaf5b7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--72df7e55-dc60-4a7e-9928-ed41ac0e1581", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.672848Z", - "modified": "2023-09-25T16:17:56.672848Z", + "created": "2023-09-28T21:25:13.271321Z", + "modified": "2023-09-28T21:25:13.271321Z", "name": "Attract Traditional Media", "description": "Deliver content by attracting the attention of traditional media (earned media).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a.json index a000155..8f1410f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--15fc60a2-7771-4717-8693-b350dec4bfe2", + "id": "bundle--da11a350-8ab9-4edb-b0cc-07f7d5208e04", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.61453Z", - "modified": "2023-09-25T16:17:56.61453Z", + "created": "2023-09-28T21:25:13.229346Z", + "modified": "2023-09-28T21:25:13.229346Z", "name": "Deceptively Labelled or Translated", "description": "An influence operation may take authentic content from other sources and add deceptive labels or deceptively translate the content into other langauges.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--75a5c211-2590-498c-ad3a-129c912d5cd2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--75a5c211-2590-498c-ad3a-129c912d5cd2.json index 878f509..b323c16 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--75a5c211-2590-498c-ad3a-129c912d5cd2.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--75a5c211-2590-498c-ad3a-129c912d5cd2.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3cc9048e-5ad1-4e8e-a21b-e673960af9b8", + "id": "bundle--258e85d1-9e27-41b6-b565-e839da19f584", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--75a5c211-2590-498c-ad3a-129c912d5cd2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.542172Z", - "modified": "2023-09-25T16:17:56.542172Z", + "created": "2023-09-28T21:25:13.191114Z", + "modified": "2023-09-28T21:25:13.191114Z", "name": "Develop Competing Narratives", "description": "Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centred on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the \"firehose of misinformation\" approach.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa.json index 4ed3196..2d25af3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--2a1e9627-d819-430d-a1cd-8bcdaaf22e56", + "id": "bundle--c243daa5-72d3-44b7-b15f-607b744b87d5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.58524Z", - "modified": "2023-09-25T16:17:56.58524Z", + "created": "2023-09-28T21:25:13.215004Z", + "modified": "2023-09-28T21:25:13.215004Z", "name": "Geographic Segmentation", "description": "An influence operation may target populations in a specific geographic location, such as a region, state, or city. An influence operation may use geographic segmentation to Create Localised Content (see: Establish Legitimacy).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4.json index 2b016de..638e572 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e8cd96d5-6b71-4afa-81f9-acd5e2497c75", + "id": "bundle--b4b36fa4-d2c2-4122-9a26-e3221bcdcda2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.620803Z", - "modified": "2023-09-25T16:17:56.620803Z", + "created": "2023-09-28T21:25:13.237308Z", + "modified": "2023-09-28T21:25:13.237308Z", "name": "Deceptively Edit Audio (Cheap Fakes)", "description": "Cheap fakes utilise less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77cb282d-d6e6-4d86-87bf-08a2483bdbb6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77cb282d-d6e6-4d86-87bf-08a2483bdbb6.json index 0baddda..fb4d595 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77cb282d-d6e6-4d86-87bf-08a2483bdbb6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77cb282d-d6e6-4d86-87bf-08a2483bdbb6.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8e725067-1a0a-49a0-bef2-bf9ecd64105f", + "id": "bundle--46e473a1-d709-413c-a20b-a07be00df40c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--77cb282d-d6e6-4d86-87bf-08a2483bdbb6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.558283Z", - "modified": "2023-09-25T16:17:56.558283Z", + "created": "2023-09-28T21:25:13.202323Z", + "modified": "2023-09-28T21:25:13.202323Z", "name": "Online Polls", "description": "Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5.json index 436eb78..0a548d3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c7e2d0ed-6407-4940-bc62-f0026bd8d83f", + "id": "bundle--faae5d76-627b-4cb2-aca4-e5e0a342e40b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.647464Z", - "modified": "2023-09-25T16:17:56.647464Z", + "created": "2023-09-28T21:25:13.257486Z", + "modified": "2023-09-28T21:25:13.257486Z", "name": "Social Networks", "description": "Social media are interactive digital channels that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8.json index 9a6cb1f..a88a098 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f7321d33-5735-47be-b069-5740727c4d36", + "id": "bundle--f9f60bd1-8fc0-4df6-a7b8-cf90378796af", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688367Z", - "modified": "2023-09-25T16:17:56.688367Z", + "created": "2023-09-28T21:25:13.278041Z", + "modified": "2023-09-28T21:25:13.278041Z", "name": "Use Pseudonyms", "description": "An operation may use pseudonyms, or fake names, to mask the identity of operational accounts, channels, pages etc., publish anonymous content, or otherwise use falsified personas to conceal the identity of the operation. An operation may coordinate pseudonyms across multiple platforms, for example, by writing an article under a pseudonym and then posting a link to the article on social media on an account, channel, or page with the same falsified name.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d.json index 7639cc2..6593a81 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4d62144c-a1b1-40f0-9054-8b2923f70a0a", + "id": "bundle--b7d6a53c-a9ed-44a3-a1d1-84ef0d342f9a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651419Z", - "modified": "2023-09-25T16:17:56.651419Z", + "created": "2023-09-28T21:25:13.259826Z", + "modified": "2023-09-28T21:25:13.259826Z", "name": "Photo Sharing", "description": "Examples include Instagram, Snapchat, Flickr, etc", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7981d39a-01be-46f6-b9f9-507d0c03e919.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7981d39a-01be-46f6-b9f9-507d0c03e919.json index eb0b936..358f521 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7981d39a-01be-46f6-b9f9-507d0c03e919.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7981d39a-01be-46f6-b9f9-507d0c03e919.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3a29be5a-faea-4c85-91ae-8efee953c08c", + "id": "bundle--1b64da6a-7bf3-4985-81a8-0416244665fb", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7981d39a-01be-46f6-b9f9-507d0c03e919", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.542946Z", - "modified": "2023-09-25T16:17:56.542946Z", + "created": "2023-09-28T21:25:13.192169Z", + "modified": "2023-09-28T21:25:13.192169Z", "name": "Create Fake Experts", "description": "Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397.json index 3f9f6a4..2670805 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--88ce916d-d999-4146-aab9-844aeef080f1", + "id": "bundle--d8b477d9-a711-4fa8-9365-0a9b887fe22c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.579763Z", - "modified": "2023-09-25T16:17:56.579763Z", + "created": "2023-09-28T21:25:13.212278Z", + "modified": "2023-09-28T21:25:13.212278Z", "name": "Pay for Physical Action", "description": "Paying for physical action occurs when an influence operation pays individuals to act in the physical realm. An influence operation may pay for physical action to create specific situations and frame them in a way that supports operation narratives, for example, paying a group of people to burn a car to later post an image of the burning car and frame it as an act of protest.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3.json index 4d1754a..cb82ad0 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--de79ee28-a336-4403-bd7e-fae0b546cbdb", + "id": "bundle--4fad99fd-bde0-40eb-8fbf-ade474cc4d6a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.61799Z", - "modified": "2023-09-25T16:17:56.61799Z", + "created": "2023-09-28T21:25:13.233365Z", + "modified": "2023-09-28T21:25:13.233365Z", "name": "Develop AI-Generated Images (Deepfakes)", "description": "Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual\u2019s face, body, voice, and physical gestures.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8.json index eecfa83..500afd1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--cc25dc95-5b71-468d-9938-5614bc2296b6", + "id": "bundle--3fd2c1db-d8ab-4dda-a02c-0b9c76cdf2b1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.565688Z", - "modified": "2023-09-25T16:17:56.565688Z", + "created": "2023-09-28T21:25:13.208447Z", + "modified": "2023-09-28T21:25:13.208447Z", "name": "Boycott/\"Cancel\" Opponents", "description": "Cancel culture refers to the phenomenon in which individuals collectively refrain from supporting an individual, organisation, business, or other entity, usually following a real or falsified controversy. An influence operation may exploit cancel culture by emphasising an adversary\u2019s problematic or disputed behaviour and presenting its own content as an alternative.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce.json index b029ff5..017edb8 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6af82cdd-2f56-4795-a0cd-c71834615925", + "id": "bundle--9f22ca6d-ae97-4d0c-97f0-681666deabe4", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.610989Z", - "modified": "2023-09-25T16:17:56.610989Z", + "created": "2023-09-28T21:25:13.227018Z", + "modified": "2023-09-28T21:25:13.227018Z", "name": "Identify Target Audience Adversaries", "description": "An influence operation may identify or create a real or imaginary adversary to centre operation narratives against. A real adversary may include certain politicians or political parties while imaginary adversaries may include falsified \u201cdeep state\u201d62 actors that, according to conspiracies, run the state behind public view.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7e3a06ee-c109-4901-8720-69c46fe04a76.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7e3a06ee-c109-4901-8720-69c46fe04a76.json index 60bda9e..65fdee1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7e3a06ee-c109-4901-8720-69c46fe04a76.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7e3a06ee-c109-4901-8720-69c46fe04a76.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--2e5b5584-1bb2-4255-84fe-815655774288", + "id": "bundle--4181f639-bb14-4c23-8d63-6c935086311f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7e3a06ee-c109-4901-8720-69c46fe04a76", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.680668Z", - "modified": "2023-09-25T16:17:56.680668Z", + "created": "2023-09-28T21:25:13.273944Z", + "modified": "2023-09-28T21:25:13.273944Z", "name": "Manipulate Platform Algorithm", "description": "Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analysing a platform\u2019s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation\u2019s strategy. For example, an influence operation may use bots to amplify its posts so that the platform\u2019s algorithm recognises engagement with operation content and further promotes the content on user timelines.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3.json index 3ea595e..bc87e6c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--d0c5b9c7-fe61-4d17-b883-8d3d8c0b267b", + "id": "bundle--2be49de2-ce8a-4896-b1a5-9ce484d594d7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.648254Z", - "modified": "2023-09-25T16:17:56.648254Z", + "created": "2023-09-28T21:25:13.257828Z", + "modified": "2023-09-28T21:25:13.257828Z", "name": "Dating Apps", "description": "Dating Apps", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0.json index da50055..5f1b10d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6a95f7d6-894f-4bec-bfd0-52b0682899fb", + "id": "bundle--ee890f9c-7aa9-4769-b09b-96f72b516e2d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.70757Z", - "modified": "2023-09-25T16:17:56.70757Z", + "created": "2023-09-28T21:25:13.289726Z", + "modified": "2023-09-28T21:25:13.289726Z", "name": "Knowledge", "description": "Measure current system state with respect to the effectiveness of influencing knowledge.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7ff061e5-cc6e-4d6a-9d0c-dbdf4c869c57.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7ff061e5-cc6e-4d6a-9d0c-dbdf4c869c57.json new file mode 100644 index 0000000..8f27b0a --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7ff061e5-cc6e-4d6a-9d0c-dbdf4c869c57.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--ac0ac17b-745b-48ad-889c-20efd2813e4a", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--7ff061e5-cc6e-4d6a-9d0c-dbdf4c869c57", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.293217Z", + "modified": "2023-09-28T21:25:13.293217Z", + "name": "Boost Reputation", + "description": "Elevate the estimation of the actor in the public\u2019s mind. Improve their image or standing. Public relations professionals use persuasive overt communications to achieve this goal; manipulators use covert disinformation. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.004.md", + "external_id": "T0136.004" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7.json index 9337dfe..86d9f8b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--5045b083-2a0c-41c0-805c-7d7417b4eccb", + "id": "bundle--44b54358-5c40-480e-aa9a-68360f78d977", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.625293Z", - "modified": "2023-09-25T16:17:56.625293Z", + "created": "2023-09-28T21:25:13.24201Z", + "modified": "2023-09-28T21:25:13.24201Z", "name": "Create Sockpuppet Accounts", "description": "Sockpuppet accounts refer to falsified accounts that either promote the influence operation\u2019s own material or attack critics of the material online. Individuals who control sockpuppet accounts also man at least one other user account.67 Sockpuppet accounts help legitimise operation narratives by providing an appearance of external support for the material and discrediting opponents of the operation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531.json index e49e9ab..eb8d8cf 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--28c5b9e0-44a5-4059-bae3-fccd3c105c27", + "id": "bundle--8b272661-09cc-485e-a4a9-f983697c165a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.601502Z", - "modified": "2023-09-25T16:17:56.601502Z", + "created": "2023-09-28T21:25:13.222094Z", + "modified": "2023-09-28T21:25:13.222094Z", "name": "Map Target Audience Information Environment", "description": "Mapping the target audience information environment analyses the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425.json index c9e81f1..277393a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--17739f52-57e7-4904-957d-7207b970c2b1", + "id": "bundle--f6cacb16-0506-4b2e-8559-ce74533b4c37", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.696916Z", - "modified": "2023-09-25T16:17:56.696916Z", + "created": "2023-09-28T21:25:13.284035Z", + "modified": "2023-09-28T21:25:13.284035Z", "name": "Conceal Infrastructure", "description": "Conceal the campaign's infrastructure to avoid takedown and attribution.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--836e9eef-b446-4f68-805f-0f10116d6e7f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--836e9eef-b446-4f68-805f-0f10116d6e7f.json index a66f50a..fb38426 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--836e9eef-b446-4f68-805f-0f10116d6e7f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--836e9eef-b446-4f68-805f-0f10116d6e7f.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--875f2af7-961f-4fbd-9c6c-87b5e3273240", + "id": "bundle--9734e977-7c5e-483b-8834-ee061a78b2a5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--836e9eef-b446-4f68-805f-0f10116d6e7f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.673959Z", - "modified": "2023-09-25T16:17:56.673959Z", + "created": "2023-09-28T21:25:13.271782Z", + "modified": "2023-09-28T21:25:13.271782Z", "name": "Amplify Existing Narrative", "description": "An influence operation may amplify existing narratives that align with its narratives to support operation objectives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9.json index 5d1ee43..0e32b99 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--357f0c64-a5af-403e-b3f3-9bf54aa4fff0", + "id": "bundle--e14dfa60-3fa4-40b9-a9c8-e6bba6a3da3c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.702751Z", - "modified": "2023-09-25T16:17:56.702751Z", + "created": "2023-09-28T21:25:13.288335Z", + "modified": "2023-09-28T21:25:13.288335Z", "name": "People Focused", "description": "Measure the performance individuals in achieving campaign goals", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488.json index de1acdf..5831ed3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--dde0f7e9-b7d2-4326-b40f-a79cab38c021", + "id": "bundle--e24e8526-c107-4744-961b-cee963ea47f8", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.652483Z", - "modified": "2023-09-25T16:17:56.652483Z", + "created": "2023-09-28T21:25:13.261294Z", + "modified": "2023-09-28T21:25:13.261294Z", "name": "Anonymous Message Boards", "description": "Examples include the Chans", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6.json index 5e15d11..0eb2cce 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--9de20c8a-8f2e-4eb0-b9a9-9f3b8305ce6c", + "id": "bundle--9b597d94-be87-41cd-b342-dbfedd246ba6", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.556384Z", - "modified": "2023-09-25T16:17:56.556384Z", + "created": "2023-09-28T21:25:13.201835Z", + "modified": "2023-09-28T21:25:13.201835Z", "name": "Edit Open-Source Content", "description": "An influence operation may edit open-source content, such as collaborative blogs or encyclopaedias, to promote its narratives on outlets with existing credibility and audiences. Editing open-source content may allow an operation to post content on platforms without dedicating resources to the creation and maintenance of its own assets.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae.json index 6c0d44c..fa9cafc 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a7625bbc-625e-4343-8aa1-35b535c2c7ab", + "id": "bundle--f4b606e2-9fad-4ac5-80ad-5aa833e3e505", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.674329Z", - "modified": "2023-09-25T16:17:56.674329Z", + "created": "2023-09-28T21:25:13.272585Z", + "modified": "2023-09-28T21:25:13.272585Z", "name": "Cross-Posting", "description": "Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab.json index 81bb967..0cd8ad2 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--be3f8fbe-aa12-48ad-8fb3-49794258e3bf", + "id": "bundle--f9174bbe-53b5-4b79-a0b5-a91001121ad9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.681531Z", - "modified": "2023-09-25T16:17:56.681531Z", + "created": "2023-09-28T21:25:13.274087Z", + "modified": "2023-09-28T21:25:13.274087Z", "name": "Bypass Content Blocking", "description": "Bypassing content blocking refers to actions taken to circumvent network security measures that prevent users from accessing certain servers, resources, or other online spheres. An influence operation may bypass content blocking to proliferate its content on restricted areas of the internet. Common strategies for bypassing content blocking include: - Altering IP addresses to avoid IP filtering - Using a Virtual Private Network (VPN) to avoid IP filtering - Using a Content Delivery Network (CDN) to avoid IP filtering - Enabling encryption to bypass packet inspection blocking - Manipulating text to avoid filtering by keywords - Posting content on multiple platforms to avoid platform-specific removals - Using local facilities or modified DNS servers to avoid DNS filtering", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ad58740-d5c1-40bb-9091-f98adfe8d89f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ad58740-d5c1-40bb-9091-f98adfe8d89f.json index 97bdac8..aab6501 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ad58740-d5c1-40bb-9091-f98adfe8d89f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ad58740-d5c1-40bb-9091-f98adfe8d89f.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f4748d02-41e9-44f4-9f06-51fead589788", + "id": "bundle--4809dcfc-d737-4b26-a64f-dc3a0e169fff", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8ad58740-d5c1-40bb-9091-f98adfe8d89f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.595524Z", - "modified": "2023-09-25T16:17:56.595524Z", + "created": "2023-09-28T21:25:13.221088Z", + "modified": "2023-09-28T21:25:13.221088Z", "name": "Dismay", "description": "Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5.json index f18aecc..bb4b61c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--83d6d4c8-c429-451d-9487-a859a6c02c45", + "id": "bundle--365f2f37-f3ff-4860-a3e4-0483fa47f85b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.698933Z", - "modified": "2023-09-25T16:17:56.698933Z", + "created": "2023-09-28T21:25:13.286669Z", + "modified": "2023-09-28T21:25:13.286669Z", "name": "Obfuscate Payment", "description": "Obfuscate Payment", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4.json index 478a6af..a4c51d2 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--cde4db38-441d-4e6d-8411-7f350443e05c", + "id": "bundle--53238178-5df8-45c7-8c4d-e52866041ef7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.621185Z", - "modified": "2023-09-25T16:17:56.621185Z", + "created": "2023-09-28T21:25:13.237844Z", + "modified": "2023-09-28T21:25:13.237844Z", "name": "Obtain Private Documents", "description": "Procuring documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can include authentic non-public documents, authentic non-public documents have been altered, or inauthentic documents intended to appear as if they are authentic non-public documents. All of these types of documents can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34.json index 6ff4931..f6885c6 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7d43c862-652b-4c37-b7f4-45e155ebc3f2", + "id": "bundle--d2deeef7-35df-411f-ba0b-1f7a1afd8e89", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.615616Z", - "modified": "2023-09-25T16:17:56.615616Z", + "created": "2023-09-28T21:25:13.230461Z", + "modified": "2023-09-28T21:25:13.230461Z", "name": "Develop Text-Based Content", "description": "Creating and editing false or misleading text-based artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732.json index 59a5e51..fdf4a23 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--11bffd6c-e7de-4a10-8b02-6de96b9472ce", + "id": "bundle--1625cc08-ec5c-4dc5-8f31-ac3c3b82696d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.609623Z", - "modified": "2023-09-25T16:17:56.609623Z", + "created": "2023-09-28T21:25:13.225334Z", + "modified": "2023-09-28T21:25:13.225334Z", "name": "Identify Existing Prejudices", "description": "An influence operation may exploit existing racial, religious, demographic, or social prejudices to further polarise its target audience from the rest of the public.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7.json index d4a3931..17cce16 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--868c0639-537c-441d-ab54-0e5383b8ff6a", + "id": "bundle--516832ab-e9fa-4441-b430-7a4f44414b6e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.634846Z", - "modified": "2023-09-25T16:17:56.634846Z", + "created": "2023-09-28T21:25:13.249554Z", + "modified": "2023-09-28T21:25:13.249554Z", "name": "Backstop Personas", "description": "Create other assets/dossier/cover/fake relationships and/or connections or documents, sites, bylines, attributions, to establish/augment/inflate crediblity/believability", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f.json index a0de3a2..cfb00ff 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--dd40fae1-f26f-446a-b03f-794f1a006cef", + "id": "bundle--b80c4c48-25fa-4119-a1ba-3308730cd6e0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.632569Z", - "modified": "2023-09-25T16:17:56.632569Z", + "created": "2023-09-28T21:25:13.246767Z", + "modified": "2023-09-28T21:25:13.246767Z", "name": "Utilise Butterfly Attacks", "description": "Butterfly attacks occur when operators pretend to be members of a certain social group, usually a group that struggles for representation. An influence operation may mimic a group to insert controversial statements into the discourse, encourage the spread of operation content, or promote harassment among group members. Unlike astroturfing, butterfly attacks aim to infiltrate and discredit existing grassroots movements, organisations, and media campaigns.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139.json index eb5ab0b..0a67e77 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--d4a91112-a2e2-4a2d-baf4-f259988aebbe", + "id": "bundle--8da9150a-6066-47c5-b2f0-c3af7a835c29", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.665988Z", - "modified": "2023-09-25T16:17:56.665988Z", + "created": "2023-09-28T21:25:13.267811Z", + "modified": "2023-09-28T21:25:13.267811Z", "name": "Traditional Media", "description": "Examples include TV, Radio, Newspaper, billboards", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4.json index 79ed952..a3d3ee3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--66a4f482-afb4-4afc-a6f7-d1042d89380c", + "id": "bundle--c2672c45-6c00-485a-b41f-4f3f22f4a3da", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.634628Z", - "modified": "2023-09-25T16:17:56.634628Z", + "created": "2023-09-28T21:25:13.249041Z", + "modified": "2023-09-28T21:25:13.249041Z", "name": "Create Personas", "description": "Creating fake people, often with accounts across multiple platforms. These personas can be as simple as a name, can contain slightly more background like location, profile pictures, backstory, or can be effectively backstopped with indicators like fake identity documents.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90ca8c39-a644-4007-b3d6-68fabc90b531.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90ca8c39-a644-4007-b3d6-68fabc90b531.json index 98df482..a322a84 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90ca8c39-a644-4007-b3d6-68fabc90b531.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90ca8c39-a644-4007-b3d6-68fabc90b531.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--fc1dec97-52be-4de5-b394-3c5e4a75fc83", + "id": "bundle--a9ad2033-ec65-4d87-95cd-b87cb08c9e08", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--90ca8c39-a644-4007-b3d6-68fabc90b531", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.564472Z", - "modified": "2023-09-25T16:17:56.564472Z", + "created": "2023-09-28T21:25:13.207469Z", + "modified": "2023-09-28T21:25:13.207469Z", "name": "Censor Social Media as a Political Force", "description": "Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--924eb596-25cc-4c13-8395-56ed892e5771.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--924eb596-25cc-4c13-8395-56ed892e5771.json new file mode 100644 index 0000000..c28dbf9 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--924eb596-25cc-4c13-8395-56ed892e5771.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--2729c990-e2cc-4621-b640-b2846810ef35", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--924eb596-25cc-4c13-8395-56ed892e5771", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.291056Z", + "modified": "2023-09-28T21:25:13.291056Z", + "name": "Thwart", + "description": "Prevent the successful outcome of a policy, operation, or initiative. Actors conduct influence operations to stymie or foil proposals, plans, or courses of action which are not in their interest. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0135.002.md", + "external_id": "T0135.002" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8.json new file mode 100644 index 0000000..93da570 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--0c0fbc3f-4628-46f9-8387-828c6c5c43e8", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.296809Z", + "modified": "2023-09-28T21:25:13.296809Z", + "name": "Motivate to Act", + "description": "Persuade, impel, or provoke the target to behave in a specific manner favourable to the attacker. Some common behaviours are joining, subscribing, voting, buying, demonstrating, fighting, retreating, resigning, boycotting.", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0138.md", + "external_id": "T0138" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--95e3e261-2f42-4ff0-a1f9-4eb2c5998284.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--95e3e261-2f42-4ff0-a1f9-4eb2c5998284.json index e67c676..f0df611 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--95e3e261-2f42-4ff0-a1f9-4eb2c5998284.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--95e3e261-2f42-4ff0-a1f9-4eb2c5998284.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--92af1d2e-a39d-4b21-8d3f-cac173cc4104", + "id": "bundle--02a239ab-1987-4ca4-83c4-a7d330a043ee", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--95e3e261-2f42-4ff0-a1f9-4eb2c5998284", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.546413Z", - "modified": "2023-09-25T16:17:56.546413Z", + "created": "2023-09-28T21:25:13.194292Z", + "modified": "2023-09-28T21:25:13.194292Z", "name": "Create Inauthentic Websites", "description": "Create media assets to support inauthentic organisations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877.json index 27e344b..9ebc305 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6ec4d89b-94b3-4b30-b4af-b892a4c12d87", + "id": "bundle--a1a1ca61-1375-4e4a-bb5b-58ddbfc42589", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.6123Z", - "modified": "2023-09-25T16:17:56.6123Z", + "created": "2023-09-28T21:25:13.227892Z", + "modified": "2023-09-28T21:25:13.227892Z", "name": "Reuse Existing Content", "description": "When an operation recycles content from its own previous operations or plagiarises from external operations. An operation may launder information to conserve resources that would have otherwise been utilised to develop new content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab.json index cc1d0f1..8baed6b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7d5f3bf6-1f7f-4b15-b5bf-e1c59e2b23c7", + "id": "bundle--101b7134-7968-4519-b646-97a16c144932", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.62662Z", - "modified": "2023-09-25T16:17:56.62662Z", + "created": "2023-09-28T21:25:13.242187Z", + "modified": "2023-09-28T21:25:13.242187Z", "name": "Recruit Malign Actors", "description": "Operators recruit bad actors paying recruiting, or exerting control over individuals includes trolls, partisans, and contractors.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4.json index e71d455..fdd627d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--efa74b21-0a7a-4837-863f-c1f7a4a7e25b", + "id": "bundle--5e661b9e-3bfd-46f7-9eb2-e2ba412e5750", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.668486Z", - "modified": "2023-09-25T16:17:56.668486Z", + "created": "2023-09-28T21:25:13.268804Z", + "modified": "2023-09-28T21:25:13.268804Z", "name": "Share Memes", "description": "Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020.json index 9880a4c..ed45196 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--fe0dec5b-f703-4319-9e36-b1e6d59ef933", + "id": "bundle--c27ea363-c6cc-4aec-8169-8e052e9da971", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688811Z", - "modified": "2023-09-25T16:17:56.688811Z", + "created": "2023-09-28T21:25:13.278442Z", + "modified": "2023-09-28T21:25:13.278442Z", "name": "Distance Reputable Individuals from Operation", "description": "Distancing reputable individuals from the operation occurs when enlisted individuals, such as celebrities or subject matter experts, actively disengage themselves from operation activities and messaging. Individuals may distance themselves from the operation by deleting old posts or statements, unfollowing operation information assets, or otherwise detaching themselves from the operation\u2019s timeline. An influence operation may want reputable individuals to distance themselves from the operation to reduce operation exposure, particularly if the operation aims to remove all evidence.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2.json index acf0ba5..f546fb7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--86e075ac-6969-46f6-8c86-42e3d7458da5", + "id": "bundle--1a7acf27-5570-465e-8714-4abc793fff57", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.639916Z", - "modified": "2023-09-25T16:17:56.639916Z", + "created": "2023-09-28T21:25:13.254245Z", + "modified": "2023-09-28T21:25:13.254245Z", "name": "Co-Opt Influencers", "description": "Co-opt Influencers", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2.json index 51e009e..c1153b4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--514d5993-0770-424e-95a7-f20c4d18018c", + "id": "bundle--5b5d8638-53f8-4ad4-91f5-962233159bb4", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.637469Z", - "modified": "2023-09-25T16:17:56.637469Z", + "created": "2023-09-28T21:25:13.252368Z", + "modified": "2023-09-28T21:25:13.252368Z", "name": "Spoof/Parody Account/Site", "description": "An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognisable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organisations, or state entities.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d.json index 280c704..f2473d1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--422a901a-df10-4d71-9a39-de9af91c948f", + "id": "bundle--1ac2fddc-3c33-473c-8d1f-434206949d04", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.683782Z", - "modified": "2023-09-25T16:17:56.683782Z", + "created": "2023-09-28T21:25:13.274682Z", + "modified": "2023-09-28T21:25:13.274682Z", "name": "Block Content", "description": "Content blocking refers to actions taken to restrict internet access or render certain areas of the internet inaccessible. An influence operation may restrict content based on both network and content attributes.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745.json index fbcc6b0..0139327 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--5652bd21-0358-4bfb-96d5-36e985baab19", + "id": "bundle--11884a99-bcac-461e-8a41-a764abefd26b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.593542Z", - "modified": "2023-09-25T16:17:56.593542Z", + "created": "2023-09-28T21:25:13.219588Z", + "modified": "2023-09-28T21:25:13.219588Z", "name": "Discredit Credible Sources", "description": "Plan to delegitimize the media landscape and degrade public trust in reporting, by discrediting credible sources. This makes it easier to promote influence operation content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b6b3dea-54ac-4e00-bd92-380555205afe.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b6b3dea-54ac-4e00-bd92-380555205afe.json index fa87ab6..ad96d1e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b6b3dea-54ac-4e00-bd92-380555205afe.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9b6b3dea-54ac-4e00-bd92-380555205afe.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4f8d456e-1d86-403f-9bb0-855b1e23aa71", + "id": "bundle--3db186aa-93e3-4f76-ad40-8012e853f9b8", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9b6b3dea-54ac-4e00-bd92-380555205afe", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.652178Z", - "modified": "2023-09-25T16:17:56.652178Z", + "created": "2023-09-28T21:25:13.260838Z", + "modified": "2023-09-28T21:25:13.260838Z", "name": "Discussion Forums", "description": "Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c01fab2-42dc-423b-96fe-a478a29e5b81.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c01fab2-42dc-423b-96fe-a478a29e5b81.json new file mode 100644 index 0000000..c18473c --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c01fab2-42dc-423b-96fe-a478a29e5b81.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--d440eb3a-6d82-4e3e-9edd-2a6459e21456", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--9c01fab2-42dc-423b-96fe-a478a29e5b81", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.299295Z", + "modified": "2023-09-28T21:25:13.299295Z", + "name": "Defame", + "description": "Attempt to damage the target\u2019s personal reputation by impugning their character. This can range from subtle attempts to misrepresent or insinuate, to obvious attempts to denigrate or disparage, to blatant attempts to malign or vilify. Slander applies to oral expression. Libel applies to written or pictorial material. Defamation is often carried out by online trolls. The sole aim here is to cause harm to the target. If the threat actor uses defamation as a means of undermining the target, then choose sub-technique \u201cSmear\u201d of technique \u201cUndermine\u201d instead. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0140.001.md", + "external_id": "T0140.001" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9cf02828-bd4c-4b04-a9f0-bb67ec3b0493.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9cf02828-bd4c-4b04-a9f0-bb67ec3b0493.json index a3cb516..f42a968 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9cf02828-bd4c-4b04-a9f0-bb67ec3b0493.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9cf02828-bd4c-4b04-a9f0-bb67ec3b0493.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--b80a918d-7a97-4b86-8385-9c76b68ccd51", + "id": "bundle--81faea92-2ee5-4a46-968a-c4afd56650d2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9cf02828-bd4c-4b04-a9f0-bb67ec3b0493", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.541562Z", - "modified": "2023-09-25T16:17:56.541562Z", + "created": "2023-09-28T21:25:13.19059Z", + "modified": "2023-09-28T21:25:13.19059Z", "name": "Leverage Existing Narratives", "description": "Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9e80abf9-0991-47c3-982c-b33e66640d10.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9e80abf9-0991-47c3-982c-b33e66640d10.json index 051e0dc..b8ad171 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9e80abf9-0991-47c3-982c-b33e66640d10.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9e80abf9-0991-47c3-982c-b33e66640d10.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--517fadb2-1a4f-41a6-b896-d119a25e1f5a", + "id": "bundle--1228a23c-2c6c-4637-91c5-c7b2559b4b92", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9e80abf9-0991-47c3-982c-b33e66640d10", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.594475Z", - "modified": "2023-09-25T16:17:56.594475Z", + "created": "2023-09-28T21:25:13.220627Z", + "modified": "2023-09-28T21:25:13.220627Z", "name": "Distract", "description": "Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they\u2019ve accused you of (e.g. police brutality).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166.json index 611ba83..1ae07a5 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--96770b4c-392e-4185-9979-19098c7225fe", + "id": "bundle--5d99dbb9-c10c-44d5-8899-fc037e734e5a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.601851Z", - "modified": "2023-09-25T16:17:56.601851Z", + "created": "2023-09-28T21:25:13.222626Z", + "modified": "2023-09-28T21:25:13.222626Z", "name": "Monitor Social Media Analytics", "description": "An influence operation may use social media analytics to determine which factors will increase the operation content\u2019s exposure to its target audience on social media platforms, including views, interactions, and sentiment relating to topics and content types. The social media platform itself or a third-party tool may collect the metrics.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb.json index 9e0e835..f2b5beb 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3655e546-6a43-4a3a-ae4a-7430819ee4f1", + "id": "bundle--f801ebb9-e614-4433-a8be-4d5ffb1f3456", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.697341Z", - "modified": "2023-09-25T16:17:56.697341Z", + "created": "2023-09-28T21:25:13.284619Z", + "modified": "2023-09-28T21:25:13.284619Z", "name": "Conceal Sponsorship", "description": "Concealing sponsorship aims to mislead or obscure the identity of the hidden sponsor behind an operation rather than entity publicly running the operation. Operations that conceal sponsorship may maintain visible falsified groups, news outlets, non-profits, or other organisations, but seek to mislead or obscure the identity sponsoring, funding, or otherwise supporting these entities. Influence operations may use a variety of techniques to mask the location of their social media accounts to complicate attribution and conceal evidence of foreign interference. Operation accounts may set their location to a false place, often the location of the operation\u2019s target audience, and post in the region\u2019s language", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9.json index 6996d74..846afd4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--aaa67caa-7fcb-41fd-b5d3-a5c484aa35b7", + "id": "bundle--7d449efd-1211-4de5-aa8d-30aa2498f23a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.69086Z", - "modified": "2023-09-25T16:17:56.69086Z", + "created": "2023-09-28T21:25:13.280245Z", + "modified": "2023-09-28T21:25:13.280245Z", "name": "Delete URLs", "description": "URL deletion occurs when an influence operation completely removes its website registration, rendering the URL inaccessible. An influence operation may delete its URLs to complicate attribution or remove online documentation that the operation ever occurred.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4.json index b1bbb1f..d55e74f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--9d91d0f7-626a-42ae-aeca-d97c663fd9c7", + "id": "bundle--ba186b33-e2d6-4cca-a8ef-490d0fb59a39", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.649209Z", - "modified": "2023-09-25T16:17:56.649209Z", + "created": "2023-09-28T21:25:13.258181Z", + "modified": "2023-09-28T21:25:13.258181Z", "name": "Interest-Based Networks", "description": "Examples include smaller and niche networks including Gettr, Truth Social, Parler, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68.json index 642705f..152024a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e2e6d326-3446-4f86-a276-0db37244d8f0", + "id": "bundle--0f66521c-a8c9-4b14-a55d-48f5f0c5af67", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.614129Z", - "modified": "2023-09-25T16:17:56.614129Z", + "created": "2023-09-28T21:25:13.228888Z", + "modified": "2023-09-28T21:25:13.228888Z", "name": "Plagiarise Content", "description": "An influence operation may take content from other sources without proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86.json index 1114814..bfc6ec5 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8ed6075e-5e02-4b88-b8f3-bc1e41df6e9d", + "id": "bundle--a36f2a60-b5d4-4e72-92f1-5737543f78d5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.587334Z", - "modified": "2023-09-25T16:17:56.587334Z", + "created": "2023-09-28T21:25:13.217051Z", + "modified": "2023-09-28T21:25:13.217051Z", "name": "Political Segmentation", "description": "An influence operation may target populations based on their political affiliations, especially when aiming to manipulate voting or change policy.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa.json index ff0ffdb..4c7953d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--895f2234-d795-4cc8-a8b4-2a2c49331c24", + "id": "bundle--1798fcce-1d38-4ca7-9af2-9a298cb3f276", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.638395Z", - "modified": "2023-09-25T16:17:56.638395Z", + "created": "2023-09-28T21:25:13.253297Z", + "modified": "2023-09-28T21:25:13.253297Z", "name": "Co-Opt Trusted Individuals", "description": "Co-Opt Trusted Individuals", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4.json index 13d77ad..484fe57 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e0b13916-54bd-4560-bc20-aba8d7229a20", + "id": "bundle--ee250e81-e413-4e74-a7af-bc22a38de77a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.617557Z", - "modified": "2023-09-25T16:17:56.617557Z", + "created": "2023-09-28T21:25:13.232905Z", + "modified": "2023-09-28T21:25:13.232905Z", "name": "Develop Memes", "description": "Memes are one of the most important single artefact types in all of computational propaganda. Memes in this framework denotes the narrow image-based definition. But that naming is no accident, as these items have most of the important properties of Dawkins' original conception as a self-replicating unit of culture. Memes pull together reference and commentary; image and narrative; emotion and message. Memes are a powerful tool and the heart of modern influence campaigns.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c.json index 163b7c7..6669981 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6ca88775-51aa-4bbb-8cb7-00d108e5ffc5", + "id": "bundle--73231c6b-2a95-4275-8b84-c9ba51c6a67d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.70427Z", - "modified": "2023-09-25T16:17:56.70427Z", + "created": "2023-09-28T21:25:13.289032Z", + "modified": "2023-09-28T21:25:13.289032Z", "name": "Behaviour Changes", "description": "Monitor and evaluate behaviour changes from misinformation incidents.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4.json index 71b7a08..60c421b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--72538d3f-441b-4f4c-b1ba-a862a530afe3", + "id": "bundle--62feab5d-3c84-4997-a43c-d7c8cb062244", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.630373Z", - "modified": "2023-09-25T16:17:56.630373Z", + "created": "2023-09-28T21:25:13.243711Z", + "modified": "2023-09-28T21:25:13.243711Z", "name": "Create Community or Sub-Group", "description": "When there is not an existing community or sub-group that meets a campaign's goals, an influence operation may seek to create a community or sub-group.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--acab804f-184f-4602-9201-5e518bc72202.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--acab804f-184f-4602-9201-5e518bc72202.json new file mode 100644 index 0000000..225e6f5 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--acab804f-184f-4602-9201-5e518bc72202.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--e472c8e9-909c-499f-967b-4fba53d00597", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--acab804f-184f-4602-9201-5e518bc72202", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.294002Z", + "modified": "2023-09-28T21:25:13.294002Z", + "name": "Cultivate Support for Ally", + "description": "Elevate or fortify the public backing for a partner. Governments may interfere in other countries\u2019 elections by covertly favouring a party or candidate aligned with their interests. They may also mount an influence operation to bolster the reputation of an ally under attack. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.006.md", + "external_id": "T0136.006" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--acc70582-c43a-4ed1-ab78-19e56ad4d4ed.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--acc70582-c43a-4ed1-ab78-19e56ad4d4ed.json new file mode 100644 index 0000000..9b49566 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--acc70582-c43a-4ed1-ab78-19e56ad4d4ed.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--5953331b-e834-4460-8abe-154e1eb11eee", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--acc70582-c43a-4ed1-ab78-19e56ad4d4ed", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.297073Z", + "modified": "2023-09-28T21:25:13.297073Z", + "name": "Encourage", + "description": "Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0138.001.md", + "external_id": "T0138.001" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad0ef979-9552-4906-8006-077db6789103.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad0ef979-9552-4906-8006-077db6789103.json new file mode 100644 index 0000000..5e3a69c --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad0ef979-9552-4906-8006-077db6789103.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--54ddb404-0064-41ca-b78e-afc5b93c00e6", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ad0ef979-9552-4906-8006-077db6789103", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.299857Z", + "modified": "2023-09-28T21:25:13.299857Z", + "name": "Spread Hate", + "description": "Publish and/or propagate demeaning, derisive, or humiliating content targeting an individual or group of individuals with the intent to cause emotional, psychological, or physical distress. Hate speech can cause harm directly or incite others to harm the target. It often aims to stigmatise the target by singling out immutable characteristics such as colour, race, religion, national or ethnic origin, gender, gender identity, sexual orientation, age, disease, or mental or physical disability. Thus, promoting hatred online may involve racism, antisemitism, Islamophobia, xenophobia, sexism, misogyny, homophobia, transphobia, ageism, ableism, or any combination thereof. Motivations for hate speech range from group preservation to ideological superiority to the unbridled infliction of suffering. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0140.003.md", + "external_id": "T0140.003" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad410829-2fb3-490b-b470-f5f859d45942.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad410829-2fb3-490b-b470-f5f859d45942.json index dc26674..2a3cb12 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad410829-2fb3-490b-b470-f5f859d45942.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad410829-2fb3-490b-b470-f5f859d45942.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0ec751f5-acb4-4ab7-8f0f-28a94b56c32f", + "id": "bundle--b1f1a94d-df1b-4365-8318-ed9eb78a5b38", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ad410829-2fb3-490b-b470-f5f859d45942", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.581025Z", - "modified": "2023-09-25T16:17:56.581025Z", + "created": "2023-09-28T21:25:13.212724Z", + "modified": "2023-09-28T21:25:13.212724Z", "name": "Continue to Amplify", "description": "continue narrative or message amplification after the main incident work has finished", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c.json index d9bc0df..731e1f2 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8a62bbec-e1ea-48e8-b429-e79a36f0dc64", + "id": "bundle--83dd141c-b669-4041-b82c-c7959b8ef5e5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.631807Z", - "modified": "2023-09-25T16:17:56.631807Z", + "created": "2023-09-28T21:25:13.245794Z", + "modified": "2023-09-28T21:25:13.245794Z", "name": "Infiltrate Existing Networks", "description": "Operators deceptively insert social assets into existing networks as group members in order to influence the members of the network and the wider information environment that the network impacts.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--afb60a6d-8299-4b2c-abda-6e11e4a65a4b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--afb60a6d-8299-4b2c-abda-6e11e4a65a4b.json new file mode 100644 index 0000000..f0550d0 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--afb60a6d-8299-4b2c-abda-6e11e4a65a4b.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--dabee8c8-8e0d-4457-9615-80c317961e68", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--afb60a6d-8299-4b2c-abda-6e11e4a65a4b", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.292524Z", + "modified": "2023-09-28T21:25:13.292524Z", + "name": "Justify Action", + "description": "To convince others to exonerate you of a perceived wrongdoing. When an actor finds it untenable to deny doing something, they may attempt to exonerate themselves with disinformation which claims the action was reasonable. This is a special case of \u201cDefend Reputation\u201d. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.002.md", + "external_id": "T0136.002" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7.json index 1824ecc..2d25e9c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--60669336-2f0a-447d-b0b8-21dfb56b789b", + "id": "bundle--17d04a57-d9ab-454d-b58c-3de6ec7591f5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.624865Z", - "modified": "2023-09-25T16:17:56.624865Z", + "created": "2023-09-28T21:25:13.241564Z", + "modified": "2023-09-28T21:25:13.241564Z", "name": "Create Bot Accounts", "description": "Bots refer to autonomous internet users that interact with systems or other users while imitating traditional human behaviour. Bots use a variety of tools to stay active without direct human operation, including artificial intelligence and big data analytics. For example, an individual may programme a Twitter bot to retweet a tweet every time it contains a certain keyword or hashtag. An influence operation may use bots to increase its exposure and artificially promote its content across the internet without dedicating additional time or human resources. Amplifier bots promote operation content through reposts, shares, and likes to increase the content\u2019s online popularity. Hacker bots are traditionally covert bots running on computer scripts that rarely engage with users and work primarily as agents of larger cyberattacks, such as a Distributed Denial of Service attacks. Spammer bots are programmed to post content on social media or in comment sections, usually as a supplementary tool. Impersonator bots102 pose as real people by mimicking human behaviour, complicating their detection.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2a7561a-28ad-426c-a249-f415b5f11cee.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2a7561a-28ad-426c-a249-f415b5f11cee.json index 0f08c95..bbbf569 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2a7561a-28ad-426c-a249-f415b5f11cee.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b2a7561a-28ad-426c-a249-f415b5f11cee.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--2634736f-af9f-4ea9-80da-ab77591d9167", + "id": "bundle--43acb4af-cad3-4f39-9a4e-85e50a99a0cb", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--b2a7561a-28ad-426c-a249-f415b5f11cee", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.584482Z", - "modified": "2023-09-25T16:17:56.584482Z", + "created": "2023-09-28T21:25:13.214046Z", + "modified": "2023-09-28T21:25:13.214046Z", "name": "Respond to Breaking News Event or Active Crisis", "description": "Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumours, and conspiracy theories, which are all vulnerable to manipulation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b3bb61ca-5472-42b0-807e-bd8657fc05b2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b3bb61ca-5472-42b0-807e-bd8657fc05b2.json index 06279ec..616ca85 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b3bb61ca-5472-42b0-807e-bd8657fc05b2.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b3bb61ca-5472-42b0-807e-bd8657fc05b2.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a66aec44-f24d-475a-b415-c41e83a20bc8", + "id": "bundle--11a86bba-6125-47ce-9b2f-9eaaebe2e558", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--b3bb61ca-5472-42b0-807e-bd8657fc05b2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.582525Z", - "modified": "2023-09-25T16:17:56.582525Z", + "created": "2023-09-28T21:25:13.212997Z", + "modified": "2023-09-28T21:25:13.212997Z", "name": "Prepare Physical Broadcast Capabilities", "description": "Create or coopt broadcast capabilities (e.g. TV, radio etc).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b.json index c1e8d22..024270e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--70c984bf-8aa4-437c-a601-8d68282a751e", + "id": "bundle--d8d105a8-cd5a-43b3-b7d2-d7bc67d241eb", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.63922Z", - "modified": "2023-09-25T16:17:56.63922Z", + "created": "2023-09-28T21:25:13.253721Z", + "modified": "2023-09-28T21:25:13.253721Z", "name": "Co-Opt Grassroots Groups", "description": "Co-Opt Grassroots Groups", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b463442a-ee7a-4ddb-83fe-c1de27b65c43.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b463442a-ee7a-4ddb-83fe-c1de27b65c43.json new file mode 100644 index 0000000..422a4a4 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b463442a-ee7a-4ddb-83fe-c1de27b65c43.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--77904a40-b3e2-4172-a2da-f3ff1d837248", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--b463442a-ee7a-4ddb-83fe-c1de27b65c43", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.218047Z", + "modified": "2023-09-28T21:25:13.218047Z", + "name": "Economic Advantage", + "description": "Favourable position domestically or internationally in the realms of commerce, trade, finance, industry. Economics involves nation-states, corporations, banks, trade blocs, industry associations, cartels. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-strategy" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0074.003.md", + "external_id": "T0074.003" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c.json index fe5e552..d734e97 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--bdc3ba08-8c9d-4d7f-bcc5-5a620b27d880", + "id": "bundle--39d120e6-c8ed-4266-bf26-7761ec0b14be", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.552273Z", - "modified": "2023-09-25T16:17:56.552273Z", + "created": "2023-09-28T21:25:13.199668Z", + "modified": "2023-09-28T21:25:13.199668Z", "name": "Amplify Existing Conspiracy Theory Narratives", "description": "An influence operation may amplify an existing conspiracy theory narrative that aligns with its incident or campaign goals. By amplifying existing conspiracy theory narratives, operators can leverage the power of the existing communities that support and propagate those theories without needing to expend resources creating new narratives or building momentum and buy in around new narratives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b602bd0a-6b29-4f87-8093-55c879f588ec.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b602bd0a-6b29-4f87-8093-55c879f588ec.json new file mode 100644 index 0000000..61d8a13 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b602bd0a-6b29-4f87-8093-55c879f588ec.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--0ef07b07-c9a8-4787-a769-b7ac36999c8e", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--b602bd0a-6b29-4f87-8093-55c879f588ec", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.298433Z", + "modified": "2023-09-28T21:25:13.298433Z", + "name": "Silence", + "description": "Intimidate or incentivise target into remaining silent or prevent target from speaking out. A threat actor may cow a target into silence as a special case of deterrence. Or they may buy the target\u2019s silence. Or they may repress or restrict the target\u2019s speech. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0139.002.md", + "external_id": "T0139.002" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39.json index 9762c22..6d99547 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--683ff89e-af6c-4cf5-bb17-6f48df2e4e31", + "id": "bundle--ebf20341-3807-4c24-b379-895bd3980650", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.698186Z", - "modified": "2023-09-25T16:17:56.698186Z", + "created": "2023-09-28T21:25:13.285674Z", + "modified": "2023-09-28T21:25:13.285674Z", "name": "Use Shell Organisations", "description": "Use Shell Organisations to conceal sponsorship.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b69275ef-ba3d-409f-a857-40d4d1870dca.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b69275ef-ba3d-409f-a857-40d4d1870dca.json index 426f73f..540c0fe 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b69275ef-ba3d-409f-a857-40d4d1870dca.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b69275ef-ba3d-409f-a857-40d4d1870dca.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--9e49efbb-8288-4d5c-8082-5bd1a0d09623", + "id": "bundle--63c0e6ef-c461-4698-9759-d0f347e8e166", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--b69275ef-ba3d-409f-a857-40d4d1870dca", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.65295Z", - "modified": "2023-09-25T16:17:56.65295Z", + "created": "2023-09-28T21:25:13.261742Z", + "modified": "2023-09-28T21:25:13.261742Z", "name": "Bookmarking and Content Curation", "description": "Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b8a49b7d-5a2e-44ff-9c18-6f6501231f15.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b8a49b7d-5a2e-44ff-9c18-6f6501231f15.json new file mode 100644 index 0000000..4d7fd5f --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b8a49b7d-5a2e-44ff-9c18-6f6501231f15.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--42d91c3c-89c5-4870-af9c-b9ca1400823d", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--b8a49b7d-5a2e-44ff-9c18-6f6501231f15", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.294332Z", + "modified": "2023-09-28T21:25:13.294332Z", + "name": "Recruit Members", + "description": "Motivate followers to join or subscribe as members of the team. Organisations may mount recruitment drives that use propaganda to entice sympathisers to sign up. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.007.md", + "external_id": "T0136.007" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bacbdfd3-f8c2-4126-a9f3-1b75576fa5e7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bacbdfd3-f8c2-4126-a9f3-1b75576fa5e7.json index a6e1252..f218d6c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bacbdfd3-f8c2-4126-a9f3-1b75576fa5e7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bacbdfd3-f8c2-4126-a9f3-1b75576fa5e7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a17c31bd-6566-4daa-bea2-d3f9cfb706c2", + "id": "bundle--5c108ebb-4363-4c7f-80bb-83cb4e0d5d4d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bacbdfd3-f8c2-4126-a9f3-1b75576fa5e7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.544349Z", - "modified": "2023-09-25T16:17:56.544349Z", + "created": "2023-09-28T21:25:13.193213Z", + "modified": "2023-09-28T21:25:13.193213Z", "name": "Cultivate Ignorant Agents", "description": "Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state\u2019s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as \"useful idiots\" or \"unwitting agents\".", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6.json index 39aff10..04da77b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e6d61a94-557a-40c2-94df-343217853e3a", + "id": "bundle--c07ff311-3d5e-425f-89e4-7a0ca285ea69", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.688166Z", - "modified": "2023-09-25T16:17:56.688166Z", + "created": "2023-09-28T21:25:13.277655Z", + "modified": "2023-09-28T21:25:13.277655Z", "name": "Conceal Information Assets", "description": "Conceal the identity or provenance of campaign information assets such as accounts, channels, pages etc. to avoid takedown and attribution.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46.json index d187a99..880b93f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--bec27d78-1bf9-449b-b2c1-a3d0e932c6b0", + "id": "bundle--1ced6e16-e4ec-4d34-9e55-bb3ae59422cc", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.645337Z", - "modified": "2023-09-25T16:17:56.645337Z", + "created": "2023-09-28T21:25:13.256038Z", + "modified": "2023-09-28T21:25:13.256038Z", "name": "Create Echo Chambers/Filter Bubbles", "description": "Create Echo Chambers/Filter Bubbles", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba.json index db1ad6d..2391dee 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--5a74cec1-d988-4b3a-92ed-ecd3a6c50798", + "id": "bundle--18340e29-4bca-40e9-aa78-58a70c2707e6", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.621872Z", - "modified": "2023-09-25T16:17:56.621872Z", + "created": "2023-09-28T21:25:13.238861Z", + "modified": "2023-09-28T21:25:13.238861Z", "name": "Create Inauthentic Documents", "description": "Create inauthentic documents intended to appear as if they are authentic non-public documents. These documents can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661.json index acca828..77e2ddf 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c8297efb-0b46-466b-9ce3-4a414785ec85", + "id": "bundle--f558b836-5337-4444-91c9-0cf26810d7f3", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.611284Z", - "modified": "2023-09-25T16:17:56.611284Z", + "created": "2023-09-28T21:25:13.227215Z", + "modified": "2023-09-28T21:25:13.227215Z", "name": "Identify Media System Vulnerabilities", "description": "An influence operation may exploit existing weaknesses in a target\u2019s media system. These weaknesses may include existing biases among media agencies, vulnerability to false news agencies on social media, or existing distrust of traditional media sources. An existing distrust among the public in the media system\u2019s credibility holds high potential for exploitation by an influence operation when establishing alternative news agencies to spread operation content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132.json index c33b3dd..0f42624 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3bc123cc-b8c0-4a5d-a81b-85210f914db5", + "id": "bundle--24a7bb49-9370-45e2-8d2e-bef184e723d0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.703765Z", - "modified": "2023-09-25T16:17:56.703765Z", + "created": "2023-09-28T21:25:13.288832Z", + "modified": "2023-09-28T21:25:13.288832Z", "name": "Measure Effectiveness", "description": "A metric used to measure a current system state. \u201cAre we on track to achieve the intended new system state within the planned timescale?\u201d", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835.json index b4267ce..1345b00 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--95c3fc87-7435-4aae-8216-a46fdfb04511", + "id": "bundle--51f16e01-ddc2-4041-b0c4-1ace51e2a411", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.564812Z", - "modified": "2023-09-25T16:17:56.564812Z", + "created": "2023-09-28T21:25:13.20799Z", + "modified": "2023-09-28T21:25:13.20799Z", "name": "Harass", "description": "Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd1295e0-67b2-419d-b2b4-a832552dbcc6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd1295e0-67b2-419d-b2b4-a832552dbcc6.json index ed05164..a9dcb74 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd1295e0-67b2-419d-b2b4-a832552dbcc6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd1295e0-67b2-419d-b2b4-a832552dbcc6.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ea8d38b5-d8ad-4965-a009-b922c1cb1193", + "id": "bundle--9bd0cd35-ffee-45f2-863f-07a636d8b149", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bd1295e0-67b2-419d-b2b4-a832552dbcc6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.560686Z", - "modified": "2023-09-25T16:17:56.560686Z", + "created": "2023-09-28T21:25:13.203875Z", + "modified": "2023-09-28T21:25:13.203875Z", "name": "Seed Kernel of Truth", "description": "Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159.json index cb83027..37757bb 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--19ffb78a-9cff-44a4-b014-e72c61eb44ca", + "id": "bundle--05ac0b59-e461-4cc8-b8ad-0dceab66ba3f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.588791Z", - "modified": "2023-09-25T16:17:56.588791Z", + "created": "2023-09-28T21:25:13.217367Z", + "modified": "2023-09-28T21:25:13.217367Z", "name": "Determine Strategic Ends", "description": "These are the long-term end-states the campaign aims to bring about. They typically involve an advantageous position vis-a-vis competitors in terms of power or influence. The strategic goal may be to improve or simply to hold one\u2019s position. Competition occurs in the public sphere in the domains of war, diplomacy, politics, economics, and ideology, and can play out between armed groups, nation-states, political parties, corporations, interest groups, or individuals. ", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2.json index ff24a50..1c33af1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6857982f-a332-4877-8e40-080be6e7a181", + "id": "bundle--3f72857f-1333-4d11-92ff-3c439f53b967", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.570845Z", - "modified": "2023-09-25T16:17:56.570845Z", + "created": "2023-09-28T21:25:13.210877Z", + "modified": "2023-09-28T21:25:13.210877Z", "name": "Hijack Existing Hashtag", "description": "Take over an existing hashtag to drive exposure.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c1182f49-4318-486f-81be-d44b99300343.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c1182f49-4318-486f-81be-d44b99300343.json index 173bd94..049c584 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c1182f49-4318-486f-81be-d44b99300343.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c1182f49-4318-486f-81be-d44b99300343.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--2b28687a-805f-4089-8e30-1b9d8d15f186", + "id": "bundle--86ce3fed-b02a-4c77-a96a-e20269aab38a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c1182f49-4318-486f-81be-d44b99300343", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.630744Z", - "modified": "2023-09-25T16:17:56.630744Z", + "created": "2023-09-28T21:25:13.244257Z", + "modified": "2023-09-28T21:25:13.244257Z", "name": "Acquire/Recruit Network", "description": "Operators acquire an existing network by paying, recruiting, or exerting control over the leaders of the existing network.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357.json index 6290e52..e643f1e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--720d1e3b-25c7-4077-b33f-46f4897581f0", + "id": "bundle--e8818de7-2f10-41c3-94b7-a2b3a178af7f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.702386Z", - "modified": "2023-09-25T16:17:56.702386Z", + "created": "2023-09-28T21:25:13.28818Z", + "modified": "2023-09-28T21:25:13.28818Z", "name": "Measure Performance", "description": "A metric used to determine the accomplishment of actions. \u201cAre the actions being executed as planned?\u201d", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c2397671-33fb-4486-ad90-50653a169781.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c2397671-33fb-4486-ad90-50653a169781.json new file mode 100644 index 0000000..b75c183 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c2397671-33fb-4486-ad90-50653a169781.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--7bd37606-235c-4ab1-a8c4-d9d0bb0cb4c6", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--c2397671-33fb-4486-ad90-50653a169781", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.293628Z", + "modified": "2023-09-28T21:25:13.293628Z", + "name": "Cultvate Support for Initiative", + "description": "Elevate or fortify the public backing for a policy, operation, or idea. Domestic and foreign actors can use artificial means to fabricate or amplify public support for a proposal or action. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.005.md", + "external_id": "T0136.005" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37.json index 95aad0e..7fa3254 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7634acc4-011d-4c1e-9077-04da054d9058", + "id": "bundle--8b1dfa5a-2f5f-4cc7-a59e-2cb4026d76da", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.611937Z", - "modified": "2023-09-25T16:17:56.611937Z", + "created": "2023-09-28T21:25:13.227652Z", + "modified": "2023-09-28T21:25:13.227652Z", "name": "Integrate Target Audience Vulnerabilities into Narrative", "description": "An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation\u2019s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e.json index 0ebeacb..a391527 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7e17f21a-e913-4391-befb-a11589e39a42", + "id": "bundle--d638e19b-53a6-4891-a98c-5ddf1ede1aa7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.703414Z", - "modified": "2023-09-25T16:17:56.703414Z", + "created": "2023-09-28T21:25:13.28864Z", + "modified": "2023-09-28T21:25:13.28864Z", "name": "View Focused", "description": "View Focused", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930.json index 3dcc126..01a8a89 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--76e02b88-dd75-45a8-b84e-2f174eff7206", + "id": "bundle--33629583-b133-4b39-a0e1-802b66e93ecd", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.651958Z", - "modified": "2023-09-25T16:17:56.651958Z", + "created": "2023-09-28T21:25:13.260345Z", + "modified": "2023-09-28T21:25:13.260345Z", "name": "Audio Sharing", "description": "Examples include podcasting apps, Soundcloud, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c28a0edd-a7af-4651-8e11-8e7284009174.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c28a0edd-a7af-4651-8e11-8e7284009174.json new file mode 100644 index 0000000..25a2c6e --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c28a0edd-a7af-4651-8e11-8e7284009174.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--99a68f23-ea7b-45be-a0b3-71e08464e959", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--c28a0edd-a7af-4651-8e11-8e7284009174", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.292228Z", + "modified": "2023-09-28T21:25:13.292228Z", + "name": "Defend Reputaton", + "description": "Preserve a positive perception in the public\u2019s mind following an accusation or adverse event. When accused of a wrongful act, an actor may engage in denial, counter accusations, whataboutism, or conspiracy theories to distract public attention and attempt to maintain a positive image. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.001.md", + "external_id": "T0136.001" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425.json index 0edf722..08cbb82 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--59554911-5873-49ba-8229-14a72c8743f7", + "id": "bundle--073151db-cac5-433a-9f60-621575b31d8d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.68496Z", - "modified": "2023-09-25T16:17:56.68496Z", + "created": "2023-09-28T21:25:13.275608Z", + "modified": "2023-09-28T21:25:13.275608Z", "name": "Report Non-Violative Opposing Content", "description": "Reporting opposing content refers to notifying and providing an instance of a violation of a platform\u2019s guidelines and policies for conduct on the platform. In addition to simply reporting the content, an operation may leverage copyright regulations to trick social media and web platforms into removing opposing content by manipulating the content to appear in violation of copyright laws. Reporting opposing content facilitates the suppression of contradictory information and allows operation narratives to take priority in the information space.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625.json index 2c5faa3..e5fdb86 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c7a4867f-44f9-4ee4-b36a-7b26437ea139", + "id": "bundle--b9f7cc66-4b76-4975-bdc6-1185bedb125d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.629289Z", - "modified": "2023-09-25T16:17:56.629289Z", + "created": "2023-09-28T21:25:13.242875Z", + "modified": "2023-09-28T21:25:13.242875Z", "name": "Build Network", "description": "Operators build their own network, creating links between accounts -- whether authentic or inauthentic -- in order amplify and promote narratives and artefacts, and encourage further growth of ther network, as well as the ongoing sharing and engagement with operational content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5.json index 5b52400..69f679d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--d98cd3d1-9af6-4455-b5ee-856bd293952d", + "id": "bundle--f6fd79ff-671f-4d54-8f98-00b29e1a727b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.619404Z", - "modified": "2023-09-25T16:17:56.619404Z", + "created": "2023-09-28T21:25:13.235323Z", + "modified": "2023-09-28T21:25:13.235323Z", "name": "Develop AI-Generated Videos (Deepfakes)", "description": "Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual\u2019s face, body, voice, and physical gestures.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c54dd9c4-5b7b-47a9-bb40-e63967b2ec33.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c54dd9c4-5b7b-47a9-bb40-e63967b2ec33.json index 65f3b8d..6e5d1dc 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c54dd9c4-5b7b-47a9-bb40-e63967b2ec33.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c54dd9c4-5b7b-47a9-bb40-e63967b2ec33.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--cd23046a-5537-4c89-91cc-276dd8739fbf", + "id": "bundle--a343186b-5a3d-488c-9bc8-d4c824e172f2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c54dd9c4-5b7b-47a9-bb40-e63967b2ec33", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.663415Z", - "modified": "2023-09-25T16:17:56.663415Z", + "created": "2023-09-28T21:25:13.265873Z", + "modified": "2023-09-28T21:25:13.265873Z", "name": "Email", "description": "Delivering content and narratives via email. This can include using list management or high-value individually targeted messaging.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c7017017-4965-4dad-a970-e748b7080a19.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c7017017-4965-4dad-a970-e748b7080a19.json index 796bbb7..b9165f1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c7017017-4965-4dad-a970-e748b7080a19.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c7017017-4965-4dad-a970-e748b7080a19.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--82c9fd97-0d92-4e45-b1f0-8b5ab4b118ec", + "id": "bundle--04b0bac0-17d7-4d70-81e7-deba3d598eb9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c7017017-4965-4dad-a970-e748b7080a19", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.631463Z", - "modified": "2023-09-25T16:17:56.631463Z", + "created": "2023-09-28T21:25:13.245253Z", + "modified": "2023-09-28T21:25:13.245253Z", "name": "Acquire Botnets", "description": "A botnet is a group of bots that can function in coordination with each other.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec.json index e8d6d6a..4ba2cdc 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--be49fe60-7e92-4f32-8a1a-e23a55f1c8f6", + "id": "bundle--f582fcf6-1a98-477d-aa9b-4724ff7eae87", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.604787Z", - "modified": "2023-09-25T16:17:56.604787Z", + "created": "2023-09-28T21:25:13.223592Z", + "modified": "2023-09-28T21:25:13.223592Z", "name": "Assess Degree/Type of Media Access", "description": "An influence operation may survey a target audience\u2019s Internet availability and degree of media freedom to determine which target audience members will have access to operation content and on which platforms. An operation may face more difficulty targeting an information environment with heavy restrictions and media control than an environment with independent media, freedom of speech and of the press, and individual liberties.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56.json index d0fbcb8..7a840fc 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8ea50b48-dda0-4f9f-8855-e92057aa68ac", + "id": "bundle--adfa29dc-e815-43a8-bc30-4d5d0b26c5aa", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.699472Z", - "modified": "2023-09-25T16:17:56.699472Z", + "created": "2023-09-28T21:25:13.287453Z", + "modified": "2023-09-28T21:25:13.287453Z", "name": "Exploit TOS/Content Moderation", "description": "Exploiting weaknesses in platforms' terms of service and content moderation policies to avoid takedowns and platform actions.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53.json index 86be089..c9dd56c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0149b1e9-3d91-4dca-a1fe-6166eabec150", + "id": "bundle--f1453378-cf4b-4ea7-ba38-e64e77d4dd7d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.698575Z", - "modified": "2023-09-25T16:17:56.698575Z", + "created": "2023-09-28T21:25:13.28615Z", + "modified": "2023-09-28T21:25:13.28615Z", "name": "Use Cryptocurrency", "description": "Use Cryptocurrency to conceal sponsorship. Examples include Bitcoin, Monero, and Etherium.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ca3d3bb7-d3eb-4c2b-9b83-8b8579185636.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ca3d3bb7-d3eb-4c2b-9b83-8b8579185636.json new file mode 100644 index 0000000..62b3036 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ca3d3bb7-d3eb-4c2b-9b83-8b8579185636.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--d76441a3-95a6-48a1-a2a3-80efa771b461", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ca3d3bb7-d3eb-4c2b-9b83-8b8579185636", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.29074Z", + "modified": "2023-09-28T21:25:13.29074Z", + "name": "Smear", + "description": "Denigrate, disparage, or discredit an opponent. This is a common tactical objective in political campaigns with a larger strategic goal. It differs from efforts to harm a target through defamation. If there is no ulterior motive and the sole aim is to cause harm to the target, then choose sub-technique \u201cDefame\u201d of technique \u201cCause Harm\u201d instead.", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0135.001.md", + "external_id": "T0135.001" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc.json index 5d1cd3a..51e14bc 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4bf604f5-f60d-47be-accb-b2bdf506a92b", + "id": "bundle--73c1f5eb-a924-4c1a-8bc7-157de4037202", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.712817Z", - "modified": "2023-09-25T16:17:56.712817Z", + "created": "2023-09-28T21:25:13.29032Z", + "modified": "2023-09-28T21:25:13.29032Z", "name": "Social Media Engagement", "description": "Monitor and evaluate social media engagement in misinformation incidents.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e.json index 51b6742..3140f11 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--dd819c6a-135e-4f77-b117-7274bffbf246", + "id": "bundle--db48f90c-2233-4b2b-924f-a89b94258b02", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.700044Z", - "modified": "2023-09-25T16:17:56.700044Z", + "created": "2023-09-28T21:25:13.287776Z", + "modified": "2023-09-28T21:25:13.287776Z", "name": "Legacy Web Content", "description": "Make incident content visible for a long time, e.g. by exploiting platform terms of service, or placing it where it's hard to remove or unlikely to be removed.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7.json index f554f85..64b6aa9 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0b6d2e02-adb2-482f-a442-d51c5d6cf405", + "id": "bundle--2b5b9408-3d82-42ee-aa4e-8715f2b1cedb", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.619059Z", - "modified": "2023-09-25T16:17:56.619059Z", + "created": "2023-09-28T21:25:13.234844Z", + "modified": "2023-09-28T21:25:13.234844Z", "name": "Develop Video-Based Content", "description": "Creating and editing false or misleading video artefacts, often aligned with one or more specific narratives, for use in a disinformation campaign. This may include staging videos of purportedly real situations, repurposing existing video artefacts, or using AI-generated video creation and editing technologies (including deepfakes).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce5b400c-6f82-4095-936b-617857800da8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce5b400c-6f82-4095-936b-617857800da8.json index 1ff18ef..dc1a741 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce5b400c-6f82-4095-936b-617857800da8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce5b400c-6f82-4095-936b-617857800da8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--5ca66bd4-ed79-4ead-88ea-36f1294d5efb", + "id": "bundle--a3bb18cd-22f3-438c-a048-da2efa0af730", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ce5b400c-6f82-4095-936b-617857800da8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.57582Z", - "modified": "2023-09-25T16:17:56.57582Z", + "created": "2023-09-28T21:25:13.211643Z", + "modified": "2023-09-28T21:25:13.211643Z", "name": "Conduct Swarming", "description": "Swarming refers to the coordinated use of accounts to overwhelm the information space with operation content. Unlike information flooding, swarming centres exclusively around a specific event or actor rather than a general narrative. Swarming relies on \u201chorizontal communication\u201d between information assets rather than a top-down, vertical command-and-control approach.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef.json index ebc12e2..0b3af46 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0bb20d93-4965-4e20-abbd-28cdcff54032", + "id": "bundle--373c231e-4baf-4c98-8239-4371748a475c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.578132Z", - "modified": "2023-09-25T16:17:56.578132Z", + "created": "2023-09-28T21:25:13.211971Z", + "modified": "2023-09-28T21:25:13.211971Z", "name": "Inauthentic Sites Amplify News and Narratives", "description": "Inauthentic sites circulate cross-post stories and amplify narratives. Often these sites have no masthead, bylines or attribution.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb.json index 2382cb3..ee21657 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e2b08222-d4af-4798-b1fb-0ce4166e8d4a", + "id": "bundle--fddd299e-bacd-4c46-9967-3b38b5bf4dc3", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.609984Z", - "modified": "2023-09-25T16:17:56.609984Z", + "created": "2023-09-28T21:25:13.225998Z", + "modified": "2023-09-28T21:25:13.225998Z", "name": "Identify Existing Fissures", "description": "An influence operation may identify existing fissures to pit target populations against one another or facilitate a \u201cdivide-and-conquer\" approach to tailor operation narratives along the divides.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1ad0738-1f52-4fab-b0d1-640b551d7f6a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1ad0738-1f52-4fab-b0d1-640b551d7f6a.json index eef54c3..564338f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1ad0738-1f52-4fab-b0d1-640b551d7f6a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1ad0738-1f52-4fab-b0d1-640b551d7f6a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--132699de-4664-4b33-9b9f-6440f6d029da", + "id": "bundle--952e939f-4ff6-4716-9800-9ac3671f7aa2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d1ad0738-1f52-4fab-b0d1-640b551d7f6a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.542561Z", - "modified": "2023-09-25T16:17:56.542561Z", + "created": "2023-09-28T21:25:13.191652Z", + "modified": "2023-09-28T21:25:13.191652Z", "name": "Create Inauthentic Social Media Pages and Groups", "description": "Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1f55d22-f487-48ec-a810-a9f74220c02e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1f55d22-f487-48ec-a810-a9f74220c02e.json index 0b084bc..bd7b661 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1f55d22-f487-48ec-a810-a9f74220c02e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1f55d22-f487-48ec-a810-a9f74220c02e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--69525480-fc30-4a32-a824-af4f4d89403f", + "id": "bundle--ef0d8657-c475-4cfb-8a3e-b690151ee2fe", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d1f55d22-f487-48ec-a810-a9f74220c02e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.580613Z", - "modified": "2023-09-25T16:17:56.580613Z", + "created": "2023-09-28T21:25:13.212585Z", + "modified": "2023-09-28T21:25:13.212585Z", "name": "Play the Long Game", "description": "Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde.json index 3e7c7fb..68fb007 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ef69d29c-c13b-4a39-9a7f-1b527b46bbfb", + "id": "bundle--d11bf15d-911d-4c37-af5d-e6352f6d86a0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.705323Z", - "modified": "2023-09-25T16:17:56.705323Z", + "created": "2023-09-28T21:25:13.289186Z", + "modified": "2023-09-28T21:25:13.289186Z", "name": "Content", "description": "Measure current system state with respect to the effectiveness of campaign content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4813d4a-2afe-4c0e-8ddb-b21973bb283a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4813d4a-2afe-4c0e-8ddb-b21973bb283a.json index 348beb9..5da3c61 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4813d4a-2afe-4c0e-8ddb-b21973bb283a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4813d4a-2afe-4c0e-8ddb-b21973bb283a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--94e1c9a6-02e2-4497-b320-b12105687c79", + "id": "bundle--1527d206-4039-4429-ab9b-d8dc9d89bde4", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d4813d4a-2afe-4c0e-8ddb-b21973bb283a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.655315Z", - "modified": "2023-09-25T16:17:56.655315Z", + "created": "2023-09-28T21:25:13.263231Z", + "modified": "2023-09-28T21:25:13.263231Z", "name": "Formal Diplomatic Channels", "description": "Leveraging formal, traditional, diplomatic channels to communicate with foreign governments (written documents, meetings, summits, diplomatic visits, etc). This type of diplomacy is conducted by diplomats of one nation with diplomats and other officials of another nation or international organisation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7.json new file mode 100644 index 0000000..4ceff26 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--088dde27-e6c9-4941-9440-e41867e9288c", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.291305Z", + "modified": "2023-09-28T21:25:13.291305Z", + "name": "Subvert", + "description": "Sabotage, destroy, or damage a system, process, or relationship. The classic example is the Soviet strategy of \u201cactive measures\u201d involving deniable covert activities such as political influence, the use of front organisations, the orchestration of domestic unrest, and the spread of disinformation. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0135.003.md", + "external_id": "T0135.003" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4e35ba1-f83d-41b4-a862-caabb634cc3e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4e35ba1-f83d-41b4-a862-caabb634cc3e.json index 99fea53..efb9426 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4e35ba1-f83d-41b4-a862-caabb634cc3e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d4e35ba1-f83d-41b4-a862-caabb634cc3e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--92462f75-e7d8-4d1d-a5e7-ded0a6cb45b7", + "id": "bundle--38c9097d-041d-4b8c-b5aa-f809fcddf104", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d4e35ba1-f83d-41b4-a862-caabb634cc3e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.653463Z", - "modified": "2023-09-25T16:17:56.653463Z", + "created": "2023-09-28T21:25:13.262253Z", + "modified": "2023-09-28T21:25:13.262253Z", "name": "Blogging and Publishing Networks", "description": "Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6.json index 76167d5..6e560ab 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--27f24af6-5ab4-4c85-93ab-01f9471ed60c", + "id": "bundle--13ba1199-ec7d-4f4a-a3ab-4b21b9d84531", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.631104Z", - "modified": "2023-09-25T16:17:56.631104Z", + "created": "2023-09-28T21:25:13.244787Z", + "modified": "2023-09-28T21:25:13.244787Z", "name": "Fund Proxies", "description": "An influence operation may fund proxies, or external entities that work for the operation. An operation may recruit/train users with existing sympathies towards the operation\u2019s narratives and/or goals as proxies. Funding proxies serves various purposes including: - Diversifying operation locations to complicate attribution - Reducing the workload for direct operation assets", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa.json index d7e6e12..36f0df4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f6de3db3-d826-412c-9721-a8b5f3c4a90c", + "id": "bundle--f30f110f-e961-42e4-8860-7d669c49f406", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.686385Z", - "modified": "2023-09-25T16:17:56.686385Z", + "created": "2023-09-28T21:25:13.276393Z", + "modified": "2023-09-28T21:25:13.276393Z", "name": "Exploit Platform TOS/Content Moderation", "description": "Exploit Platform TOS/Content Moderation", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac.json index dced8c2..43e5a84 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--b2b12627-0bcf-4e94-88f2-b60f51881330", + "id": "bundle--1c171b0d-279e-4c8c-a34a-04d3e5ae149b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.683514Z", - "modified": "2023-09-25T16:17:56.683514Z", + "created": "2023-09-28T21:25:13.274512Z", + "modified": "2023-09-28T21:25:13.274512Z", "name": "Delete Opposing Content", "description": "Deleting opposing content refers to the removal of content that conflicts with operational narratives from selected platforms. An influence operation may delete opposing content to censor contradictory information from the target audience, allowing operation narratives to take priority in the information space.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d696b89b-9686-42ff-b3c4-5a4d5ecaa17a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d696b89b-9686-42ff-b3c4-5a4d5ecaa17a.json index 779f85d..0797441 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d696b89b-9686-42ff-b3c4-5a4d5ecaa17a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d696b89b-9686-42ff-b3c4-5a4d5ecaa17a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ba6833e6-b711-4e96-8929-beb56c3a6a1d", + "id": "bundle--0e6424ec-4e04-4e9b-81d9-02f02b9e1436", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--d696b89b-9686-42ff-b3c4-5a4d5ecaa17a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.58392Z", - "modified": "2023-09-25T16:17:56.58392Z", + "created": "2023-09-28T21:25:13.21355Z", + "modified": "2023-09-28T21:25:13.21355Z", "name": "Degrade Adversary", "description": "Plan to degrade an adversary\u2019s image or ability to act. This could include preparation and use of harmful information about the adversary\u2019s actions or reputation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da4ae172-c8c8-4eb1-bc03-c5198624c8a2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da4ae172-c8c8-4eb1-bc03-c5198624c8a2.json index fa6f71d..4845398 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da4ae172-c8c8-4eb1-bc03-c5198624c8a2.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da4ae172-c8c8-4eb1-bc03-c5198624c8a2.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--019cf266-cc40-4902-b63e-7e3708a463ff", + "id": "bundle--cc458a26-a004-4463-a6a4-e173f0fa2ced", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--da4ae172-c8c8-4eb1-bc03-c5198624c8a2", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.654059Z", - "modified": "2023-09-25T16:17:56.654059Z", + "created": "2023-09-28T21:25:13.262725Z", + "modified": "2023-09-28T21:25:13.262725Z", "name": "Consumer Review Networks", "description": "Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f.json index 503f10e..6ce4707 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8cd1237b-1a64-4c10-aee8-40df869500f1", + "id": "bundle--d0d8a13e-21cb-4923-a3d5-75bb95aa8dc9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.691451Z", - "modified": "2023-09-25T16:17:56.691451Z", + "created": "2023-09-28T21:25:13.280677Z", + "modified": "2023-09-28T21:25:13.280677Z", "name": "Deny Involvement", "description": "Without \"smoking gun\" proof (and even with proof), incident creator can or will deny involvement. This technique also leverages the attacker advantages outlined in \"Demand insurmountable proof\", specifically the asymmetric disadvantage for truth-tellers in a \"firehose of misinformation\" environment.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9.json index 15a2ff9..d740570 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--61e93ff9-9160-40ab-a8e1-3da76a9ff119", + "id": "bundle--c8ff294a-e87b-48e0-99e9-6e0c7aac17d1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.624406Z", - "modified": "2023-09-25T16:17:56.624406Z", + "created": "2023-09-28T21:25:13.24082Z", + "modified": "2023-09-28T21:25:13.24082Z", "name": "Create Cyborg Accounts", "description": "Cyborg accounts refer to partly manned, partly automated social media accounts. Cyborg accounts primarily act as bots, but a human operator periodically takes control of the account to engage with real social media users by responding to comments and posting original content. Influence operations may use cyborg accounts to reduce the amount of direct human input required to maintain a regular account but increase the apparent legitimacy of the cyborg account by occasionally breaking its bot-like behaviour with human interaction.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a.json index 1b15e7a..dd308ca 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3fe52b4f-bdc3-4edb-98ed-a65e6915fc93", + "id": "bundle--9a159563-ed34-4c87-b36c-3d45dfd98874", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.65666Z", - "modified": "2023-09-25T16:17:56.65666Z", + "created": "2023-09-28T21:25:13.264206Z", + "modified": "2023-09-28T21:25:13.264206Z", "name": "TV", "description": "TV", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3.json index ffd1746..8c69dd7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7b08cc55-db35-44d2-b2da-9db36bd92c33", + "id": "bundle--0028f8f2-2029-4674-899e-08cc2df5b923", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.696473Z", - "modified": "2023-09-25T16:17:56.696473Z", + "created": "2023-09-28T21:25:13.283543Z", + "modified": "2023-09-28T21:25:13.283543Z", "name": "Misattribute Activity", "description": "Misattributed activity refers to incorrectly attributed operation activity. For example, a state sponsored influence operation may conduct operation activity in a way that mimics another state so that external entities misattribute activity to the incorrect state. An operation may misattribute their activities to complicate attribution, avoid detection, or frame an adversary for negative behaviour.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd9f940d-3970-45b2-8549-12e321567657.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd9f940d-3970-45b2-8549-12e321567657.json index d9d015e..8815117 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd9f940d-3970-45b2-8549-12e321567657.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--dd9f940d-3970-45b2-8549-12e321567657.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6964d156-49a0-4273-b4f1-d2076570d0dd", + "id": "bundle--9980c5d5-fd3c-426d-939a-dcd5c6dbbc4b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--dd9f940d-3970-45b2-8549-12e321567657", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.550222Z", - "modified": "2023-09-25T16:17:56.550222Z", + "created": "2023-09-28T21:25:13.197411Z", + "modified": "2023-09-28T21:25:13.197411Z", "name": "Create Fake Research", "description": "Create fake academic research. Example: fake social science research is often aimed at hot-button social issues such as gender, race and sexuality. Fake science research can target Climate Science debate or pseudoscience like anti-vaxx", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce.json index 3c989d4..0b671e1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3816f27d-262c-4893-85a2-a59c14bdd595", + "id": "bundle--936cc62f-49d5-42cc-a50d-c254338bdac3", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.679944Z", - "modified": "2023-09-25T16:17:56.679944Z", + "created": "2023-09-28T21:25:13.273783Z", + "modified": "2023-09-28T21:25:13.273783Z", "name": "Use Contests and Prizes", "description": "Use Contests and Prizes", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc9d571-88a9-4246-bbbf-075bfed721f8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc9d571-88a9-4246-bbbf-075bfed721f8.json index 5d3a169..405db8d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc9d571-88a9-4246-bbbf-075bfed721f8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ddc9d571-88a9-4246-bbbf-075bfed721f8.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--17b8dcc8-8c41-4e53-a33e-f91a23e372ec", + "id": "bundle--5dc19d43-3858-4fb8-9aef-a4ecc7975c57", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ddc9d571-88a9-4246-bbbf-075bfed721f8", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.581726Z", - "modified": "2023-09-25T16:17:56.581726Z", + "created": "2023-09-28T21:25:13.212859Z", + "modified": "2023-09-28T21:25:13.212859Z", "name": "Sell Merchandise", "description": "Sell mechandise refers to getting the message or narrative into physical space in the offline world while making money", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79.json index 175196f..43e8385 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0e22d936-ae5b-463d-9f1c-3245c92c5864", + "id": "bundle--f5fb276b-1487-426d-8190-8184c5005759", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.693681Z", - "modified": "2023-09-25T16:17:56.693681Z", + "created": "2023-09-28T21:25:13.281952Z", + "modified": "2023-09-28T21:25:13.281952Z", "name": "Delete Accounts/Account Activity", "description": "Deleting accounts and account activity occurs when an influence operation removes its online social media assets, including social media accounts, posts, likes, comments, and other online artefacts. An influence operation may delete its accounts and account activity to complicate attribution or remove online documentation that the operation ever occurred.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0acfceb-4541-438f-ba33-734f9a666c7d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0acfceb-4541-438f-ba33-734f9a666c7d.json index 1f09d90..9b432de 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0acfceb-4541-438f-ba33-734f9a666c7d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0acfceb-4541-438f-ba33-734f9a666c7d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--2a96f878-06ae-416b-bc70-697723844e26", + "id": "bundle--83472169-1104-44ab-8c40-3d22590924b2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e0acfceb-4541-438f-ba33-734f9a666c7d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.548057Z", - "modified": "2023-09-25T16:17:56.548057Z", + "created": "2023-09-28T21:25:13.195756Z", + "modified": "2023-09-28T21:25:13.195756Z", "name": "Create Hashtags and Search Artefacts", "description": "Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only \"real\" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicise the story more widely through trending lists and search behaviour. Asset needed to direct/control/manage \"conversation\" connected to launching new incident/campaign with new hashtag for applicable social media sites).", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06.json index 4cc51df..23de6ff 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--cf07048c-1401-42d6-8066-8180ce1480b7", + "id": "bundle--0fd36e6c-bf7f-4bb3-9412-220b3c84823a", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.54761Z", - "modified": "2023-09-25T16:17:56.54761Z", + "created": "2023-09-28T21:25:13.195612Z", + "modified": "2023-09-28T21:25:13.195612Z", "name": "Raise Funds from Ignorant Agents", "description": "Raising funds from ignorant agents may include scams, donations intended for one stated purpose but then used for another, etc.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea.json index e818d52..4c70975 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--ed62b235-03e1-48cc-8196-fdd3ae52130e", + "id": "bundle--9490e61c-6abf-46dd-81c3-2fa54fe2559b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.635463Z", - "modified": "2023-09-25T16:17:56.635463Z", + "created": "2023-09-28T21:25:13.250542Z", + "modified": "2023-09-28T21:25:13.250542Z", "name": "Create Inauthentic News Sites", "description": "Create Inauthentic News Sites", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e1afdaea-cb95-4cdf-95a2-0bf8518b872d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e1afdaea-cb95-4cdf-95a2-0bf8518b872d.json new file mode 100644 index 0000000..7b40272 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e1afdaea-cb95-4cdf-95a2-0bf8518b872d.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--b23b43e6-050f-4db7-b6c0-d20ccaf6fab8", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e1afdaea-cb95-4cdf-95a2-0bf8518b872d", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.297622Z", + "modified": "2023-09-28T21:25:13.297622Z", + "name": "Compel", + "description": "Force target to take an action or to stop taking an action it has already started. Actors can use the threat of reputational damage alongside military or economic threats to compel a target.", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0138.003.md", + "external_id": "T0138.003" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637.json new file mode 100644 index 0000000..57686d6 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--aac0ab30-5619-498e-b0fc-fde1d8e70acd", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.294873Z", + "modified": "2023-09-28T21:25:13.294873Z", + "name": "Make Money", + "description": "Profit from disinformation, conspiracy theories, or online harm. In some cases, the sole objective is financial gain, in other cases the objective is both financial and political. Making money may also be a way to sustain a political campaign. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0137.md", + "external_id": "T0137" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e.json index 9d372ec..0850163 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--33be7aa6-7e92-44ae-883c-bb75241649c0", + "id": "bundle--d341052e-6550-4dd9-8b48-2f54f7e02bff", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.684615Z", - "modified": "2023-09-25T16:17:56.684615Z", + "created": "2023-09-28T21:25:13.275468Z", + "modified": "2023-09-28T21:25:13.275468Z", "name": "Suppress Opposition", "description": "Operators can suppress the opposition by exploiting platform content moderation tools and processes like reporting non-violative content to platforms for takedown and goading opposition actors into taking actions that result in platform action or target audience disapproval.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421.json index d1c0a70..e0e9b4c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--fa5048ed-1955-4214-83c2-ae208d635829", + "id": "bundle--2820078e-14f2-484a-95dc-3d09835d11ff", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.615112Z", - "modified": "2023-09-25T16:17:56.615112Z", + "created": "2023-09-28T21:25:13.229867Z", + "modified": "2023-09-28T21:25:13.229867Z", "name": "Appropriate Content", "description": "An influence operation may take content from other sources with proper attribution. This content may be either misinformation content shared by others without malicious intent but now leveraged by the campaign as disinformation or disinformation content from other sources. Examples include the appropriation of content from one inauthentic news site to another inauthentic news site or network in ways that align with the originators licencing or terms of service.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e.json index 75c65a7..3f92df0 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--02b94b31-cb67-4cb8-a37a-9146ecf39d51", + "id": "bundle--11022964-a69e-4a5e-afa1-356b0aff36c9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.566443Z", - "modified": "2023-09-25T16:17:56.566443Z", + "created": "2023-09-28T21:25:13.208935Z", + "modified": "2023-09-28T21:25:13.208935Z", "name": "Harass People Based on Identities", "description": "Examples include social identities like gender, sexuality, race, ethnicity, religion, ability, nationality, etc. as well as roles and occupations like journalist or activist.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e499df14-e898-4e4f-be58-67266915e7b2.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e499df14-e898-4e4f-be58-67266915e7b2.json new file mode 100644 index 0000000..ad1198a --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e499df14-e898-4e4f-be58-67266915e7b2.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--280d3c46-3692-4fbe-83e5-364512dc70d0", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e499df14-e898-4e4f-be58-67266915e7b2", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.217536Z", + "modified": "2023-09-28T21:25:13.217536Z", + "name": "Geopolitical Advantage", + "description": "Favourable position on the international stage in terms of great power politics or regional rivalry. Geopolitics plays out in the realms of foreign policy, national security, diplomacy, and intelligence. It involves nation-state governments, heads of state, foreign ministers, intergovernmental organisations, and regional security alliances.", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-strategy" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0074.001.md", + "external_id": "T0074.001" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e.json index a4095e2..2a73709 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a0fcaa07-9a44-4a28-b3fb-d093c8df779d", + "id": "bundle--4c885d9a-e5e9-4dc3-ab63-3fe9f3acf87b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.618334Z", - "modified": "2023-09-25T16:17:56.618334Z", + "created": "2023-09-28T21:25:13.233879Z", + "modified": "2023-09-28T21:25:13.233879Z", "name": "Deceptively Edit Images (Cheap Fakes)", "description": "Cheap fakes utilise less sophisticated measures of altering an image, video, or audio for example, slowing, speeding, or cutting footage to create a false context surrounding an image or event.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce.json index eacb9a1..d19828c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--3165ade8-3117-44a0-8dcd-0e7e14bfb541", + "id": "bundle--e3c83552-5c28-40dc-8596-175ec2f6942f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.636729Z", - "modified": "2023-09-25T16:17:56.636729Z", + "created": "2023-09-28T21:25:13.251896Z", + "modified": "2023-09-28T21:25:13.251896Z", "name": "Astroturfing", "description": "Astroturfing occurs when an influence operation disguises itself as grassroots movement or organisation that supports operation narratives. Unlike butterfly attacks, astroturfing aims to increase the appearance of popular support for the operation cause and does not infiltrate existing groups to discredit their objectives.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae.json index 51634b5..25ae1bc 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--1c520402-74c6-45c8-9ec3-944221d67429", + "id": "bundle--9d66dc2a-8e13-4735-b5c7-c058fa686cf2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.620468Z", - "modified": "2023-09-25T16:17:56.620468Z", + "created": "2023-09-28T21:25:13.236836Z", + "modified": "2023-09-28T21:25:13.236836Z", "name": "Develop AI-Generated Audio (Deepfakes)", "description": "Deepfakes refer to AI-generated falsified photos, videos, or soundbites. An influence operation may use deepfakes to depict an inauthentic situation by synthetically recreating an individual\u2019s face, body, voice, and physical gestures.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e6ab2793-a059-4354-bb60-045afb019833.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e6ab2793-a059-4354-bb60-045afb019833.json index 54bc8b7..401bad1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e6ab2793-a059-4354-bb60-045afb019833.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e6ab2793-a059-4354-bb60-045afb019833.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--2efdf94b-fb27-45bc-bf61-e3be7ae8fe27", + "id": "bundle--e556b6e0-4c8d-4d7f-ae51-7b9f0d625217", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e6ab2793-a059-4354-bb60-045afb019833", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.572675Z", - "modified": "2023-09-25T16:17:56.572675Z", + "created": "2023-09-28T21:25:13.21116Z", + "modified": "2023-09-28T21:25:13.21116Z", "name": "Bots Amplify via Automated Forwarding and Reposting", "description": "Automated forwarding and reposting refer to the proliferation of operation content using automated means, such as artificial intelligence or social media bots. An influence operation may use automated activity to increase content exposure without dedicating the resources, including personnel and time, traditionally required to forward and repost content. Use bots to amplify narratives above algorithm thresholds. Bots are automated/programmed profiles designed to amplify content (ie: automatically retweet or like) and give appearance it's more \"popular\" than it is. They can operate as a network, to function in a coordinated/orchestrated manner. In some cases (more so now) they are an inexpensive/disposable assets used for minimal deployment as bot detection tools improve and platforms are more responsive.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5.json index 373dea4..df8eb64 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7bc5ec50-f736-4112-8bcb-e101e8537ca3", + "id": "bundle--d2749ee7-7179-48c3-998d-43b21534cef2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.691175Z", - "modified": "2023-09-25T16:17:56.691175Z", + "created": "2023-09-28T21:25:13.280391Z", + "modified": "2023-09-28T21:25:13.280391Z", "name": "Coordinate on Encrypted/Closed Networks", "description": "Coordinate on encrypted/ closed networks", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea0d5988-af73-4b09-8040-7bb2fbadaa3c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea0d5988-af73-4b09-8040-7bb2fbadaa3c.json index a968725..8ee9dea 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea0d5988-af73-4b09-8040-7bb2fbadaa3c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea0d5988-af73-4b09-8040-7bb2fbadaa3c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--87487808-9980-42be-913d-8ee05ed05bd5", + "id": "bundle--f5e16a97-95c6-427c-b091-5a1aa3753b3e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ea0d5988-af73-4b09-8040-7bb2fbadaa3c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.55143Z", - "modified": "2023-09-25T16:17:56.55143Z", + "created": "2023-09-28T21:25:13.198581Z", + "modified": "2023-09-28T21:25:13.198581Z", "name": "Trial Content", "description": "Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313.json index 2321a8b..bdd84af 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--0f2e88e2-1457-4652-a726-42ca167ace89", + "id": "bundle--99fac1cb-a119-4923-9e74-a6858ad3e7a5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.695784Z", - "modified": "2023-09-25T16:17:56.695784Z", + "created": "2023-09-28T21:25:13.282986Z", + "modified": "2023-09-28T21:25:13.282986Z", "name": "Remove Post Origins", "description": "Removing post origins refers to the elimination of evidence that indicates the initial source of operation content, often to complicate attribution. An influence operation may remove post origins by deleting watermarks, renaming files, or removing embedded links in its content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12.json index cd2594b..b52dddd 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--7ffc3899-5602-4e42-96bd-43622a285e63", + "id": "bundle--4dd79d38-b18a-4b1f-b601-740c6893c9a0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.551796Z", - "modified": "2023-09-25T16:17:56.551796Z", + "created": "2023-09-28T21:25:13.199178Z", + "modified": "2023-09-28T21:25:13.199178Z", "name": "Leverage Conspiracy Theory Narratives", "description": "\"Conspiracy narratives\" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalised or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the \"firehose of falsehoods\" model.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c.json index a71a7ee..9b2e52b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a095c2df-bace-4ae3-bfcb-8df46fe3d9b3", + "id": "bundle--de727a3f-959f-4171-a484-ec5ae2adca13", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.690422Z", - "modified": "2023-09-25T16:17:56.690422Z", + "created": "2023-09-28T21:25:13.279929Z", + "modified": "2023-09-28T21:25:13.279929Z", "name": "Generate Content Unrelated to Narrative", "description": "An influence operation may mix its own operation content with legitimate news or external unrelated content to disguise operational objectives, narratives, or existence. For example, an operation may generate \"lifestyle\" or \"cuisine\" content alongside regular operation content.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3.json index 450e23c..726f3c6 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--089dd53a-c940-422e-a7cc-5c3187a5a834", + "id": "bundle--3769fb81-89fd-406d-b23c-4b6dc06b29ce", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.55313Z", - "modified": "2023-09-25T16:17:56.55313Z", + "created": "2023-09-28T21:25:13.200222Z", + "modified": "2023-09-28T21:25:13.200222Z", "name": "Develop Original Conspiracy Theory Narratives", "description": "While this requires more resources than amplifying existing conspiracy theory narratives, an influence operation may develop original conspiracy theory narratives in order to achieve greater control and alignment over the narrative and their campaign goals. Prominent examples include the USSR's Operation INFEKTION disinformation campaign run by the KGB in the 1980s to plant the idea that the United States had invented HIV/AIDS as part of a biological weapons research project at Fort Detrick, Maryland. More recently, Fort Detrick featured prominently in a new conspiracy theory narratives around the origins of the COVID-19 outbreak and pandemic.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5.json index 01fb8a2..f96df27 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--771d2485-b85e-4bd5-be3c-c3d451431b36", + "id": "bundle--d7169852-a0a8-4aa1-a31c-940f1e6300c5", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.657178Z", - "modified": "2023-09-25T16:17:56.657178Z", + "created": "2023-09-28T21:25:13.264749Z", + "modified": "2023-09-28T21:25:13.264749Z", "name": "Newspaper", "description": "Newspaper", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588.json index a3bb220..b9a0f23 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--8da13889-6269-4678-ae38-1cd1093c2ce6", + "id": "bundle--0dd5363a-3f7f-4d84-9077-3e1b1ba601f6", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.69011Z", - "modified": "2023-09-25T16:17:56.69011Z", + "created": "2023-09-28T21:25:13.279479Z", + "modified": "2023-09-28T21:25:13.279479Z", "name": "Conceal Network Identity", "description": "Concealing network identity aims to hide the existence an influence operation\u2019s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f.json index 1cb1b32..6892288 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--75fe8b4c-f924-48ed-9ddb-d8960bd19a14", + "id": "bundle--f4f21a8f-2538-428b-9487-d4e57599e6d2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.543475Z", - "modified": "2023-09-25T16:17:56.543475Z", + "created": "2023-09-28T21:25:13.192717Z", + "modified": "2023-09-28T21:25:13.192717Z", "name": "Utilise Academic/Pseudoscientific Justifications", "description": "Utilise Academic/Pseudoscientific Justifications", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d.json index 7b1286a..63e9fff 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e78a79b0-13b6-45a4-bdfe-8efd00bc6907", + "id": "bundle--5a61b038-2b91-4fa8-920d-12d91c0a17e6", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.621541Z", - "modified": "2023-09-25T16:17:56.621541Z", + "created": "2023-09-28T21:25:13.238381Z", + "modified": "2023-09-28T21:25:13.238381Z", "name": "Obtain Authentic Documents", "description": "Procure authentic documents that are not publicly available, by whatever means -- whether legal or illegal, highly-resourced or less so. These documents can be \"leaked\" during later stages in the operation.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eef34262-0822-4727-83f5-2e608babc396.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eef34262-0822-4727-83f5-2e608babc396.json index eb89f8f..fe1183f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eef34262-0822-4727-83f5-2e608babc396.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eef34262-0822-4727-83f5-2e608babc396.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--096ad7f5-9bcb-4a36-927e-ee672c730103", + "id": "bundle--468bacd2-f967-4259-8fbb-42324bd38b02", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--eef34262-0822-4727-83f5-2e608babc396", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.549545Z", - "modified": "2023-09-25T16:17:56.549545Z", + "created": "2023-09-28T21:25:13.196666Z", + "modified": "2023-09-28T21:25:13.196666Z", "name": "Purchase Targeted Advertisements", "description": "Create or fund advertisements targeted at specific populations", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979.json index c0f68bf..74fa99a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--af68abce-abc9-4b92-8035-cc71966ad71e", + "id": "bundle--3eefd179-69a8-412e-a016-73c93f1447aa", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.628538Z", - "modified": "2023-09-25T16:17:56.628538Z", + "created": "2023-09-28T21:25:13.242733Z", + "modified": "2023-09-28T21:25:13.242733Z", "name": "Enlist Troll Accounts", "description": "An influence operation may hire trolls, or human operators of fake accounts that aim to provoke others by posting and amplifying content about controversial issues. Trolls can serve to discredit an influence operation\u2019s opposition or bring attention to the operation\u2019s cause through debate. Classic trolls refer to regular people who troll for personal reasons, such as attention-seeking or boredom. Classic trolls may advance operation narratives by coincidence but are not directly affiliated with any larger operation. Conversely, hybrid trolls act on behalf of another institution, such as a state or financial organisation, and post content with a specific ideological goal. Hybrid trolls may be highly advanced and institutionalised or less organised and work for a single individual.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f08df5bc-7cea-42b8-be2c-b07c0d62c982.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f08df5bc-7cea-42b8-be2c-b07c0d62c982.json new file mode 100644 index 0000000..5e50775 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f08df5bc-7cea-42b8-be2c-b07c0d62c982.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--c96c5aa8-6b5b-4f62-96cb-0ece79424c1f", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--f08df5bc-7cea-42b8-be2c-b07c0d62c982", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.295422Z", + "modified": "2023-09-28T21:25:13.295422Z", + "name": "Scam", + "description": "Defraud a target or trick a target into doing something that benefits the attacker. A typical scam is where a fraudster convinces a target to pay for something without the intention of ever delivering anything in return. Alternatively, the fraudster may promise benefits which never materialise, such as a fake cure. Criminals often exploit a fear or crisis or generate a sense of urgency. They may use deepfakes to impersonate authority figures or individuals in distress. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0137.002.md", + "external_id": "T0137.002" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd.json index 210d07c..03d576d 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--21b7e633-7622-42ea-9493-ee045dd874fd", + "id": "bundle--bc827c4b-80b4-4b2c-abf4-183ec998f9f1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.580201Z", - "modified": "2023-09-25T16:17:56.580201Z", + "created": "2023-09-28T21:25:13.212419Z", + "modified": "2023-09-28T21:25:13.212419Z", "name": "Conduct Symbolic Action", "description": "Symbolic action refers to activities specifically intended to advance an operation\u2019s narrative by signalling something to the audience, for example, a military parade supporting a state\u2019s narrative of military superiority. An influence operation may use symbolic action to create falsified evidence supporting operation narratives in the physical information space.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8fc8cda-8dbe-4f8a-8c62-e06b975582df.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8fc8cda-8dbe-4f8a-8c62-e06b975582df.json new file mode 100644 index 0000000..d24767b --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8fc8cda-8dbe-4f8a-8c62-e06b975582df.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--b2673ae9-3781-429a-8cca-f8f23ede9445", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--f8fc8cda-8dbe-4f8a-8c62-e06b975582df", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.294603Z", + "modified": "2023-09-28T21:25:13.294603Z", + "name": "Increase Prestige", + "description": "Improve personal standing within a community. Gain fame, approbation, or notoriety. Conspiracy theorists, those with special access, and ideologues can gain prominence in a community by propagating disinformation, leaking confidential documents, or spreading hate. ", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0136.008.md", + "external_id": "T0136.008" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "2.1" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370.json index a901967..611a939 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6d2e5846-b54e-4cbe-9550-226d843f1212", + "id": "bundle--9f6a7730-a0d0-4964-9d8c-d9494abda36e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.669719Z", - "modified": "2023-09-25T16:17:56.669719Z", + "created": "2023-09-28T21:25:13.269329Z", + "modified": "2023-09-28T21:25:13.269329Z", "name": "Post Violative Content to Provoke Takedown and Backlash", "description": "Post Violative Content to Provoke Takedown and Backlash.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd04fba0-0e20-40f9-868d-e8effcf6dab6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd04fba0-0e20-40f9-868d-e8effcf6dab6.json index 267fcc2..92b3fc9 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd04fba0-0e20-40f9-868d-e8effcf6dab6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd04fba0-0e20-40f9-868d-e8effcf6dab6.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6f61116a-0096-432a-943c-430727d49cd1", + "id": "bundle--de1fabaa-fdff-49ae-98f7-47fd112825a9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--fd04fba0-0e20-40f9-868d-e8effcf6dab6", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.686658Z", - "modified": "2023-09-25T16:17:56.686658Z", + "created": "2023-09-28T21:25:13.276552Z", + "modified": "2023-09-28T21:25:13.276552Z", "name": "Platform Filtering", "description": "Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation)", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319.json index 0d158e1..0855bdf 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--c99fe5f3-c92b-4162-bb77-d785f87c6c4b", + "id": "bundle--baff5a4e-b285-4b1c-8ae5-8c04c6b6a308", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.627814Z", - "modified": "2023-09-25T16:17:56.627814Z", + "created": "2023-09-28T21:25:13.242543Z", + "modified": "2023-09-28T21:25:13.242543Z", "name": "Recruit Partisans", "description": "Operators recruit partisans (ideologically-aligned individuals) to support the campaign.", "kill_chain_phases": [ diff --git a/generated_files/DISARM_STIX/identity/identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82.json b/generated_files/DISARM_STIX/identity/identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82.json index f0502ba..a2d2237 100644 --- a/generated_files/DISARM_STIX/identity/identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82.json +++ b/generated_files/DISARM_STIX/identity/identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82.json @@ -1,13 +1,13 @@ { "type": "bundle", - "id": "bundle--86b4d2a9-216a-4f66-9399-d21094f67ee2", + "id": "bundle--4543104f-8a29-4c78-9423-a8cac4a38a91", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.52336Z", - "modified": "2023-09-25T16:17:56.52336Z", + "created": "2023-09-28T21:25:13.178304Z", + "modified": "2023-09-28T21:25:13.178304Z", "name": "DISARM Foundation", "description": "DISARM is a framework designed for describing and understanding disinformation incidents.", "identity_class": "organization" diff --git a/generated_files/DISARM_STIX/marking-definition/marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31.json b/generated_files/DISARM_STIX/marking-definition/marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31.json index f23c33b..94a8d8e 100644 --- a/generated_files/DISARM_STIX/marking-definition/marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31.json +++ b/generated_files/DISARM_STIX/marking-definition/marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31.json @@ -1,13 +1,13 @@ { "type": "bundle", - "id": "bundle--ab949ac6-26c8-4827-a248-1ed919398c60", + "id": "bundle--1deabce9-1a97-4864-9494-98d3838b845a", "objects": [ { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.52498Z", + "created": "2023-09-28T21:25:13.178561Z", "definition_type": "statement", "name": "DISARM Foundation", "definition": { diff --git a/generated_files/DISARM_STIX/relationship/relationship--00079bb3-57d6-4e10-a333-1390d67a93d6.json b/generated_files/DISARM_STIX/relationship/relationship--00079bb3-57d6-4e10-a333-1390d67a93d6.json new file mode 100644 index 0000000..79fdc85 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--00079bb3-57d6-4e10-a333-1390d67a93d6.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2de6a16e-4c32-4e75-9b89-fb67e671668c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--00079bb3-57d6-4e10-a333-1390d67a93d6", + "created": "2023-09-28T21:25:13.322794Z", + "modified": "2023-09-28T21:25:13.322794Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e1afdaea-cb95-4cdf-95a2-0bf8518b872d", + "target_ref": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--01a87f65-50f3-4747-baa6-d20e467d2100.json b/generated_files/DISARM_STIX/relationship/relationship--01a87f65-50f3-4747-baa6-d20e467d2100.json new file mode 100644 index 0000000..9b727fe --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--01a87f65-50f3-4747-baa6-d20e467d2100.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--c05a6507-70a5-4637-b1c5-40fb4f853f07", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--01a87f65-50f3-4747-baa6-d20e467d2100", + "created": "2023-09-28T21:25:13.306017Z", + "modified": "2023-09-28T21:25:13.306017Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--625fe1a6-ee9d-45c8-9912-9e9f6e87dc85", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--0573ea47-7438-42a4-95c6-9e4f82a46b19.json b/generated_files/DISARM_STIX/relationship/relationship--0573ea47-7438-42a4-95c6-9e4f82a46b19.json new file mode 100644 index 0000000..0e96fcd --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--0573ea47-7438-42a4-95c6-9e4f82a46b19.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--8f622b14-252f-47c9-ad23-3610f5792b9c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--0573ea47-7438-42a4-95c6-9e4f82a46b19", + "created": "2023-09-28T21:25:13.311248Z", + "modified": "2023-09-28T21:25:13.311248Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--bb25b4aa-9223-40ea-a28a-0dd675e91e46", + "target_ref": "attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--0b4a6753-47bf-4e8e-9776-bcfdcd251b8b.json b/generated_files/DISARM_STIX/relationship/relationship--0b4a6753-47bf-4e8e-9776-bcfdcd251b8b.json new file mode 100644 index 0000000..3277a79 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--0b4a6753-47bf-4e8e-9776-bcfdcd251b8b.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--7c8eb09e-99d5-429d-baec-44472325dbb9", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--0b4a6753-47bf-4e8e-9776-bcfdcd251b8b", + "created": "2023-09-28T21:25:13.320998Z", + "modified": "2023-09-28T21:25:13.320998Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--665d4984-25b7-4bd5-9dcb-e81c7ed7f1c9", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--0ce4bd8a-2656-46ba-a33b-ad0b649e8cd8.json b/generated_files/DISARM_STIX/relationship/relationship--0ce4bd8a-2656-46ba-a33b-ad0b649e8cd8.json new file mode 100644 index 0000000..65da79c --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--0ce4bd8a-2656-46ba-a33b-ad0b649e8cd8.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--5025ffe2-dfff-4311-9faf-6436f98d38dd", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--0ce4bd8a-2656-46ba-a33b-ad0b649e8cd8", + "created": "2023-09-28T21:25:13.307739Z", + "modified": "2023-09-28T21:25:13.307739Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e60f54a3-9972-43b8-8359-ee21d781acae", + "target_ref": "attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--0f328003-fa9d-482a-96a0-e98c0861afc2.json b/generated_files/DISARM_STIX/relationship/relationship--0f328003-fa9d-482a-96a0-e98c0861afc2.json new file mode 100644 index 0000000..85ea58f --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--0f328003-fa9d-482a-96a0-e98c0861afc2.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--49e0330f-b968-4e12-8fb5-9a134fb260a0", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--0f328003-fa9d-482a-96a0-e98c0861afc2", + "created": "2023-09-28T21:25:13.308642Z", + "modified": "2023-09-28T21:25:13.308642Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--b2695cde-5f12-4e6a-b55a-e31220cb4bd7", + "target_ref": "attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--0fd18b9e-3957-4383-a49a-2a986e3fc993.json b/generated_files/DISARM_STIX/relationship/relationship--0fd18b9e-3957-4383-a49a-2a986e3fc993.json new file mode 100644 index 0000000..697fa81 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--0fd18b9e-3957-4383-a49a-2a986e3fc993.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--5c41496d-6a63-4acf-a338-5f5a5f2598f6", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--0fd18b9e-3957-4383-a49a-2a986e3fc993", + "created": "2023-09-28T21:25:13.319122Z", + "modified": "2023-09-28T21:25:13.319122Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--83b4e2db-265f-4f88-9b35-26df05c561e9", + "target_ref": "attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1203e47b-8b98-41f1-86e7-8a56c676a00d.json b/generated_files/DISARM_STIX/relationship/relationship--1203e47b-8b98-41f1-86e7-8a56c676a00d.json new file mode 100644 index 0000000..668408d --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1203e47b-8b98-41f1-86e7-8a56c676a00d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--7b9a28f2-d2c4-475c-ab91-522e2174c0ef", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1203e47b-8b98-41f1-86e7-8a56c676a00d", + "created": "2023-09-28T21:25:13.303596Z", + "modified": "2023-09-28T21:25:13.303596Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--091a6351-aca8-4cc8-9062-cae98f600e69", + "target_ref": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--18f4e035-d1a1-405a-bd83-7a80d49f2405.json b/generated_files/DISARM_STIX/relationship/relationship--18f4e035-d1a1-405a-bd83-7a80d49f2405.json new file mode 100644 index 0000000..14f065e --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--18f4e035-d1a1-405a-bd83-7a80d49f2405.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2c3cd372-fcb2-42fa-9b65-5acd4532bbae", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--18f4e035-d1a1-405a-bd83-7a80d49f2405", + "created": "2023-09-28T21:25:13.321429Z", + "modified": "2023-09-28T21:25:13.321429Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--acab804f-184f-4602-9201-5e518bc72202", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--195bbbea-b00d-47a3-b58d-e1c80fbf7d8e.json b/generated_files/DISARM_STIX/relationship/relationship--195bbbea-b00d-47a3-b58d-e1c80fbf7d8e.json new file mode 100644 index 0000000..cb3b040 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--195bbbea-b00d-47a3-b58d-e1c80fbf7d8e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--cb95aaec-abb8-4783-86f2-98a06a8c9cc9", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--195bbbea-b00d-47a3-b58d-e1c80fbf7d8e", + "created": "2023-09-28T21:25:13.310939Z", + "modified": "2023-09-28T21:25:13.310939Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--b43dbee2-e1e2-40e5-bea1-45630d55d30b", + "target_ref": "attack-pattern--283333f5-e161-4195-9070-5a7c22505adf", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1b54ee55-410b-44a6-8d9f-9c47efde1b74.json b/generated_files/DISARM_STIX/relationship/relationship--1b54ee55-410b-44a6-8d9f-9c47efde1b74.json new file mode 100644 index 0000000..1e15173 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1b54ee55-410b-44a6-8d9f-9c47efde1b74.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--433abca4-aae5-4099-8d20-c296ab0ff94a", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1b54ee55-410b-44a6-8d9f-9c47efde1b74", + "created": "2023-09-28T21:25:13.314466Z", + "modified": "2023-09-28T21:25:13.314466Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--5bbea132-9da6-42f7-93e9-71f0a9cf311d", + "target_ref": "attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1b78090f-9ec6-4d14-8347-47e651ea0d07.json b/generated_files/DISARM_STIX/relationship/relationship--1b78090f-9ec6-4d14-8347-47e651ea0d07.json new file mode 100644 index 0000000..09b914a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1b78090f-9ec6-4d14-8347-47e651ea0d07.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--c8db5cb5-72f1-4f47-9f1f-7cfd6a8b1a7e", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1b78090f-9ec6-4d14-8347-47e651ea0d07", + "created": "2023-09-28T21:25:13.31769Z", + "modified": "2023-09-28T21:25:13.31769Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--da5fb984-37a6-4152-a078-e2af40c0844f", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1c14050f-fa1c-4364-b969-f7dffc582a95.json b/generated_files/DISARM_STIX/relationship/relationship--1c14050f-fa1c-4364-b969-f7dffc582a95.json new file mode 100644 index 0000000..9518750 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1c14050f-fa1c-4364-b969-f7dffc582a95.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a47ccc9c-4a4c-46f9-baa2-9a2ab6057c30", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1c14050f-fa1c-4364-b969-f7dffc582a95", + "created": "2023-09-28T21:25:13.306281Z", + "modified": "2023-09-28T21:25:13.306281Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--bb8da71f-108a-4c46-a1ef-d24ef1c8a661", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1c8e6cfa-2173-485c-b929-4961b40f52be.json b/generated_files/DISARM_STIX/relationship/relationship--1c8e6cfa-2173-485c-b929-4961b40f52be.json new file mode 100644 index 0000000..9933be7 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1c8e6cfa-2173-485c-b929-4961b40f52be.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--76147854-e471-4960-b2cb-a727c3c79e91", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1c8e6cfa-2173-485c-b929-4961b40f52be", + "created": "2023-09-28T21:25:13.306589Z", + "modified": "2023-09-28T21:25:13.306589Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7475b7e6-1095-4ae1-a995-10ab1a6c838a", + "target_ref": "attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1cbb29f2-ac70-4b71-bd04-aae043dd8ab7.json b/generated_files/DISARM_STIX/relationship/relationship--1cbb29f2-ac70-4b71-bd04-aae043dd8ab7.json new file mode 100644 index 0000000..7cd8607 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1cbb29f2-ac70-4b71-bd04-aae043dd8ab7.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--3b61bfe6-5325-4c1f-9cfc-23031362d353", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1cbb29f2-ac70-4b71-bd04-aae043dd8ab7", + "created": "2023-09-28T21:25:13.310174Z", + "modified": "2023-09-28T21:25:13.310174Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--8f3f1d6f-beda-4f20-b1a7-2d087ae453f7", + "target_ref": "attack-pattern--90b7e29e-1b62-485e-88b0-a4052cabafa4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1cd1484b-6de4-434e-8a8a-7085c9a12a3a.json b/generated_files/DISARM_STIX/relationship/relationship--1cd1484b-6de4-434e-8a8a-7085c9a12a3a.json new file mode 100644 index 0000000..5d62e78 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1cd1484b-6de4-434e-8a8a-7085c9a12a3a.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--fb042246-2cba-4c04-a35c-3b7e0a9686be", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1cd1484b-6de4-434e-8a8a-7085c9a12a3a", + "created": "2023-09-28T21:25:13.309094Z", + "modified": "2023-09-28T21:25:13.309094Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--47fb2b79-fab3-421f-b989-47ee312f727d", + "target_ref": "attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1d13cd3a-7048-4c24-bceb-183a60a5ccd8.json b/generated_files/DISARM_STIX/relationship/relationship--1d13cd3a-7048-4c24-bceb-183a60a5ccd8.json new file mode 100644 index 0000000..3d3f595 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1d13cd3a-7048-4c24-bceb-183a60a5ccd8.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--80112b97-1838-49b3-8e1d-710ea8149dae", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1d13cd3a-7048-4c24-bceb-183a60a5ccd8", + "created": "2023-09-28T21:25:13.304146Z", + "modified": "2023-09-28T21:25:13.304146Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--1d917530-027d-4f82-b380-404c320dc783", + "target_ref": "attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--1f1585aa-9a8e-4a21-a408-823316fe099d.json b/generated_files/DISARM_STIX/relationship/relationship--1f1585aa-9a8e-4a21-a408-823316fe099d.json new file mode 100644 index 0000000..5a3d7c7 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--1f1585aa-9a8e-4a21-a408-823316fe099d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--35827789-c953-4d66-a5b7-364f87264a39", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--1f1585aa-9a8e-4a21-a408-823316fe099d", + "created": "2023-09-28T21:25:13.315703Z", + "modified": "2023-09-28T21:25:13.315703Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--1f7181dc-07e7-40a7-9894-8132b8390ba4", + "target_ref": "attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--21083b4e-b03c-4557-a65f-ba301b65a977.json b/generated_files/DISARM_STIX/relationship/relationship--21083b4e-b03c-4557-a65f-ba301b65a977.json new file mode 100644 index 0000000..4105e7a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--21083b4e-b03c-4557-a65f-ba301b65a977.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--cf289bfe-f161-4b29-9726-27dda3b032ff", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--21083b4e-b03c-4557-a65f-ba301b65a977", + "created": "2023-09-28T21:25:13.313462Z", + "modified": "2023-09-28T21:25:13.313462Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--8f83d6b8-01f4-406c-a3da-48a040e46139", + "target_ref": "attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--221adc47-6d21-449a-8b5f-76fe164694b5.json b/generated_files/DISARM_STIX/relationship/relationship--221adc47-6d21-449a-8b5f-76fe164694b5.json new file mode 100644 index 0000000..db77765 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--221adc47-6d21-449a-8b5f-76fe164694b5.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2814887f-f214-48cc-b2d6-25e3bdf55afa", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--221adc47-6d21-449a-8b5f-76fe164694b5", + "created": "2023-09-28T21:25:13.32232Z", + "modified": "2023-09-28T21:25:13.32232Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--719b15f1-fb7d-49f4-97ca-7ba5ab09da6d", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--222f23fe-c21d-4ec6-b727-3a96c489e27e.json b/generated_files/DISARM_STIX/relationship/relationship--222f23fe-c21d-4ec6-b727-3a96c489e27e.json new file mode 100644 index 0000000..e5d30cb --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--222f23fe-c21d-4ec6-b727-3a96c489e27e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--fa1bd7b3-17ec-4062-bf6f-283b9d86d852", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--222f23fe-c21d-4ec6-b727-3a96c489e27e", + "created": "2023-09-28T21:25:13.305365Z", + "modified": "2023-09-28T21:25:13.305365Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--45ab5d9e-88ee-494c-971b-6e4babf1dc34", + "target_ref": "attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--23d6f2b7-e5a8-46b3-bf33-871d9913382a.json b/generated_files/DISARM_STIX/relationship/relationship--23d6f2b7-e5a8-46b3-bf33-871d9913382a.json new file mode 100644 index 0000000..1b24b50 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--23d6f2b7-e5a8-46b3-bf33-871d9913382a.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--f329de14-8bf8-4899-b5b8-bb2147c03a24", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--23d6f2b7-e5a8-46b3-bf33-871d9913382a", + "created": "2023-09-28T21:25:13.314581Z", + "modified": "2023-09-28T21:25:13.314581Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ddc4a9e6-a371-4f16-91b6-c71139a154ce", + "target_ref": "attack-pattern--5e7541d8-2b43-4443-89d9-7362ca78944c", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--23fcb11f-ec59-4635-874e-364c42fda046.json b/generated_files/DISARM_STIX/relationship/relationship--23fcb11f-ec59-4635-874e-364c42fda046.json new file mode 100644 index 0000000..9842201 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--23fcb11f-ec59-4635-874e-364c42fda046.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ffa00e53-d532-4045-ab5f-81dad7211a93", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--23fcb11f-ec59-4635-874e-364c42fda046", + "created": "2023-09-28T21:25:13.321113Z", + "modified": "2023-09-28T21:25:13.321113Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7ff061e5-cc6e-4d6a-9d0c-dbdf4c869c57", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--242058fd-ea97-4dfe-8efc-cdd2b42ef1d5.json b/generated_files/DISARM_STIX/relationship/relationship--242058fd-ea97-4dfe-8efc-cdd2b42ef1d5.json new file mode 100644 index 0000000..870ab8a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--242058fd-ea97-4dfe-8efc-cdd2b42ef1d5.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--d9033208-c1a6-4adf-aa41-015440c4af66", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--242058fd-ea97-4dfe-8efc-cdd2b42ef1d5", + "created": "2023-09-28T21:25:13.303684Z", + "modified": "2023-09-28T21:25:13.303684Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--cec91e97-76c8-4a1f-8397-a06939a558ef", + "target_ref": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2638243c-f883-4310-a286-5cc04fd50672.json b/generated_files/DISARM_STIX/relationship/relationship--2638243c-f883-4310-a286-5cc04fd50672.json new file mode 100644 index 0000000..29b268b --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2638243c-f883-4310-a286-5cc04fd50672.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--df9e3ca5-a798-48bc-abbb-bdf03c787e18", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2638243c-f883-4310-a286-5cc04fd50672", + "created": "2023-09-28T21:25:13.32352Z", + "modified": "2023-09-28T21:25:13.32352Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ad0ef979-9552-4906-8006-077db6789103", + "target_ref": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--26980a38-e560-4c54-ac4d-97bc0748d477.json b/generated_files/DISARM_STIX/relationship/relationship--26980a38-e560-4c54-ac4d-97bc0748d477.json new file mode 100644 index 0000000..78179f2 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--26980a38-e560-4c54-ac4d-97bc0748d477.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--c592e9fe-ec3e-4944-9232-a703f16b3518", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--26980a38-e560-4c54-ac4d-97bc0748d477", + "created": "2023-09-28T21:25:13.31943Z", + "modified": "2023-09-28T21:25:13.31943Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a925711a-dbfb-41b1-bd81-70d41dbaa69c", + "target_ref": "attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--26a97319-2b6f-4e55-a9ab-7cb1c88edf64.json b/generated_files/DISARM_STIX/relationship/relationship--26a97319-2b6f-4e55-a9ab-7cb1c88edf64.json new file mode 100644 index 0000000..c330a52 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--26a97319-2b6f-4e55-a9ab-7cb1c88edf64.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--5f5ca5ae-90e9-42d9-87ce-6b1e4b3b20da", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--26a97319-2b6f-4e55-a9ab-7cb1c88edf64", + "created": "2023-09-28T21:25:13.314953Z", + "modified": "2023-09-28T21:25:13.314953Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9b667c6e-5bc3-4c1e-b114-6f679a662b5d", + "target_ref": "attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--28ad3c67-ffbd-4dc0-a1ba-6fc973414137.json b/generated_files/DISARM_STIX/relationship/relationship--28ad3c67-ffbd-4dc0-a1ba-6fc973414137.json new file mode 100644 index 0000000..549d73e --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--28ad3c67-ffbd-4dc0-a1ba-6fc973414137.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ac3d2d4b-3e21-4c9f-be08-a4efb9403e4e", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--28ad3c67-ffbd-4dc0-a1ba-6fc973414137", + "created": "2023-09-28T21:25:13.318753Z", + "modified": "2023-09-28T21:25:13.318753Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--8b991b67-9df8-42e7-b11a-5ed1bc41c5a5", + "target_ref": "attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2a7181ec-b4e6-4cb4-8c5b-9eda82fb3951.json b/generated_files/DISARM_STIX/relationship/relationship--2a7181ec-b4e6-4cb4-8c5b-9eda82fb3951.json new file mode 100644 index 0000000..d4d3dda --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2a7181ec-b4e6-4cb4-8c5b-9eda82fb3951.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--8a2a012f-a746-4184-a407-59f1465e1313", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2a7181ec-b4e6-4cb4-8c5b-9eda82fb3951", + "created": "2023-09-28T21:25:13.322148Z", + "modified": "2023-09-28T21:25:13.322148Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--07070de8-0d3f-41f6-9861-33c090bbeaf2", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2a792d57-5ddc-4108-8deb-72589e1807ac.json b/generated_files/DISARM_STIX/relationship/relationship--2a792d57-5ddc-4108-8deb-72589e1807ac.json new file mode 100644 index 0000000..65bd639 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2a792d57-5ddc-4108-8deb-72589e1807ac.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--e613e8f8-76d2-4609-add1-aa8a5404f5ae", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2a792d57-5ddc-4108-8deb-72589e1807ac", + "created": "2023-09-28T21:25:13.301714Z", + "modified": "2023-09-28T21:25:13.301714Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--84e0fdf7-3bba-4e66-a575-6a32a7f8eca6", + "target_ref": "attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2b9a7413-22f8-42eb-8a03-a17ac2c84842.json b/generated_files/DISARM_STIX/relationship/relationship--2b9a7413-22f8-42eb-8a03-a17ac2c84842.json new file mode 100644 index 0000000..24a4cdd --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2b9a7413-22f8-42eb-8a03-a17ac2c84842.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--746acd82-9f41-4d8b-bde5-c53dc03e80cf", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2b9a7413-22f8-42eb-8a03-a17ac2c84842", + "created": "2023-09-28T21:25:13.31659Z", + "modified": "2023-09-28T21:25:13.31659Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803", + "target_ref": "attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2c56f3c2-d331-4c72-ba1f-8eeda6504938.json b/generated_files/DISARM_STIX/relationship/relationship--2c56f3c2-d331-4c72-ba1f-8eeda6504938.json new file mode 100644 index 0000000..0d3ff91 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2c56f3c2-d331-4c72-ba1f-8eeda6504938.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--fc61b417-c379-4d43-858a-d4434b7837e0", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2c56f3c2-d331-4c72-ba1f-8eeda6504938", + "created": "2023-09-28T21:25:13.311052Z", + "modified": "2023-09-28T21:25:13.311052Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9b081fd3-0714-483e-bd7b-a30defc85cd2", + "target_ref": "attack-pattern--283333f5-e161-4195-9070-5a7c22505adf", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2cd939f3-d2f7-4280-8a22-fd8de7108808.json b/generated_files/DISARM_STIX/relationship/relationship--2cd939f3-d2f7-4280-8a22-fd8de7108808.json new file mode 100644 index 0000000..0c0b6c9 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2cd939f3-d2f7-4280-8a22-fd8de7108808.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--712747df-4240-475d-a552-67dd16995ac0", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2cd939f3-d2f7-4280-8a22-fd8de7108808", + "created": "2023-09-28T21:25:13.304912Z", + "modified": "2023-09-28T21:25:13.304912Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9b66eaf5-5b03-46b8-b076-cf1da3593745", + "target_ref": "attack-pattern--5414f74d-0b10-4562-ad9d-e5e1093e255a", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2cf3a76e-c3af-41ef-b2fa-a76d38b5e610.json b/generated_files/DISARM_STIX/relationship/relationship--2cf3a76e-c3af-41ef-b2fa-a76d38b5e610.json new file mode 100644 index 0000000..f03d5ad --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2cf3a76e-c3af-41ef-b2fa-a76d38b5e610.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ad225175-a834-4a2c-8c0f-16428c969a2a", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2cf3a76e-c3af-41ef-b2fa-a76d38b5e610", + "created": "2023-09-28T21:25:13.323285Z", + "modified": "2023-09-28T21:25:13.323285Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9c01fab2-42dc-423b-96fe-a478a29e5b81", + "target_ref": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2dd34581-f3ee-4ee7-9fdc-ac2ec2f7fd91.json b/generated_files/DISARM_STIX/relationship/relationship--2dd34581-f3ee-4ee7-9fdc-ac2ec2f7fd91.json new file mode 100644 index 0000000..8491910 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2dd34581-f3ee-4ee7-9fdc-ac2ec2f7fd91.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--243d339c-0bfb-4174-a9cf-635244af79a4", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2dd34581-f3ee-4ee7-9fdc-ac2ec2f7fd91", + "created": "2023-09-28T21:25:13.303881Z", + "modified": "2023-09-28T21:25:13.303881Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--f601eb03-79d0-4c00-b07d-4b4647c37efd", + "target_ref": "attack-pattern--0102376a-e896-4191-b3fb-e58188301822", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2e33fea8-7a87-40d4-ab64-ac6ec4734c62.json b/generated_files/DISARM_STIX/relationship/relationship--2e33fea8-7a87-40d4-ab64-ac6ec4734c62.json new file mode 100644 index 0000000..5b84c0e --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2e33fea8-7a87-40d4-ab64-ac6ec4734c62.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--d5c1604b-5eb7-47f9-be64-51df6ae76b99", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2e33fea8-7a87-40d4-ab64-ac6ec4734c62", + "created": "2023-09-28T21:25:13.306468Z", + "modified": "2023-09-28T21:25:13.306468Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a3fe7752-dbfa-4918-912f-c492c8593c68", + "target_ref": "attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2f422aa3-6991-4604-acca-b919414096d4.json b/generated_files/DISARM_STIX/relationship/relationship--2f422aa3-6991-4604-acca-b919414096d4.json new file mode 100644 index 0000000..0a5522e --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2f422aa3-6991-4604-acca-b919414096d4.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--69667f57-26d8-4f9c-872c-47fbed4f08dd", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2f422aa3-6991-4604-acca-b919414096d4", + "created": "2023-09-28T21:25:13.320884Z", + "modified": "2023-09-28T21:25:13.320884Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--afb60a6d-8299-4b2c-abda-6e11e4a65a4b", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--2f835e5e-a5db-48bf-b4c7-f5d88d87b5b6.json b/generated_files/DISARM_STIX/relationship/relationship--2f835e5e-a5db-48bf-b4c7-f5d88d87b5b6.json new file mode 100644 index 0000000..e072ed5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--2f835e5e-a5db-48bf-b4c7-f5d88d87b5b6.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--dab1eb65-d66e-49fa-88ce-0b2539c81eab", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--2f835e5e-a5db-48bf-b4c7-f5d88d87b5b6", + "created": "2023-09-28T21:25:13.316471Z", + "modified": "2023-09-28T21:25:13.316471Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9affd892-2479-4843-99d1-1e1a9f7f1020", + "target_ref": "attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--31fc417f-6b34-4eaa-a0f4-cb2e207bb397.json b/generated_files/DISARM_STIX/relationship/relationship--31fc417f-6b34-4eaa-a0f4-cb2e207bb397.json new file mode 100644 index 0000000..3edc287 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--31fc417f-6b34-4eaa-a0f4-cb2e207bb397.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--f1b80476-b5a1-4b3d-992f-d9f02d4362d8", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--31fc417f-6b34-4eaa-a0f4-cb2e207bb397", + "created": "2023-09-28T21:25:13.304321Z", + "modified": "2023-09-28T21:25:13.304321Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a468ff54-27eb-4e6d-b709-a9830017df86", + "target_ref": "attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--354db141-46a3-4702-8d58-a281a85d1741.json b/generated_files/DISARM_STIX/relationship/relationship--354db141-46a3-4702-8d58-a281a85d1741.json new file mode 100644 index 0000000..db1a059 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--354db141-46a3-4702-8d58-a281a85d1741.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--d05eb1df-2e1f-4975-841a-c3c6d36e2acd", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--354db141-46a3-4702-8d58-a281a85d1741", + "created": "2023-09-28T21:25:13.302833Z", + "modified": "2023-09-28T21:25:13.302833Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--5bc895e8-eb26-43ec-8469-ab665092970d", + "target_ref": "attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--360b5943-0c7e-46fb-8dd9-36d772c89ef5.json b/generated_files/DISARM_STIX/relationship/relationship--360b5943-0c7e-46fb-8dd9-36d772c89ef5.json new file mode 100644 index 0000000..02d7766 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--360b5943-0c7e-46fb-8dd9-36d772c89ef5.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--8ccac942-758a-4325-ab3d-200904b19b10", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--360b5943-0c7e-46fb-8dd9-36d772c89ef5", + "created": "2023-09-28T21:25:13.309566Z", + "modified": "2023-09-28T21:25:13.309566Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c7017017-4965-4dad-a970-e748b7080a19", + "target_ref": "attack-pattern--c1182f49-4318-486f-81be-d44b99300343", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--38065edb-340a-442c-b9db-cfd32663655d.json b/generated_files/DISARM_STIX/relationship/relationship--38065edb-340a-442c-b9db-cfd32663655d.json new file mode 100644 index 0000000..d411c9e --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--38065edb-340a-442c-b9db-cfd32663655d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--e7bb5df9-317d-467b-8b0d-7c9e5c9dde52", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--38065edb-340a-442c-b9db-cfd32663655d", + "created": "2023-09-28T21:25:13.318421Z", + "modified": "2023-09-28T21:25:13.318421Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--331a83bb-2e5b-4c49-9446-e78a8f25b4eb", + "target_ref": "attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--38a3f8f3-c6d8-4e08-8ba6-3bbb88a5201f.json b/generated_files/DISARM_STIX/relationship/relationship--38a3f8f3-c6d8-4e08-8ba6-3bbb88a5201f.json new file mode 100644 index 0000000..0bac592 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--38a3f8f3-c6d8-4e08-8ba6-3bbb88a5201f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--055eaa1c-100d-4bc1-8e31-a8bca2bb8372", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--38a3f8f3-c6d8-4e08-8ba6-3bbb88a5201f", + "created": "2023-09-28T21:25:13.320537Z", + "modified": "2023-09-28T21:25:13.320537Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--d4be8c47-0d9b-4f45-9978-889f146a75c7", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--38fc584f-23ba-4b00-b931-7e58184534a9.json b/generated_files/DISARM_STIX/relationship/relationship--38fc584f-23ba-4b00-b931-7e58184534a9.json new file mode 100644 index 0000000..654b94f --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--38fc584f-23ba-4b00-b931-7e58184534a9.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2d576c90-72c4-4628-9bbc-54996206a271", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--38fc584f-23ba-4b00-b931-7e58184534a9", + "created": "2023-09-28T21:25:13.302678Z", + "modified": "2023-09-28T21:25:13.302678Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--127c5166-e619-42d7-a0f7-0cf0595bcdeb", + "target_ref": "attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--39bfb524-e80f-42a8-ac7a-80dfb3d89686.json b/generated_files/DISARM_STIX/relationship/relationship--39bfb524-e80f-42a8-ac7a-80dfb3d89686.json new file mode 100644 index 0000000..8d54dbc --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--39bfb524-e80f-42a8-ac7a-80dfb3d89686.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2ee2c725-4edc-4333-9cc1-327a76e31c07", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--39bfb524-e80f-42a8-ac7a-80dfb3d89686", + "created": "2023-09-28T21:25:13.323403Z", + "modified": "2023-09-28T21:25:13.323403Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--10d6ca0f-6fea-4ec0-b5c8-d55ddeabcc40", + "target_ref": "attack-pattern--62ace91e-ad46-4ea7-ab76-334e09ea16a4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--3a3a2972-cd03-4067-aadc-1c82aa6728f0.json b/generated_files/DISARM_STIX/relationship/relationship--3a3a2972-cd03-4067-aadc-1c82aa6728f0.json new file mode 100644 index 0000000..8a66ed8 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--3a3a2972-cd03-4067-aadc-1c82aa6728f0.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--232144e0-33e1-49b6-a356-bb633923189c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--3a3a2972-cd03-4067-aadc-1c82aa6728f0", + "created": "2023-09-28T21:25:13.30444Z", + "modified": "2023-09-28T21:25:13.30444Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e499df14-e898-4e4f-be58-67266915e7b2", + "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--3baa67d4-db7a-4f55-9296-6b8d101eeba0.json b/generated_files/DISARM_STIX/relationship/relationship--3baa67d4-db7a-4f55-9296-6b8d101eeba0.json new file mode 100644 index 0000000..12eb816 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--3baa67d4-db7a-4f55-9296-6b8d101eeba0.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--aef19518-fc19-416e-97c4-a1bf29f18b78", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--3baa67d4-db7a-4f55-9296-6b8d101eeba0", + "created": "2023-09-28T21:25:13.310461Z", + "modified": "2023-09-28T21:25:13.310461Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--2d9a40e8-fbb5-40c7-b23e-61d5d92b5321", + "target_ref": "attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--3d7e29f5-b52b-4303-977a-831d14b8e9fc.json b/generated_files/DISARM_STIX/relationship/relationship--3d7e29f5-b52b-4303-977a-831d14b8e9fc.json new file mode 100644 index 0000000..19ecf16 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--3d7e29f5-b52b-4303-977a-831d14b8e9fc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--e1e915b3-2385-4cb2-813b-99ff5700e49b", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--3d7e29f5-b52b-4303-977a-831d14b8e9fc", + "created": "2023-09-28T21:25:13.320002Z", + "modified": "2023-09-28T21:25:13.320002Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--4c5e704a-acca-4bbd-8980-c915c0424ff8", + "target_ref": "attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--3dbcafc5-32cc-470b-b465-09ce53ef2a82.json b/generated_files/DISARM_STIX/relationship/relationship--3dbcafc5-32cc-470b-b465-09ce53ef2a82.json new file mode 100644 index 0000000..ddf5d96 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--3dbcafc5-32cc-470b-b465-09ce53ef2a82.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--b6fe53ec-085d-4220-b2b2-dd31e2d7828f", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--3dbcafc5-32cc-470b-b465-09ce53ef2a82", + "created": "2023-09-28T21:25:13.315071Z", + "modified": "2023-09-28T21:25:13.315071Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--556fa171-ffd0-4787-84fa-171b99c703b5", + "target_ref": "attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--3e433283-4102-42b5-8481-dc6be7a6345a.json b/generated_files/DISARM_STIX/relationship/relationship--3e433283-4102-42b5-8481-dc6be7a6345a.json new file mode 100644 index 0000000..062a8e4 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--3e433283-4102-42b5-8481-dc6be7a6345a.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--35704b8c-ceba-41c8-9fc2-7bbc98d396fb", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--3e433283-4102-42b5-8481-dc6be7a6345a", + "created": "2023-09-28T21:25:13.322558Z", + "modified": "2023-09-28T21:25:13.322558Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--acc70582-c43a-4ed1-ab78-19e56ad4d4ed", + "target_ref": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--3e7b3e82-9ff6-4d5a-8736-871eaf0dcaac.json b/generated_files/DISARM_STIX/relationship/relationship--3e7b3e82-9ff6-4d5a-8736-871eaf0dcaac.json new file mode 100644 index 0000000..475e4ab --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--3e7b3e82-9ff6-4d5a-8736-871eaf0dcaac.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--3ee504f2-10c7-4ec1-b8e5-70a5eaf5ec17", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--3e7b3e82-9ff6-4d5a-8736-871eaf0dcaac", + "created": "2023-09-28T21:25:13.306105Z", + "modified": "2023-09-28T21:25:13.306105Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--594993b4-86a3-455b-af59-61f167d7fd93", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--416d66ec-fb1e-4f04-9cc2-4cb309acbe47.json b/generated_files/DISARM_STIX/relationship/relationship--416d66ec-fb1e-4f04-9cc2-4cb309acbe47.json new file mode 100644 index 0000000..cc0696f --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--416d66ec-fb1e-4f04-9cc2-4cb309acbe47.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--00defcac-22ed-4338-a526-ee9f27bc39c5", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--416d66ec-fb1e-4f04-9cc2-4cb309acbe47", + "created": "2023-09-28T21:25:13.316713Z", + "modified": "2023-09-28T21:25:13.316713Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--5bca3084-f5b0-48a8-934c-7f2c03bfd2c3", + "target_ref": "attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--41d3b54b-e7d9-454b-98c1-4c8ea8828504.json b/generated_files/DISARM_STIX/relationship/relationship--41d3b54b-e7d9-454b-98c1-4c8ea8828504.json new file mode 100644 index 0000000..5328f49 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--41d3b54b-e7d9-454b-98c1-4c8ea8828504.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--05b3d979-c52c-4dab-bedf-27b4a15419ae", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--41d3b54b-e7d9-454b-98c1-4c8ea8828504", + "created": "2023-09-28T21:25:13.308741Z", + "modified": "2023-09-28T21:25:13.308741Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--81abb4fa-705e-430f-ba54-34bf7bd467f7", + "target_ref": "attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--45abe113-7744-427c-8fea-aa9aa3e6e75e.json b/generated_files/DISARM_STIX/relationship/relationship--45abe113-7744-427c-8fea-aa9aa3e6e75e.json new file mode 100644 index 0000000..1c5f875 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--45abe113-7744-427c-8fea-aa9aa3e6e75e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--b5884146-caf6-4fff-9d59-809e61205d13", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--45abe113-7744-427c-8fea-aa9aa3e6e75e", + "created": "2023-09-28T21:25:13.301453Z", + "modified": "2023-09-28T21:25:13.301453Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--eb63894c-aad1-47f0-98ee-0fa5e07ed3f3", + "target_ref": "attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--4671ee5d-89c1-44d5-aa6e-19a3bbf6d7a8.json b/generated_files/DISARM_STIX/relationship/relationship--4671ee5d-89c1-44d5-aa6e-19a3bbf6d7a8.json new file mode 100644 index 0000000..09e675b --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--4671ee5d-89c1-44d5-aa6e-19a3bbf6d7a8.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--06fa686a-dea2-46aa-8df3-6ff8d55ce641", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--4671ee5d-89c1-44d5-aa6e-19a3bbf6d7a8", + "created": "2023-09-28T21:25:13.318328Z", + "modified": "2023-09-28T21:25:13.318328Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a09594d3-c930-451a-8eb6-7e2d748618bb", + "target_ref": "attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--49b6e6aa-a64c-4446-8075-68ae68ad0649.json b/generated_files/DISARM_STIX/relationship/relationship--49b6e6aa-a64c-4446-8075-68ae68ad0649.json new file mode 100644 index 0000000..d4f07c9 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--49b6e6aa-a64c-4446-8075-68ae68ad0649.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--aabbae0c-f67e-45c1-8708-ed10ccb32004", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--49b6e6aa-a64c-4446-8075-68ae68ad0649", + "created": "2023-09-28T21:25:13.30559Z", + "modified": "2023-09-28T21:25:13.30559Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--45d10a80-a2f7-4626-ae2c-dae8cf144157", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--4b02b327-9691-48a2-b709-c0065adfba7c.json b/generated_files/DISARM_STIX/relationship/relationship--4b02b327-9691-48a2-b709-c0065adfba7c.json new file mode 100644 index 0000000..4d4addc --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--4b02b327-9691-48a2-b709-c0065adfba7c.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--14ecb598-ae32-4bfc-a13e-45b7208bb0a6", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--4b02b327-9691-48a2-b709-c0065adfba7c", + "created": "2023-09-28T21:25:13.305835Z", + "modified": "2023-09-28T21:25:13.305835Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--8ecbc28c-36e9-4d9a-8578-b9e20552d732", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--4bc5bed3-f769-4cd5-a122-d09a2c5eab3f.json b/generated_files/DISARM_STIX/relationship/relationship--4bc5bed3-f769-4cd5-a122-d09a2c5eab3f.json new file mode 100644 index 0000000..aa2644c --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--4bc5bed3-f769-4cd5-a122-d09a2c5eab3f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--53107efc-d3e3-4c6d-841d-8439787b235f", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--4bc5bed3-f769-4cd5-a122-d09a2c5eab3f", + "created": "2023-09-28T21:25:13.303786Z", + "modified": "2023-09-28T21:25:13.303786Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7b32abce-e101-4dc3-98db-30b79c0c8397", + "target_ref": "attack-pattern--0102376a-e896-4191-b3fb-e58188301822", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--4db60e48-5e6d-4f8c-be48-c83b9ea4a0c6.json b/generated_files/DISARM_STIX/relationship/relationship--4db60e48-5e6d-4f8c-be48-c83b9ea4a0c6.json new file mode 100644 index 0000000..6bdeb93 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--4db60e48-5e6d-4f8c-be48-c83b9ea4a0c6.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--992654d3-151c-4f52-ab28-0e3bbe010af6", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--4db60e48-5e6d-4f8c-be48-c83b9ea4a0c6", + "created": "2023-09-28T21:25:13.318233Z", + "modified": "2023-09-28T21:25:13.318233Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--dd415f9d-ce3a-44c6-9237-f8ceeb52a6a3", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--5110d730-2ef5-4f87-a9ae-60c99a3499a2.json b/generated_files/DISARM_STIX/relationship/relationship--5110d730-2ef5-4f87-a9ae-60c99a3499a2.json new file mode 100644 index 0000000..d9d803a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--5110d730-2ef5-4f87-a9ae-60c99a3499a2.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--6c34fc76-914f-4c64-a59a-db7f7bc559a1", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--5110d730-2ef5-4f87-a9ae-60c99a3499a2", + "created": "2023-09-28T21:25:13.306193Z", + "modified": "2023-09-28T21:25:13.306193Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7d69d231-78a6-4a98-a715-c0edd9adafce", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--5193e359-4f2e-413c-85bf-f660c207345b.json b/generated_files/DISARM_STIX/relationship/relationship--5193e359-4f2e-413c-85bf-f660c207345b.json new file mode 100644 index 0000000..173c5d1 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--5193e359-4f2e-413c-85bf-f660c207345b.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--320d159e-6330-4efd-9a99-dd4a10c5fc2a", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--5193e359-4f2e-413c-85bf-f660c207345b", + "created": "2023-09-28T21:25:13.308828Z", + "modified": "2023-09-28T21:25:13.308828Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--58643f4a-7699-4cd7-aafa-76a3e6e09e99", + "target_ref": "attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--52b0d991-78dd-4dd6-bce1-51dbc4f68dc2.json b/generated_files/DISARM_STIX/relationship/relationship--52b0d991-78dd-4dd6-bce1-51dbc4f68dc2.json new file mode 100644 index 0000000..77f20c5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--52b0d991-78dd-4dd6-bce1-51dbc4f68dc2.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--d16bc927-91f6-4bb0-8d1a-9aeb07e9d6ac", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--52b0d991-78dd-4dd6-bce1-51dbc4f68dc2", + "created": "2023-09-28T21:25:13.308324Z", + "modified": "2023-09-28T21:25:13.308324Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--283453fd-36c5-4d66-b24d-f29ea35fa8a1", + "target_ref": "attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--5438b7e4-45ef-4962-932d-c49145ba7afe.json b/generated_files/DISARM_STIX/relationship/relationship--5438b7e4-45ef-4962-932d-c49145ba7afe.json new file mode 100644 index 0000000..2c7112b --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--5438b7e4-45ef-4962-932d-c49145ba7afe.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--9611a1c2-5993-43bc-aede-143caf57c634", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--5438b7e4-45ef-4962-932d-c49145ba7afe", + "created": "2023-09-28T21:25:13.308464Z", + "modified": "2023-09-28T21:25:13.308464Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--db93e285-c516-40b0-bb5a-36bbaf5c08b9", + "target_ref": "attack-pattern--6f020d80-d267-4e2a-8cd0-6d0dabe84f3a", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--54ab5bff-ae5b-4bd4-9393-eda93a8af259.json b/generated_files/DISARM_STIX/relationship/relationship--54ab5bff-ae5b-4bd4-9393-eda93a8af259.json new file mode 100644 index 0000000..d1a4d40 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--54ab5bff-ae5b-4bd4-9393-eda93a8af259.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--057328c6-4b8b-4321-aadd-25cded521304", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--54ab5bff-ae5b-4bd4-9393-eda93a8af259", + "created": "2023-09-28T21:25:13.313347Z", + "modified": "2023-09-28T21:25:13.313347Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--35444e68-bb94-44ad-aecf-fff893f3d0ca", + "target_ref": "attack-pattern--026571cc-66db-42fb-9de3-790e1e7f243d", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--584b0c90-bedb-4800-8eb4-4bfa8d42ab61.json b/generated_files/DISARM_STIX/relationship/relationship--584b0c90-bedb-4800-8eb4-4bfa8d42ab61.json new file mode 100644 index 0000000..ba13e97 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--584b0c90-bedb-4800-8eb4-4bfa8d42ab61.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a79829bb-f79c-402c-9d63-f272173239a6", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--584b0c90-bedb-4800-8eb4-4bfa8d42ab61", + "created": "2023-09-28T21:25:13.319327Z", + "modified": "2023-09-28T21:25:13.319327Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c25ad637-cfa5-40c0-a23c-f741d8f4319e", + "target_ref": "attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--59564f74-5b78-4798-ba7e-2b1c3cbbd9b8.json b/generated_files/DISARM_STIX/relationship/relationship--59564f74-5b78-4798-ba7e-2b1c3cbbd9b8.json new file mode 100644 index 0000000..4d38836 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--59564f74-5b78-4798-ba7e-2b1c3cbbd9b8.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2bed870a-a12c-4fe7-8c8e-05363edb3b03", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--59564f74-5b78-4798-ba7e-2b1c3cbbd9b8", + "created": "2023-09-28T21:25:13.301194Z", + "modified": "2023-09-28T21:25:13.301194Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--348c10cd-e24e-409e-a6eb-983f85c1e590", + "target_ref": "attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--5a4d7b35-8c11-4dd1-804a-93705ecb600c.json b/generated_files/DISARM_STIX/relationship/relationship--5a4d7b35-8c11-4dd1-804a-93705ecb600c.json new file mode 100644 index 0000000..6087836 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--5a4d7b35-8c11-4dd1-804a-93705ecb600c.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--6f03a58f-7af5-4fb9-9a31-e9ffe5202611", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--5a4d7b35-8c11-4dd1-804a-93705ecb600c", + "created": "2023-09-28T21:25:13.303506Z", + "modified": "2023-09-28T21:25:13.303506Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ce5b400c-6f82-4095-936b-617857800da8", + "target_ref": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--5abf77c7-3b18-41f7-b920-1dfe7dd21a6d.json b/generated_files/DISARM_STIX/relationship/relationship--5abf77c7-3b18-41f7-b920-1dfe7dd21a6d.json new file mode 100644 index 0000000..48cec39 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--5abf77c7-3b18-41f7-b920-1dfe7dd21a6d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--cfd9a9e2-a23b-4c0f-83fc-25bceeb503ad", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--5abf77c7-3b18-41f7-b920-1dfe7dd21a6d", + "created": "2023-09-28T21:25:13.313231Z", + "modified": "2023-09-28T21:25:13.313231Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--27061558-ebf9-402b-b8e2-0c7c9d86aea5", + "target_ref": "attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--5cd15fbc-6838-493f-8761-a22f3fdc8512.json b/generated_files/DISARM_STIX/relationship/relationship--5cd15fbc-6838-493f-8761-a22f3fdc8512.json new file mode 100644 index 0000000..9a0d708 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--5cd15fbc-6838-493f-8761-a22f3fdc8512.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--e04fd824-e454-446a-b80d-db7fce1e304d", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--5cd15fbc-6838-493f-8761-a22f3fdc8512", + "created": "2023-09-28T21:25:13.310699Z", + "modified": "2023-09-28T21:25:13.310699Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9b3efc53-3a9e-45e7-8a26-dd2c4a305fd2", + "target_ref": "attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--5f02d567-ad54-4355-8bbf-6b1e991d6921.json b/generated_files/DISARM_STIX/relationship/relationship--5f02d567-ad54-4355-8bbf-6b1e991d6921.json new file mode 100644 index 0000000..04c673a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--5f02d567-ad54-4355-8bbf-6b1e991d6921.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--edb74826-cac3-468f-813c-f19f10d4a630", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--5f02d567-ad54-4355-8bbf-6b1e991d6921", + "created": "2023-09-28T21:25:13.305255Z", + "modified": "2023-09-28T21:25:13.305255Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--5a279d23-6ba2-425c-bf72-20c6411ca5a7", + "target_ref": "attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--600710ac-d759-49a3-bb55-ae1a647c7e48.json b/generated_files/DISARM_STIX/relationship/relationship--600710ac-d759-49a3-bb55-ae1a647c7e48.json new file mode 100644 index 0000000..bf4e588 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--600710ac-d759-49a3-bb55-ae1a647c7e48.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--404f4cf1-4e43-4bc6-ac70-9eebb8edf33c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--600710ac-d759-49a3-bb55-ae1a647c7e48", + "created": "2023-09-28T21:25:13.312447Z", + "modified": "2023-09-28T21:25:13.312447Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--35d89673-deef-482e-b30d-bb6883e47b12", + "target_ref": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--600f39f7-93a6-4d29-a2d1-dfd6a249e015.json b/generated_files/DISARM_STIX/relationship/relationship--600f39f7-93a6-4d29-a2d1-dfd6a249e015.json new file mode 100644 index 0000000..d3e0d04 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--600f39f7-93a6-4d29-a2d1-dfd6a249e015.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--f13f0880-2992-4168-b9e7-896f5a38f6d7", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--600f39f7-93a6-4d29-a2d1-dfd6a249e015", + "created": "2023-09-28T21:25:13.309808Z", + "modified": "2023-09-28T21:25:13.309808Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--8f545c7e-f2ba-4541-9004-dbe50fcc0b0f", + "target_ref": "attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--65c01586-dc82-44fc-aba8-2dfa81cd26d7.json b/generated_files/DISARM_STIX/relationship/relationship--65c01586-dc82-44fc-aba8-2dfa81cd26d7.json new file mode 100644 index 0000000..a051b62 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--65c01586-dc82-44fc-aba8-2dfa81cd26d7.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--053defbb-1ce5-44a4-a671-429fa4d361b6", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--65c01586-dc82-44fc-aba8-2dfa81cd26d7", + "created": "2023-09-28T21:25:13.300902Z", + "modified": "2023-09-28T21:25:13.300902Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--72207f73-5b54-4cd4-b453-746a61eb3e28", + "target_ref": "attack-pattern--61df6490-ca2c-41b7-a251-ded790a03a71", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--6992cfbd-e0c4-472d-833c-be1002939dce.json b/generated_files/DISARM_STIX/relationship/relationship--6992cfbd-e0c4-472d-833c-be1002939dce.json new file mode 100644 index 0000000..1011a34 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--6992cfbd-e0c4-472d-833c-be1002939dce.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2392d507-35a9-4cb2-8775-defde59fc1aa", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--6992cfbd-e0c4-472d-833c-be1002939dce", + "created": "2023-09-28T21:25:13.315583Z", + "modified": "2023-09-28T21:25:13.315583Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--d615efdc-7296-4254-90f5-99d2986d97fa", + "target_ref": "attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--6ad713fd-04c7-4a8f-a367-d4a6e122af19.json b/generated_files/DISARM_STIX/relationship/relationship--6ad713fd-04c7-4a8f-a367-d4a6e122af19.json new file mode 100644 index 0000000..98b1cd0 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--6ad713fd-04c7-4a8f-a367-d4a6e122af19.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--df36b08b-bad3-45a7-ba6f-efeec5ab1d61", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--6ad713fd-04c7-4a8f-a367-d4a6e122af19", + "created": "2023-09-28T21:25:13.313867Z", + "modified": "2023-09-28T21:25:13.313867Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--5daa2f8a-2460-4cdd-ae55-b70f439a9f51", + "target_ref": "attack-pattern--1997947a-7e08-4ea9-802c-85391d561266", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--6d62413f-450d-46ee-9e4c-7c2ce85627fa.json b/generated_files/DISARM_STIX/relationship/relationship--6d62413f-450d-46ee-9e4c-7c2ce85627fa.json new file mode 100644 index 0000000..0ccd748 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--6d62413f-450d-46ee-9e4c-7c2ce85627fa.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--9fbcbb62-7a1d-44ed-992f-a696de977f44", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--6d62413f-450d-46ee-9e4c-7c2ce85627fa", + "created": "2023-09-28T21:25:13.310052Z", + "modified": "2023-09-28T21:25:13.310052Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--64bcccb9-4d10-4eed-8c49-8816ecfd78a3", + "target_ref": "attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--6de3e6d0-345d-4188-b2aa-3e40e728063f.json b/generated_files/DISARM_STIX/relationship/relationship--6de3e6d0-345d-4188-b2aa-3e40e728063f.json new file mode 100644 index 0000000..a51dfc2 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--6de3e6d0-345d-4188-b2aa-3e40e728063f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ba72c447-1c1c-4971-b376-0d43717cb42d", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--6de3e6d0-345d-4188-b2aa-3e40e728063f", + "created": "2023-09-28T21:25:13.312294Z", + "modified": "2023-09-28T21:25:13.312294Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--62036130-6083-43e3-b1e0-8ab0822bedda", + "target_ref": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--6e9206f1-505a-46a4-b46c-7bd6319a3fdf.json b/generated_files/DISARM_STIX/relationship/relationship--6e9206f1-505a-46a4-b46c-7bd6319a3fdf.json new file mode 100644 index 0000000..072167c --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--6e9206f1-505a-46a4-b46c-7bd6319a3fdf.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ab7ba41e-0761-467c-bbf5-1e900c52fd8c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--6e9206f1-505a-46a4-b46c-7bd6319a3fdf", + "created": "2023-09-28T21:25:13.302108Z", + "modified": "2023-09-28T21:25:13.302108Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7d5ba27c-12c7-4a30-8624-e1ea6670f0f8", + "target_ref": "attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--6edf2c3d-d8fa-4d0c-b671-be651390453a.json b/generated_files/DISARM_STIX/relationship/relationship--6edf2c3d-d8fa-4d0c-b671-be651390453a.json new file mode 100644 index 0000000..b22000d --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--6edf2c3d-d8fa-4d0c-b671-be651390453a.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--d1046ebc-3372-4c36-85fc-41b24b0619ad", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--6edf2c3d-d8fa-4d0c-b671-be651390453a", + "created": "2023-09-28T21:25:13.305145Z", + "modified": "2023-09-28T21:25:13.305145Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--2cb5fe24-da3f-4cc7-aa76-6e3d38c537a1", + "target_ref": "attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--71241744-f535-4ce0-93fd-bb426f41bbf1.json b/generated_files/DISARM_STIX/relationship/relationship--71241744-f535-4ce0-93fd-bb426f41bbf1.json new file mode 100644 index 0000000..147b539 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--71241744-f535-4ce0-93fd-bb426f41bbf1.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--241eee8c-c6ee-4e3c-9b48-77443e79b3e7", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--71241744-f535-4ce0-93fd-bb426f41bbf1", + "created": "2023-09-28T21:25:13.308999Z", + "modified": "2023-09-28T21:25:13.308999Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ef3dcdcd-bd97-48e0-9d15-3e482a72c979", + "target_ref": "attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--720361b2-ad44-48da-8ba3-76da7617caa0.json b/generated_files/DISARM_STIX/relationship/relationship--720361b2-ad44-48da-8ba3-76da7617caa0.json new file mode 100644 index 0000000..818e290 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--720361b2-ad44-48da-8ba3-76da7617caa0.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--0e768836-e093-41dd-ab68-48268c33b614", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--720361b2-ad44-48da-8ba3-76da7617caa0", + "created": "2023-09-28T21:25:13.312783Z", + "modified": "2023-09-28T21:25:13.312783Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c26749da-f15d-48d7-ac1f-e2a2a49b9930", + "target_ref": "attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--73ce76e6-993e-49cd-ba9a-c34cb77e3e87.json b/generated_files/DISARM_STIX/relationship/relationship--73ce76e6-993e-49cd-ba9a-c34cb77e3e87.json new file mode 100644 index 0000000..aec5d52 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--73ce76e6-993e-49cd-ba9a-c34cb77e3e87.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--9b88a86d-6d0a-48c1-9cd7-b8be46b63007", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--73ce76e6-993e-49cd-ba9a-c34cb77e3e87", + "created": "2023-09-28T21:25:13.322019Z", + "modified": "2023-09-28T21:25:13.322019Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--37d7a656-a425-4ec8-8128-c39848350716", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--7447145f-b9e1-479d-9b2d-cfbda80c6b9d.json b/generated_files/DISARM_STIX/relationship/relationship--7447145f-b9e1-479d-9b2d-cfbda80c6b9d.json new file mode 100644 index 0000000..fb13e6e --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--7447145f-b9e1-479d-9b2d-cfbda80c6b9d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--46d6e1db-0c3a-4396-8d94-4f57e414a38d", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--7447145f-b9e1-479d-9b2d-cfbda80c6b9d", + "created": "2023-09-28T21:25:13.304793Z", + "modified": "2023-09-28T21:25:13.304793Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--6921234b-a646-4a18-88cf-e70fc8ffc874", + "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--74ba9cc0-cf78-4020-b648-e87d0255a902.json b/generated_files/DISARM_STIX/relationship/relationship--74ba9cc0-cf78-4020-b648-e87d0255a902.json new file mode 100644 index 0000000..17b8ddb --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--74ba9cc0-cf78-4020-b648-e87d0255a902.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--5891a8f3-0a2e-46bd-81b8-617ee4e305ba", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--74ba9cc0-cf78-4020-b648-e87d0255a902", + "created": "2023-09-28T21:25:13.31399Z", + "modified": "2023-09-28T21:25:13.31399Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--5251f6d0-6820-4617-afef-a0d8acafd3c1", + "target_ref": "attack-pattern--318f2a34-07b6-4c4b-9bb0-58f5bca681fc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--75309c18-b540-47bd-83a1-8a46cc297145.json b/generated_files/DISARM_STIX/relationship/relationship--75309c18-b540-47bd-83a1-8a46cc297145.json new file mode 100644 index 0000000..f70a5b9 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--75309c18-b540-47bd-83a1-8a46cc297145.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--b539723d-5ba2-4af4-92e5-b51525af95dc", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--75309c18-b540-47bd-83a1-8a46cc297145", + "created": "2023-09-28T21:25:13.308914Z", + "modified": "2023-09-28T21:25:13.308914Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--fe5cf0f2-3792-4cab-b546-a9af7a5aa319", + "target_ref": "attack-pattern--9a4a16c5-a671-4469-a854-ef45cb0e38ab", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--754f3571-2849-4406-a4c8-9478e275ea74.json b/generated_files/DISARM_STIX/relationship/relationship--754f3571-2849-4406-a4c8-9478e275ea74.json new file mode 100644 index 0000000..10c658a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--754f3571-2849-4406-a4c8-9478e275ea74.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--e2924fd4-2513-47c3-9e38-1cdb7f89301b", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--754f3571-2849-4406-a4c8-9478e275ea74", + "created": "2023-09-28T21:25:13.318605Z", + "modified": "2023-09-28T21:25:13.318605Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c80ef7af-3f51-4be5-b42a-19d29ab40a53", + "target_ref": "attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--75f294b6-baa9-4be0-803b-65e309d42522.json b/generated_files/DISARM_STIX/relationship/relationship--75f294b6-baa9-4be0-803b-65e309d42522.json new file mode 100644 index 0000000..122db00 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--75f294b6-baa9-4be0-803b-65e309d42522.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--73312882-dd2f-492e-b546-f2ab7a0102a1", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--75f294b6-baa9-4be0-803b-65e309d42522", + "created": "2023-09-28T21:25:13.314829Z", + "modified": "2023-09-28T21:25:13.314829Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--d65af8b6-91ce-490e-8978-014ff995a2ac", + "target_ref": "attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--776d5e5b-4ff2-4651-a34d-39c60bb15e76.json b/generated_files/DISARM_STIX/relationship/relationship--776d5e5b-4ff2-4651-a34d-39c60bb15e76.json new file mode 100644 index 0000000..6fc33eb --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--776d5e5b-4ff2-4651-a34d-39c60bb15e76.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--27c875b2-01ee-4449-8352-905edc539a2d", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--776d5e5b-4ff2-4651-a34d-39c60bb15e76", + "created": "2023-09-28T21:25:13.303412Z", + "modified": "2023-09-28T21:25:13.303412Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--4282febe-c8a6-46da-863c-f19081615d80", + "target_ref": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--78686461-9ab8-42dd-9f9c-045e33a61bd0.json b/generated_files/DISARM_STIX/relationship/relationship--78686461-9ab8-42dd-9f9c-045e33a61bd0.json new file mode 100644 index 0000000..153bed8 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--78686461-9ab8-42dd-9f9c-045e33a61bd0.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--7e6b37f8-c6f6-434d-82c4-5a2fa2d5ef45", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--78686461-9ab8-42dd-9f9c-045e33a61bd0", + "created": "2023-09-28T21:25:13.310581Z", + "modified": "2023-09-28T21:25:13.310581Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e5c15a9f-2944-4370-9091-a9f61fdbb0ce", + "target_ref": "attack-pattern--3ae4fb28-4864-468d-8085-cb8035cbb272", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--7a66ba85-3cb5-45e8-b37a-437ccfa77dfb.json b/generated_files/DISARM_STIX/relationship/relationship--7a66ba85-3cb5-45e8-b37a-437ccfa77dfb.json new file mode 100644 index 0000000..6b83315 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--7a66ba85-3cb5-45e8-b37a-437ccfa77dfb.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--4563d1aa-2ed6-4e22-981c-b0561092b97b", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--7a66ba85-3cb5-45e8-b37a-437ccfa77dfb", + "created": "2023-09-28T21:25:13.32303Z", + "modified": "2023-09-28T21:25:13.32303Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--b602bd0a-6b29-4f87-8093-55c879f588ec", + "target_ref": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--7a73aba3-02a4-4dab-8cbf-d49218183fef.json b/generated_files/DISARM_STIX/relationship/relationship--7a73aba3-02a4-4dab-8cbf-d49218183fef.json new file mode 100644 index 0000000..6626711 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--7a73aba3-02a4-4dab-8cbf-d49218183fef.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--c081b26d-898b-4c66-854a-6af4da42a8f7", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--7a73aba3-02a4-4dab-8cbf-d49218183fef", + "created": "2023-09-28T21:25:13.307556Z", + "modified": "2023-09-28T21:25:13.307556Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c4e7d976-071a-4973-833e-3badef32b8c5", + "target_ref": "attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--7a84f767-5918-4182-83d0-0283139c8216.json b/generated_files/DISARM_STIX/relationship/relationship--7a84f767-5918-4182-83d0-0283139c8216.json new file mode 100644 index 0000000..f40828f --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--7a84f767-5918-4182-83d0-0283139c8216.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--033c1113-2d95-4b1b-8dd7-42a94809337c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--7a84f767-5918-4182-83d0-0283139c8216", + "created": "2023-09-28T21:25:13.311527Z", + "modified": "2023-09-28T21:25:13.311527Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--00a91e2d-2e09-4e94-bae6-cef6102eae99", + "target_ref": "attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--7ae5953c-846b-4015-886b-db49bb66aa6d.json b/generated_files/DISARM_STIX/relationship/relationship--7ae5953c-846b-4015-886b-db49bb66aa6d.json new file mode 100644 index 0000000..697cf34 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--7ae5953c-846b-4015-886b-db49bb66aa6d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--23319578-8e04-438a-942a-ae721ea450a6", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--7ae5953c-846b-4015-886b-db49bb66aa6d", + "created": "2023-09-28T21:25:13.301326Z", + "modified": "2023-09-28T21:25:13.301326Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--b4ed63e5-e8db-4057-989b-3ff5ad8c000c", + "target_ref": "attack-pattern--ea788455-90c6-4f47-97b1-862d30ef7d12", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--7c576fca-ccfd-485a-b647-22271104eb56.json b/generated_files/DISARM_STIX/relationship/relationship--7c576fca-ccfd-485a-b647-22271104eb56.json new file mode 100644 index 0000000..f86f415 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--7c576fca-ccfd-485a-b647-22271104eb56.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--f456ad40-690f-43e6-8be5-320a682dd641", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--7c576fca-ccfd-485a-b647-22271104eb56", + "created": "2023-09-28T21:25:13.31635Z", + "modified": "2023-09-28T21:25:13.31635Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--20569b52-59da-4b87-9b04-a306f3c148ae", + "target_ref": "attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--7d259bf3-bd15-48c5-9841-77061387ba9b.json b/generated_files/DISARM_STIX/relationship/relationship--7d259bf3-bd15-48c5-9841-77061387ba9b.json new file mode 100644 index 0000000..c030115 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--7d259bf3-bd15-48c5-9841-77061387ba9b.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--1552b7b8-9bb4-4488-873a-52b246001991", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--7d259bf3-bd15-48c5-9841-77061387ba9b", + "created": "2023-09-28T21:25:13.315939Z", + "modified": "2023-09-28T21:25:13.315939Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--570ba169-9d18-41ac-89ae-46b1376cdb82", + "target_ref": "attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--800c2d54-cc69-4258-9d9e-43fe0aee0246.json b/generated_files/DISARM_STIX/relationship/relationship--800c2d54-cc69-4258-9d9e-43fe0aee0246.json new file mode 100644 index 0000000..61e6521 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--800c2d54-cc69-4258-9d9e-43fe0aee0246.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--8835181a-b932-48d4-8c9d-f5f3504ff4fe", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--800c2d54-cc69-4258-9d9e-43fe0aee0246", + "created": "2023-09-28T21:25:13.305032Z", + "modified": "2023-09-28T21:25:13.305032Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9ec25bd4-7dcd-4bbf-9e2f-6170af84e166", + "target_ref": "attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--814e1126-b6c7-4024-920f-c183d3e20110.json b/generated_files/DISARM_STIX/relationship/relationship--814e1126-b6c7-4024-920f-c183d3e20110.json new file mode 100644 index 0000000..d922693 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--814e1126-b6c7-4024-920f-c183d3e20110.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--bedc229b-29ab-4733-8fd9-1e52b222bcad", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--814e1126-b6c7-4024-920f-c183d3e20110", + "created": "2023-09-28T21:25:13.313122Z", + "modified": "2023-09-28T21:25:13.313122Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--eb66afed-6c29-4947-a422-c380c5caeda5", + "target_ref": "attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--8223d3e7-7444-45a7-a185-2490fb34181c.json b/generated_files/DISARM_STIX/relationship/relationship--8223d3e7-7444-45a7-a185-2490fb34181c.json new file mode 100644 index 0000000..34ac979 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--8223d3e7-7444-45a7-a185-2490fb34181c.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--4fe05c67-6fea-4431-a0e5-571e42e7f7ba", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--8223d3e7-7444-45a7-a185-2490fb34181c", + "created": "2023-09-28T21:25:13.319893Z", + "modified": "2023-09-28T21:25:13.319893Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--1ae9162c-ea88-4123-9c3f-b651eff4a77c", + "target_ref": "attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--8263c052-070b-4a5e-893e-c4fc5649d2fc.json b/generated_files/DISARM_STIX/relationship/relationship--8263c052-070b-4a5e-893e-c4fc5649d2fc.json new file mode 100644 index 0000000..ffba4ef --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--8263c052-070b-4a5e-893e-c4fc5649d2fc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--47375228-a405-4cd1-8c7a-0371a3037c9c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--8263c052-070b-4a5e-893e-c4fc5649d2fc", + "created": "2023-09-28T21:25:13.319539Z", + "modified": "2023-09-28T21:25:13.319539Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--d2536dd3-53a5-4fc1-b508-1697cf0dafde", + "target_ref": "attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--82ae40ae-fd9b-4cf0-8be0-0a7bc8c4ce28.json b/generated_files/DISARM_STIX/relationship/relationship--82ae40ae-fd9b-4cf0-8be0-0a7bc8c4ce28.json new file mode 100644 index 0000000..df365ad --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--82ae40ae-fd9b-4cf0-8be0-0a7bc8c4ce28.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--1688041e-0662-4eff-97d7-ec324f7ae2e4", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--82ae40ae-fd9b-4cf0-8be0-0a7bc8c4ce28", + "created": "2023-09-28T21:25:13.304558Z", + "modified": "2023-09-28T21:25:13.304558Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--456e7902-1294-4ee0-aeb1-cfed13346a72", + "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--840b805f-2f68-4c54-aa18-425ed6420f66.json b/generated_files/DISARM_STIX/relationship/relationship--840b805f-2f68-4c54-aa18-425ed6420f66.json new file mode 100644 index 0000000..1941c56 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--840b805f-2f68-4c54-aa18-425ed6420f66.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--35e137c5-eac2-46ad-9d29-29b6b5b29cfe", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--840b805f-2f68-4c54-aa18-425ed6420f66", + "created": "2023-09-28T21:25:13.301032Z", + "modified": "2023-09-28T21:25:13.301032Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--dd9f940d-3970-45b2-8549-12e321567657", + "target_ref": "attack-pattern--09d17df9-9bb5-4d64-ba5c-8ae47814bd4c", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--841a90d4-3869-478f-b358-13845de1ad20.json b/generated_files/DISARM_STIX/relationship/relationship--841a90d4-3869-478f-b358-13845de1ad20.json new file mode 100644 index 0000000..11061d7 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--841a90d4-3869-478f-b358-13845de1ad20.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--b37d31c3-84da-4223-a044-432b7ee7b497", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--841a90d4-3869-478f-b358-13845de1ad20", + "created": "2023-09-28T21:25:13.316835Z", + "modified": "2023-09-28T21:25:13.316835Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--eb67513e-b6e8-42e1-a95b-197f64c21588", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--86aaafb6-385d-4f76-a13d-84b696197c73.json b/generated_files/DISARM_STIX/relationship/relationship--86aaafb6-385d-4f76-a13d-84b696197c73.json new file mode 100644 index 0000000..4db3f84 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--86aaafb6-385d-4f76-a13d-84b696197c73.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--0c831ce5-e357-400a-92be-4a9e9c658b57", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--86aaafb6-385d-4f76-a13d-84b696197c73", + "created": "2023-09-28T21:25:13.300623Z", + "modified": "2023-09-28T21:25:13.300623Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--3bc92e69-67e4-405a-a6fb-a2d742395c45", + "target_ref": "attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--8792d47a-0bf4-4d49-82b3-a5842ab9c296.json b/generated_files/DISARM_STIX/relationship/relationship--8792d47a-0bf4-4d49-82b3-a5842ab9c296.json new file mode 100644 index 0000000..10647ad --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--8792d47a-0bf4-4d49-82b3-a5842ab9c296.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--57bb5d98-ec7f-4a90-87ba-051de0043349", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--8792d47a-0bf4-4d49-82b3-a5842ab9c296", + "created": "2023-09-28T21:25:13.318039Z", + "modified": "2023-09-28T21:25:13.318039Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--32ddaf21-ebef-4270-9416-d9ef74bd23f6", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--8ec4675c-4364-459d-94f2-db98b532a70f.json b/generated_files/DISARM_STIX/relationship/relationship--8ec4675c-4364-459d-94f2-db98b532a70f.json new file mode 100644 index 0000000..dcac90b --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--8ec4675c-4364-459d-94f2-db98b532a70f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--e812fe39-dddb-4984-bd59-f9362a680cca", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--8ec4675c-4364-459d-94f2-db98b532a70f", + "created": "2023-09-28T21:25:13.300769Z", + "modified": "2023-09-28T21:25:13.300769Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e0b7c795-eae2-4494-a3c9-52bc68c6df06", + "target_ref": "attack-pattern--21fc458a-ea4d-41bb-9442-aac7ddd24794", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--8fc322df-1c2f-4eb3-a9e2-a1e50d210c84.json b/generated_files/DISARM_STIX/relationship/relationship--8fc322df-1c2f-4eb3-a9e2-a1e50d210c84.json new file mode 100644 index 0000000..90cb0b2 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--8fc322df-1c2f-4eb3-a9e2-a1e50d210c84.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ee752bf8-d2cc-40fe-84f6-a9ea6901d313", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--8fc322df-1c2f-4eb3-a9e2-a1e50d210c84", + "created": "2023-09-28T21:25:13.32129Z", + "modified": "2023-09-28T21:25:13.32129Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c2397671-33fb-4486-ad90-50653a169781", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--8ffceae4-1cf1-4f88-97d8-0e7014a8ab8d.json b/generated_files/DISARM_STIX/relationship/relationship--8ffceae4-1cf1-4f88-97d8-0e7014a8ab8d.json new file mode 100644 index 0000000..9900d69 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--8ffceae4-1cf1-4f88-97d8-0e7014a8ab8d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--195b2d99-1e14-44c4-8c72-d7fd5dfb238e", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--8ffceae4-1cf1-4f88-97d8-0e7014a8ab8d", + "created": "2023-09-28T21:25:13.319648Z", + "modified": "2023-09-28T21:25:13.319648Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--55ecf54e-0e46-4ea1-86de-ab473c94705f", + "target_ref": "attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--901d5907-f2a9-4ef0-8254-d094f806fb68.json b/generated_files/DISARM_STIX/relationship/relationship--901d5907-f2a9-4ef0-8254-d094f806fb68.json new file mode 100644 index 0000000..6eb52ef --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--901d5907-f2a9-4ef0-8254-d094f806fb68.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--df580a9c-5550-45de-8696-65025a207095", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--901d5907-f2a9-4ef0-8254-d094f806fb68", + "created": "2023-09-28T21:25:13.314109Z", + "modified": "2023-09-28T21:25:13.314109Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--0d094dfb-61f9-42d3-a9cf-697fdcbee944", + "target_ref": "attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--917abd46-b70a-4a8f-b0c2-9c41dbf4db4b.json b/generated_files/DISARM_STIX/relationship/relationship--917abd46-b70a-4a8f-b0c2-9c41dbf4db4b.json new file mode 100644 index 0000000..8efd530 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--917abd46-b70a-4a8f-b0c2-9c41dbf4db4b.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a03f5918-c7fe-4595-b5a1-f409eaf6b4dc", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--917abd46-b70a-4a8f-b0c2-9c41dbf4db4b", + "created": "2023-09-28T21:25:13.319018Z", + "modified": "2023-09-28T21:25:13.319018Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--67afaa3d-ffd7-4ad5-bcb0-e77962c084cf", + "target_ref": "attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--93918c94-daa2-4e6d-931b-66901ff1c479.json b/generated_files/DISARM_STIX/relationship/relationship--93918c94-daa2-4e6d-931b-66901ff1c479.json new file mode 100644 index 0000000..6e856dc --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--93918c94-daa2-4e6d-931b-66901ff1c479.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--031ed439-d749-41b7-9c20-1d2b3a41b4e7", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--93918c94-daa2-4e6d-931b-66901ff1c479", + "created": "2023-09-28T21:25:13.306708Z", + "modified": "2023-09-28T21:25:13.306708Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e27cf6aa-69bc-434b-ac68-b0164d0b3421", + "target_ref": "attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--940f7211-3dd6-464b-9b4b-dccbb770284e.json b/generated_files/DISARM_STIX/relationship/relationship--940f7211-3dd6-464b-9b4b-dccbb770284e.json new file mode 100644 index 0000000..d0c8d29 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--940f7211-3dd6-464b-9b4b-dccbb770284e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--4900a316-0659-4ce6-9d15-838892f2d110", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--940f7211-3dd6-464b-9b4b-dccbb770284e", + "created": "2023-09-28T21:25:13.319225Z", + "modified": "2023-09-28T21:25:13.319225Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--5dc224b1-c69e-496d-91f7-e8ce4fd3f166", + "target_ref": "attack-pattern--c171dd41-42d0-45c2-806e-3cb518ba0357", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--9445b8fc-0573-4f56-ae7a-0a64715cd17a.json b/generated_files/DISARM_STIX/relationship/relationship--9445b8fc-0573-4f56-ae7a-0a64715cd17a.json new file mode 100644 index 0000000..af97c25 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--9445b8fc-0573-4f56-ae7a-0a64715cd17a.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--fabaab0d-67f7-4443-b6c5-354e6b850332", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--9445b8fc-0573-4f56-ae7a-0a64715cd17a", + "created": "2023-09-28T21:25:13.318513Z", + "modified": "2023-09-28T21:25:13.318513Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--b6644001-8597-4f9f-a2a4-8005c54e8a39", + "target_ref": "attack-pattern--82f29899-fd06-43ef-b4d6-fc511d0fa425", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--9721571a-8c57-41a7-8b35-cb464f27331b.json b/generated_files/DISARM_STIX/relationship/relationship--9721571a-8c57-41a7-8b35-cb464f27331b.json new file mode 100644 index 0000000..1dcf31a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--9721571a-8c57-41a7-8b35-cb464f27331b.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--9ec540d0-81e3-4797-9c1f-fc5a48869d30", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--9721571a-8c57-41a7-8b35-cb464f27331b", + "created": "2023-09-28T21:25:13.304669Z", + "modified": "2023-09-28T21:25:13.304669Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--b463442a-ee7a-4ddb-83fe-c1de27b65c43", + "target_ref": "attack-pattern--bef6392b-f5a2-4a40-8b53-9a9377bea159", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--99492dce-8790-4dcc-8d36-7e8d4ef2adcb.json b/generated_files/DISARM_STIX/relationship/relationship--99492dce-8790-4dcc-8d36-7e8d4ef2adcb.json new file mode 100644 index 0000000..06eb2be --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--99492dce-8790-4dcc-8d36-7e8d4ef2adcb.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--436acbf9-fe9c-4b34-8322-97b49e072c1b", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--99492dce-8790-4dcc-8d36-7e8d4ef2adcb", + "created": "2023-09-28T21:25:13.311779Z", + "modified": "2023-09-28T21:25:13.311779Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--404f0dd5-81d8-4d96-ad36-875a58c27271", + "target_ref": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--9a27c192-6cae-4928-a640-5850933da1a9.json b/generated_files/DISARM_STIX/relationship/relationship--9a27c192-6cae-4928-a640-5850933da1a9.json new file mode 100644 index 0000000..f37d004 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--9a27c192-6cae-4928-a640-5850933da1a9.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--27b17cbf-1996-4a29-8919-96aece71e4a4", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--9a27c192-6cae-4928-a640-5850933da1a9", + "created": "2023-09-28T21:25:13.301968Z", + "modified": "2023-09-28T21:25:13.301968Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--2d540add-b708-402a-93ff-f5aa50d30eb9", + "target_ref": "attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--9b502d56-3276-4f1a-8ec2-7da58753fc65.json b/generated_files/DISARM_STIX/relationship/relationship--9b502d56-3276-4f1a-8ec2-7da58753fc65.json new file mode 100644 index 0000000..842069f --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--9b502d56-3276-4f1a-8ec2-7da58753fc65.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--67481498-58d4-4030-8a40-bcb0ae4e61cf", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--9b502d56-3276-4f1a-8ec2-7da58753fc65", + "created": "2023-09-28T21:25:13.305927Z", + "modified": "2023-09-28T21:25:13.305927Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--d13ff5af-16fd-4b32-8e14-f2e0980c15fb", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--a08bff03-c5c1-4127-a69f-e1d600ad2e68.json b/generated_files/DISARM_STIX/relationship/relationship--a08bff03-c5c1-4127-a69f-e1d600ad2e68.json new file mode 100644 index 0000000..1a614ad --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--a08bff03-c5c1-4127-a69f-e1d600ad2e68.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--49072433-6df4-4547-969f-001eb676f239", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--a08bff03-c5c1-4127-a69f-e1d600ad2e68", + "created": "2023-09-28T21:25:13.311646Z", + "modified": "2023-09-28T21:25:13.311646Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--6d75e3ac-e923-4815-8e9b-3e6af9e1baa0", + "target_ref": "attack-pattern--0ec5ae10-b99b-4d5a-a7e9-7b7c3533e8c9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--a1083514-150c-4405-9702-de14cb7c0c56.json b/generated_files/DISARM_STIX/relationship/relationship--a1083514-150c-4405-9702-de14cb7c0c56.json new file mode 100644 index 0000000..380b065 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--a1083514-150c-4405-9702-de14cb7c0c56.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--19f17f13-6d75-4c21-aab2-767a3a3f9e16", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--a1083514-150c-4405-9702-de14cb7c0c56", + "created": "2023-09-28T21:25:13.316211Z", + "modified": "2023-09-28T21:25:13.316211Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--78cf4cd6-a8a0-408f-a5e8-d6f1491aace8", + "target_ref": "attack-pattern--baf9f97d-65f3-4290-a3c2-9ac624d64ad6", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--a1ecaaf6-b033-46b9-b868-30139ca696c3.json b/generated_files/DISARM_STIX/relationship/relationship--a1ecaaf6-b033-46b9-b868-30139ca696c3.json new file mode 100644 index 0000000..bd3a2e5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--a1ecaaf6-b033-46b9-b868-30139ca696c3.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--d43d79c4-b736-46ab-9c15-75f607ec4b36", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--a1ecaaf6-b033-46b9-b868-30139ca696c3", + "created": "2023-09-28T21:25:13.307643Z", + "modified": "2023-09-28T21:25:13.307643Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--57f82c4a-4db0-47f4-b4a2-03cd2792b6dc", + "target_ref": "attack-pattern--ce4a9eee-7437-43ce-ac86-c1921f5c01a7", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--a22cba70-5b73-40b4-ad49-51e76d2f378e.json b/generated_files/DISARM_STIX/relationship/relationship--a22cba70-5b73-40b4-ad49-51e76d2f378e.json new file mode 100644 index 0000000..34ce649 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--a22cba70-5b73-40b4-ad49-51e76d2f378e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--5c5c6ddf-a838-41f8-bb24-2f0577a57008", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--a22cba70-5b73-40b4-ad49-51e76d2f378e", + "created": "2023-09-28T21:25:13.303972Z", + "modified": "2023-09-28T21:25:13.303972Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--77574742-25a0-4375-a2c8-d5b54e1360aa", + "target_ref": "attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--a2c05e41-abeb-4932-a587-f7aa1aa6a566.json b/generated_files/DISARM_STIX/relationship/relationship--a2c05e41-abeb-4932-a587-f7aa1aa6a566.json new file mode 100644 index 0000000..75eba56 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--a2c05e41-abeb-4932-a587-f7aa1aa6a566.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ef8138b1-023f-4d86-8105-f8a4b6534617", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--a2c05e41-abeb-4932-a587-f7aa1aa6a566", + "created": "2023-09-28T21:25:13.306978Z", + "modified": "2023-09-28T21:25:13.306978Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--6956e73b-cb55-4c0a-8cb0-a26e8d5bb9db", + "target_ref": "attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--a6595f42-44a8-444b-8068-4de2cea40c05.json b/generated_files/DISARM_STIX/relationship/relationship--a6595f42-44a8-444b-8068-4de2cea40c05.json new file mode 100644 index 0000000..5ede00d --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--a6595f42-44a8-444b-8068-4de2cea40c05.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a21064b6-9d97-45af-9470-fc4533d3b044", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--a6595f42-44a8-444b-8068-4de2cea40c05", + "created": "2023-09-28T21:25:13.31139Z", + "modified": "2023-09-28T21:25:13.31139Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--40e784b7-3850-4115-b90c-a39e155bbe2c", + "target_ref": "attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--aa29f612-ac6d-43b1-ad96-023f098ba1f1.json b/generated_files/DISARM_STIX/relationship/relationship--aa29f612-ac6d-43b1-ad96-023f098ba1f1.json new file mode 100644 index 0000000..5f76773 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--aa29f612-ac6d-43b1-ad96-023f098ba1f1.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--c0c2a60d-5382-477f-b710-467a9c7cc124", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--aa29f612-ac6d-43b1-ad96-023f098ba1f1", + "created": "2023-09-28T21:25:13.304233Z", + "modified": "2023-09-28T21:25:13.304233Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--3fd63a63-f597-40e5-9f6e-0aab00d4dc14", + "target_ref": "attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--abd69a00-47ff-4a1f-99e8-f1123d63336d.json b/generated_files/DISARM_STIX/relationship/relationship--abd69a00-47ff-4a1f-99e8-f1123d63336d.json new file mode 100644 index 0000000..492be63 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--abd69a00-47ff-4a1f-99e8-f1123d63336d.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--07793d9c-0e51-4918-bd65-96700506b941", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--abd69a00-47ff-4a1f-99e8-f1123d63336d", + "created": "2023-09-28T21:25:13.31582Z", + "modified": "2023-09-28T21:25:13.31582Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--394089a7-cd71-4e16-aef9-d7b885d421f1", + "target_ref": "attack-pattern--0a77a75a-09e7-44bf-927c-5e66a138862b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--abedeb8a-37ba-4094-96e5-e9b056d8e25a.json b/generated_files/DISARM_STIX/relationship/relationship--abedeb8a-37ba-4094-96e5-e9b056d8e25a.json new file mode 100644 index 0000000..14f3608 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--abedeb8a-37ba-4094-96e5-e9b056d8e25a.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--e9918210-01ed-4274-9ca8-2ecfbca604f1", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--abedeb8a-37ba-4094-96e5-e9b056d8e25a", + "created": "2023-09-28T21:25:13.317324Z", + "modified": "2023-09-28T21:25:13.317324Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e7b62982-106f-4234-9545-9466c687d1b5", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--abf67e18-7b65-4652-a013-ce2431b1534f.json b/generated_files/DISARM_STIX/relationship/relationship--abf67e18-7b65-4652-a013-ce2431b1534f.json new file mode 100644 index 0000000..74c96b0 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--abf67e18-7b65-4652-a013-ce2431b1534f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--582f2a9b-12e5-40a4-8038-23dddf2f6885", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--abf67e18-7b65-4652-a013-ce2431b1534f", + "created": "2023-09-28T21:25:13.315463Z", + "modified": "2023-09-28T21:25:13.315463Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--651a5188-f38a-42be-a253-d1b90cbd28e1", + "target_ref": "attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ac3efada-0afe-4f43-95ac-2e66a10ff19e.json b/generated_files/DISARM_STIX/relationship/relationship--ac3efada-0afe-4f43-95ac-2e66a10ff19e.json new file mode 100644 index 0000000..faee7f7 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ac3efada-0afe-4f43-95ac-2e66a10ff19e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--6d81c06e-8233-4d74-8b00-2a8d3fb1f207", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ac3efada-0afe-4f43-95ac-2e66a10ff19e", + "created": "2023-09-28T21:25:13.305697Z", + "modified": "2023-09-28T21:25:13.305697Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--55ff2ec4-8d1b-49f8-b774-d5996bc33648", + "target_ref": "attack-pattern--41062c4b-a462-419a-bad9-7f3f720f090b", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--accff777-5143-4263-847d-7ec30b3e8bbe.json b/generated_files/DISARM_STIX/relationship/relationship--accff777-5143-4263-847d-7ec30b3e8bbe.json new file mode 100644 index 0000000..ebf66af --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--accff777-5143-4263-847d-7ec30b3e8bbe.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--7d8985a6-2266-49f9-8b88-8330a62d4246", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--accff777-5143-4263-847d-7ec30b3e8bbe", + "created": "2023-09-28T21:25:13.311937Z", + "modified": "2023-09-28T21:25:13.311937Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7f338181-2e4b-435b-a190-7044f3867aa3", + "target_ref": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b177bb83-d0c0-4966-b86e-370ab7c4361f.json b/generated_files/DISARM_STIX/relationship/relationship--b177bb83-d0c0-4966-b86e-370ab7c4361f.json new file mode 100644 index 0000000..71bac43 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b177bb83-d0c0-4966-b86e-370ab7c4361f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--8a3345a9-daf1-466b-b2d8-56327d3c76e9", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b177bb83-d0c0-4966-b86e-370ab7c4361f", + "created": "2023-09-28T21:25:13.309929Z", + "modified": "2023-09-28T21:25:13.309929Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--3875e864-64d8-4ceb-8aa2-ef6e79224a85", + "target_ref": "attack-pattern--091f481d-b32b-4e5c-9626-b14a6ef02df7", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b1cf88c2-e614-48be-87e2-18cb3e3355c0.json b/generated_files/DISARM_STIX/relationship/relationship--b1cf88c2-e614-48be-87e2-18cb3e3355c0.json new file mode 100644 index 0000000..b98a8a4 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b1cf88c2-e614-48be-87e2-18cb3e3355c0.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--0799fe4b-e00a-419e-b488-1ee144bc6d94", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b1cf88c2-e614-48be-87e2-18cb3e3355c0", + "created": "2023-09-28T21:25:13.321666Z", + "modified": "2023-09-28T21:25:13.321666Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--f8fc8cda-8dbe-4f8a-8c62-e06b975582df", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b311908f-8938-4cc2-bd98-881878ac17bb.json b/generated_files/DISARM_STIX/relationship/relationship--b311908f-8938-4cc2-bd98-881878ac17bb.json new file mode 100644 index 0000000..7fe8c82 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b311908f-8938-4cc2-bd98-881878ac17bb.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--07f6a5c1-ef3e-4b3f-a89f-3fdadef01354", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b311908f-8938-4cc2-bd98-881878ac17bb", + "created": "2023-09-28T21:25:13.322912Z", + "modified": "2023-09-28T21:25:13.322912Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--20e074c4-9010-41b8-b097-65091268531c", + "target_ref": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b3aea206-4346-4f69-997d-3576e1e3abca.json b/generated_files/DISARM_STIX/relationship/relationship--b3aea206-4346-4f69-997d-3576e1e3abca.json new file mode 100644 index 0000000..12a8ff5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b3aea206-4346-4f69-997d-3576e1e3abca.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--90e059cc-9f0f-4a83-a2d8-26102d7ea766", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b3aea206-4346-4f69-997d-3576e1e3abca", + "created": "2023-09-28T21:25:13.309689Z", + "modified": "2023-09-28T21:25:13.309689Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--4cb308a9-073c-49d3-81ed-894cf9b95acc", + "target_ref": "attack-pattern--adaaa726-50fe-47e2-b92d-de0d65c9250c", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b56f527e-46bd-4ed9-8265-a41a381df79c.json b/generated_files/DISARM_STIX/relationship/relationship--b56f527e-46bd-4ed9-8265-a41a381df79c.json new file mode 100644 index 0000000..bd36989 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b56f527e-46bd-4ed9-8265-a41a381df79c.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--c647a237-12eb-4ed1-98ee-8f29ca4c83ec", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b56f527e-46bd-4ed9-8265-a41a381df79c", + "created": "2023-09-28T21:25:13.308002Z", + "modified": "2023-09-28T21:25:13.308002Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ec8424e6-c7de-4543-b943-f0c4cc9ac63d", + "target_ref": "attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b5a1948f-07dc-4e84-9225-aaa7b652b047.json b/generated_files/DISARM_STIX/relationship/relationship--b5a1948f-07dc-4e84-9225-aaa7b652b047.json new file mode 100644 index 0000000..dad37f8 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b5a1948f-07dc-4e84-9225-aaa7b652b047.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a189b3d0-7830-4b71-82e3-69fbe4c6987a", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b5a1948f-07dc-4e84-9225-aaa7b652b047", + "created": "2023-09-28T21:25:13.320768Z", + "modified": "2023-09-28T21:25:13.320768Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c28a0edd-a7af-4651-8e11-8e7284009174", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b6678ab9-1860-4974-9ada-c5887723527e.json b/generated_files/DISARM_STIX/relationship/relationship--b6678ab9-1860-4974-9ada-c5887723527e.json new file mode 100644 index 0000000..033dff9 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b6678ab9-1860-4974-9ada-c5887723527e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--fb42f618-484e-4e64-b816-abb6bccf0cc2", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b6678ab9-1860-4974-9ada-c5887723527e", + "created": "2023-09-28T21:25:13.319783Z", + "modified": "2023-09-28T21:25:13.319783Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7fdc6b19-0d37-43a9-8144-f0c180a13ed0", + "target_ref": "attack-pattern--bb9d5f3e-471f-411b-9901-baf03b848132", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b782580e-e04a-46b2-ba8b-1fe00cca80bc.json b/generated_files/DISARM_STIX/relationship/relationship--b782580e-e04a-46b2-ba8b-1fe00cca80bc.json new file mode 100644 index 0000000..74f8db8 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b782580e-e04a-46b2-ba8b-1fe00cca80bc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--d503a987-5251-4cca-83dd-095405c46943", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b782580e-e04a-46b2-ba8b-1fe00cca80bc", + "created": "2023-09-28T21:25:13.307882Z", + "modified": "2023-09-28T21:25:13.307882Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--779fe6e8-44ee-4f36-ab93-9daa867001d4", + "target_ref": "attack-pattern--5b6aaad5-7166-4321-ae82-b9300a2ddad7", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b8e23a24-d680-40be-bbbd-438292131505.json b/generated_files/DISARM_STIX/relationship/relationship--b8e23a24-d680-40be-bbbd-438292131505.json new file mode 100644 index 0000000..2ed2d92 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b8e23a24-d680-40be-bbbd-438292131505.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--716f5cf1-329e-416c-88fc-08fa6723bae2", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b8e23a24-d680-40be-bbbd-438292131505", + "created": "2023-09-28T21:25:13.316057Z", + "modified": "2023-09-28T21:25:13.316057Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--2b297e7b-51a7-4cfc-80da-fbc21c789a9e", + "target_ref": "attack-pattern--56a35df8-3bda-4ee3-8be0-23b20b69fe63", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--b96d53ef-d168-4993-983a-256bbcf3d618.json b/generated_files/DISARM_STIX/relationship/relationship--b96d53ef-d168-4993-983a-256bbcf3d618.json new file mode 100644 index 0000000..d3e18ab --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--b96d53ef-d168-4993-983a-256bbcf3d618.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--5a4c2e6c-0c9b-4bf1-b77c-96b56e877a84", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--b96d53ef-d168-4993-983a-256bbcf3d618", + "created": "2023-09-28T21:25:13.321902Z", + "modified": "2023-09-28T21:25:13.321902Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--f08df5bc-7cea-42b8-be2c-b07c0d62c982", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ba020956-91cf-4415-a332-262097da5f4c.json b/generated_files/DISARM_STIX/relationship/relationship--ba020956-91cf-4415-a332-262097da5f4c.json new file mode 100644 index 0000000..83da50f --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ba020956-91cf-4415-a332-262097da5f4c.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--29dc8b84-acbc-4990-b800-f9f287dae445", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ba020956-91cf-4415-a332-262097da5f4c", + "created": "2023-09-28T21:25:13.307382Z", + "modified": "2023-09-28T21:25:13.307382Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e4ad5ad8-f52d-48a0-8fce-33157f885a3e", + "target_ref": "attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ba8e089e-2945-49cf-a0e6-476e553964d0.json b/generated_files/DISARM_STIX/relationship/relationship--ba8e089e-2945-49cf-a0e6-476e553964d0.json new file mode 100644 index 0000000..4b65d48 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ba8e089e-2945-49cf-a0e6-476e553964d0.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--8fcab610-ccda-411e-a766-0f921446ecf4", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ba8e089e-2945-49cf-a0e6-476e553964d0", + "created": "2023-09-28T21:25:13.305477Z", + "modified": "2023-09-28T21:25:13.305477Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c729368d-246a-47eb-8e4b-ab5b0a3510ec", + "target_ref": "attack-pattern--8289a941-c379-4628-916a-2ddc12f4e531", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--bd80c0e0-5a7c-4b1a-8bb1-ecc0a44609a6.json b/generated_files/DISARM_STIX/relationship/relationship--bd80c0e0-5a7c-4b1a-8bb1-ecc0a44609a6.json new file mode 100644 index 0000000..ef9422b --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--bd80c0e0-5a7c-4b1a-8bb1-ecc0a44609a6.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--1d95bfa9-d779-43ed-92b0-66f5fa31e7f5", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--bd80c0e0-5a7c-4b1a-8bb1-ecc0a44609a6", + "created": "2023-09-28T21:25:13.323146Z", + "modified": "2023-09-28T21:25:13.323146Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--4ecd424d-11a8-4471-9ccc-a870a337284d", + "target_ref": "attack-pattern--657febb1-c1b1-4eed-81c7-e289d522a6a4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--bdc02a0f-64ee-4a0a-abc2-1b53c99fb185.json b/generated_files/DISARM_STIX/relationship/relationship--bdc02a0f-64ee-4a0a-abc2-1b53c99fb185.json new file mode 100644 index 0000000..0fd6a7c --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--bdc02a0f-64ee-4a0a-abc2-1b53c99fb185.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--63d605af-8f67-437b-9942-0d82bc87facc", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--bdc02a0f-64ee-4a0a-abc2-1b53c99fb185", + "created": "2023-09-28T21:25:13.313702Z", + "modified": "2023-09-28T21:25:13.313702Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--fb6f8352-c368-49a3-b7d4-f1ee5a3fb370", + "target_ref": "attack-pattern--1997947a-7e08-4ea9-802c-85391d561266", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--bf7d8d83-63a9-474f-a618-5a0079746bcc.json b/generated_files/DISARM_STIX/relationship/relationship--bf7d8d83-63a9-474f-a618-5a0079746bcc.json new file mode 100644 index 0000000..3ee7cab --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--bf7d8d83-63a9-474f-a618-5a0079746bcc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--4c319548-bf23-4aed-b4f2-1d4a767cfaaf", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--bf7d8d83-63a9-474f-a618-5a0079746bcc", + "created": "2023-09-28T21:25:13.310329Z", + "modified": "2023-09-28T21:25:13.310329Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e0f07568-5a2b-429d-94b9-b1ff3c17adea", + "target_ref": "attack-pattern--6db47704-ba87-402d-933a-de90f5aa8965", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c05b7820-d21d-4d6e-aaf5-af3836dbfb64.json b/generated_files/DISARM_STIX/relationship/relationship--c05b7820-d21d-4d6e-aaf5-af3836dbfb64.json new file mode 100644 index 0000000..9a8f40c --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c05b7820-d21d-4d6e-aaf5-af3836dbfb64.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--308bbdd3-8935-4697-bc31-fcf211e12cf6", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c05b7820-d21d-4d6e-aaf5-af3836dbfb64", + "created": "2023-09-28T21:25:13.314231Z", + "modified": "2023-09-28T21:25:13.314231Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--03225a5c-f388-4453-a53c-f10be49bbcfe", + "target_ref": "attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c1a55ae5-1c97-47c1-8694-473b16e470fc.json b/generated_files/DISARM_STIX/relationship/relationship--c1a55ae5-1c97-47c1-8694-473b16e470fc.json new file mode 100644 index 0000000..2e4e96b --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c1a55ae5-1c97-47c1-8694-473b16e470fc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a2b8f23d-f10f-4ebc-8089-b5ef732f69e4", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c1a55ae5-1c97-47c1-8694-473b16e470fc", + "created": "2023-09-28T21:25:13.312572Z", + "modified": "2023-09-28T21:25:13.312572Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--78ff99d8-dce8-4f4e-9dc2-3f37f154a39d", + "target_ref": "attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c2b101b7-6460-4657-9a81-c30d40b92a9f.json b/generated_files/DISARM_STIX/relationship/relationship--c2b101b7-6460-4657-9a81-c30d40b92a9f.json new file mode 100644 index 0000000..1430fb2 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c2b101b7-6460-4657-9a81-c30d40b92a9f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--c1dd8cac-4a4b-49d8-b0c9-cee2a8c2c1dd", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c2b101b7-6460-4657-9a81-c30d40b92a9f", + "created": "2023-09-28T21:25:13.312678Z", + "modified": "2023-09-28T21:25:13.312678Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--1d8c14ac-9be0-4835-b379-45549267e8f8", + "target_ref": "attack-pattern--6e525f48-d8d6-4484-8838-208eb00bd2a8", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c361e92d-be90-4430-9c0d-75d4b0de2066.json b/generated_files/DISARM_STIX/relationship/relationship--c361e92d-be90-4430-9c0d-75d4b0de2066.json new file mode 100644 index 0000000..c1c9480 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c361e92d-be90-4430-9c0d-75d4b0de2066.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--18d53ce9-864d-46eb-958a-ac9eb0e63eda", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c361e92d-be90-4430-9c0d-75d4b0de2066", + "created": "2023-09-28T21:25:13.315188Z", + "modified": "2023-09-28T21:25:13.315188Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--3621d01e-eb49-42d7-b646-6427a5693291", + "target_ref": "attack-pattern--14ea9a49-0546-4fe9-be44-f158be5881e9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c419c77c-7dc6-4e93-86e9-4e112a4a8750.json b/generated_files/DISARM_STIX/relationship/relationship--c419c77c-7dc6-4e93-86e9-4e112a4a8750.json new file mode 100644 index 0000000..2e4b38b --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c419c77c-7dc6-4e93-86e9-4e112a4a8750.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--78da08ed-6448-44a9-aaec-f90086378f0d", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c419c77c-7dc6-4e93-86e9-4e112a4a8750", + "created": "2023-09-28T21:25:13.312908Z", + "modified": "2023-09-28T21:25:13.312908Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--8432d382-0ce8-4507-97ea-95be10de3488", + "target_ref": "attack-pattern--9b6b3dea-54ac-4e00-bd92-380555205afe", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c67c1802-41c6-4f2f-90a5-371952c6eacc.json b/generated_files/DISARM_STIX/relationship/relationship--c67c1802-41c6-4f2f-90a5-371952c6eacc.json new file mode 100644 index 0000000..d63b0c7 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c67c1802-41c6-4f2f-90a5-371952c6eacc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2294d3fb-7e69-44ce-9f80-6b0c246dca1b", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c67c1802-41c6-4f2f-90a5-371952c6eacc", + "created": "2023-09-28T21:25:13.30747Z", + "modified": "2023-09-28T21:25:13.30747Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--58b169c1-7e9a-4300-a98f-eb7baee8967f", + "target_ref": "attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c959081a-60c0-40d3-9dcd-6039936bf8da.json b/generated_files/DISARM_STIX/relationship/relationship--c959081a-60c0-40d3-9dcd-6039936bf8da.json new file mode 100644 index 0000000..76786c9 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c959081a-60c0-40d3-9dcd-6039936bf8da.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--405d1125-b45b-47ec-b9e4-95f03e0457df", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c959081a-60c0-40d3-9dcd-6039936bf8da", + "created": "2023-09-28T21:25:13.317069Z", + "modified": "2023-09-28T21:25:13.317069Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--3437993c-c521-4145-a2d8-b860399876b0", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c99eb9bc-03d8-48e9-aaf4-9c3329dadc06.json b/generated_files/DISARM_STIX/relationship/relationship--c99eb9bc-03d8-48e9-aaf4-9c3329dadc06.json new file mode 100644 index 0000000..cd8d880 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c99eb9bc-03d8-48e9-aaf4-9c3329dadc06.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--1b350aca-035c-4d1f-a61b-ae631f1d0b31", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c99eb9bc-03d8-48e9-aaf4-9c3329dadc06", + "created": "2023-09-28T21:25:13.308121Z", + "modified": "2023-09-28T21:25:13.308121Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--bb36f231-2483-4c97-bd34-be573b9437ba", + "target_ref": "attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c9a2d298-9f8f-482a-a642-efb0841bd17a.json b/generated_files/DISARM_STIX/relationship/relationship--c9a2d298-9f8f-482a-a642-efb0841bd17a.json new file mode 100644 index 0000000..6ab7e47 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c9a2d298-9f8f-482a-a642-efb0841bd17a.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--0d8970fa-8998-4e76-a387-e1b6174dfbae", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c9a2d298-9f8f-482a-a642-efb0841bd17a", + "created": "2023-09-28T21:25:13.302545Z", + "modified": "2023-09-28T21:25:13.302545Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e47ae747-d83d-433d-a69a-f6d0970fed5e", + "target_ref": "attack-pattern--bc2a6754-44d0-4fe3-8461-e3a4af895835", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--c9bb953b-5337-400d-89fb-bad965c43520.json b/generated_files/DISARM_STIX/relationship/relationship--c9bb953b-5337-400d-89fb-bad965c43520.json new file mode 100644 index 0000000..bd3a013 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--c9bb953b-5337-400d-89fb-bad965c43520.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--3d3ab037-fa06-45f2-8ea1-aea87bb7955f", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--c9bb953b-5337-400d-89fb-bad965c43520", + "created": "2023-09-28T21:25:13.307094Z", + "modified": "2023-09-28T21:25:13.307094Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--330de45e-8e37-4b57-95e4-fa75580b36a8", + "target_ref": "attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--cac7c4fd-e714-4ec3-9ec7-2dcd79ce252f.json b/generated_files/DISARM_STIX/relationship/relationship--cac7c4fd-e714-4ec3-9ec7-2dcd79ce252f.json new file mode 100644 index 0000000..0ca79ba --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--cac7c4fd-e714-4ec3-9ec7-2dcd79ce252f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--659b8be9-0cdc-4236-b30f-87f6ffeef1fb", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--cac7c4fd-e714-4ec3-9ec7-2dcd79ce252f", + "created": "2023-09-28T21:25:13.312185Z", + "modified": "2023-09-28T21:25:13.312185Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a24e779c-0f44-493b-862d-00693bf34ca4", + "target_ref": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ccab419b-063c-4983-82ec-1fcc988af64c.json b/generated_files/DISARM_STIX/relationship/relationship--ccab419b-063c-4983-82ec-1fcc988af64c.json new file mode 100644 index 0000000..a1cb3a3 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ccab419b-063c-4983-82ec-1fcc988af64c.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--f9364620-f931-4f4a-97dd-abfe5a3e93ef", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ccab419b-063c-4983-82ec-1fcc988af64c", + "created": "2023-09-28T21:25:13.309187Z", + "modified": "2023-09-28T21:25:13.309187Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--37a192dd-8b33-482e-ba7a-b5a7b4f704b9", + "target_ref": "attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--cd3d7703-d6fc-49d1-9776-563143f865e6.json b/generated_files/DISARM_STIX/relationship/relationship--cd3d7703-d6fc-49d1-9776-563143f865e6.json new file mode 100644 index 0000000..181fcc5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--cd3d7703-d6fc-49d1-9776-563143f865e6.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--71f413fc-b150-412e-80d7-da9d4a51d272", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--cd3d7703-d6fc-49d1-9776-563143f865e6", + "created": "2023-09-28T21:25:13.320652Z", + "modified": "2023-09-28T21:25:13.320652Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--2b17f29f-f65f-4398-9e35-1c1d8836c20d", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ce493e21-16ab-4560-895c-a751877a2779.json b/generated_files/DISARM_STIX/relationship/relationship--ce493e21-16ab-4560-895c-a751877a2779.json new file mode 100644 index 0000000..b63e0e8 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ce493e21-16ab-4560-895c-a751877a2779.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--f111f5a4-48fb-4c8c-aed2-6a5e4293fcc5", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ce493e21-16ab-4560-895c-a751877a2779", + "created": "2023-09-28T21:25:13.309307Z", + "modified": "2023-09-28T21:25:13.309307Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--abb6518d-50fe-4428-9bca-a6e3c6ed4de4", + "target_ref": "attack-pattern--c4213e65-a7cc-42a5-a3a7-2d8040258625", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ceee8fee-33e8-492c-a8b6-855089b5e570.json b/generated_files/DISARM_STIX/relationship/relationship--ceee8fee-33e8-492c-a8b6-855089b5e570.json new file mode 100644 index 0000000..1a5cc70 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ceee8fee-33e8-492c-a8b6-855089b5e570.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--1485f941-09ff-4416-9bb1-4e3a1586129d", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ceee8fee-33e8-492c-a8b6-855089b5e570", + "created": "2023-09-28T21:25:13.306858Z", + "modified": "2023-09-28T21:25:13.306858Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--17cba995-a8ab-4aa0-85fe-2b87d38a8f03", + "target_ref": "attack-pattern--8ea2fcce-e27e-4019-a773-70f3dddfab34", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d23070e0-d1f6-44ed-a1a9-90c6f745a12e.json b/generated_files/DISARM_STIX/relationship/relationship--d23070e0-d1f6-44ed-a1a9-90c6f745a12e.json new file mode 100644 index 0000000..25a9498 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d23070e0-d1f6-44ed-a1a9-90c6f745a12e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--48da9a95-f27a-4654-ba2b-79c6d2780bb5", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d23070e0-d1f6-44ed-a1a9-90c6f745a12e", + "created": "2023-09-28T21:25:13.307296Z", + "modified": "2023-09-28T21:25:13.307296Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--7b6c328e-b050-4d76-8e11-ff3b3fe7dea3", + "target_ref": "attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d39d5c01-a64b-4df4-b4c4-10be08a7bac2.json b/generated_files/DISARM_STIX/relationship/relationship--d39d5c01-a64b-4df4-b4c4-10be08a7bac2.json new file mode 100644 index 0000000..22ba375 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d39d5c01-a64b-4df4-b4c4-10be08a7bac2.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--998d9f67-45c4-40f0-8dc3-8618ab610e0f", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d39d5c01-a64b-4df4-b4c4-10be08a7bac2", + "created": "2023-09-28T21:25:13.303245Z", + "modified": "2023-09-28T21:25:13.303245Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--e6ab2793-a059-4354-bb60-045afb019833", + "target_ref": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d4388e79-ff30-4294-8ffb-cc2e9283f9fc.json b/generated_files/DISARM_STIX/relationship/relationship--d4388e79-ff30-4294-8ffb-cc2e9283f9fc.json new file mode 100644 index 0000000..57e4220 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d4388e79-ff30-4294-8ffb-cc2e9283f9fc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--48579749-8893-4054-b45a-8cce72900eef", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d4388e79-ff30-4294-8ffb-cc2e9283f9fc", + "created": "2023-09-28T21:25:13.318908Z", + "modified": "2023-09-28T21:25:13.318908Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ce1e088c-d061-490c-a13a-3cbe4216a86e", + "target_ref": "attack-pattern--c73c3210-6414-46c8-9885-a3b3e405da56", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d51a90a6-094b-48c1-990d-8430cccba6eb.json b/generated_files/DISARM_STIX/relationship/relationship--d51a90a6-094b-48c1-990d-8430cccba6eb.json new file mode 100644 index 0000000..8667cbd --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d51a90a6-094b-48c1-990d-8430cccba6eb.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ea0d91ee-4f9f-484c-b311-0e6f0009951e", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d51a90a6-094b-48c1-990d-8430cccba6eb", + "created": "2023-09-28T21:25:13.318136Z", + "modified": "2023-09-28T21:25:13.318136Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ea762d7a-8852-4d91-b44f-4754aa079313", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d5218728-49f8-435a-9b5d-d8a3b38d6558.json b/generated_files/DISARM_STIX/relationship/relationship--d5218728-49f8-435a-9b5d-d8a3b38d6558.json new file mode 100644 index 0000000..7279348 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d5218728-49f8-435a-9b5d-d8a3b38d6558.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--580d19c2-69f9-4990-a624-332211988f21", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d5218728-49f8-435a-9b5d-d8a3b38d6558", + "created": "2023-09-28T21:25:13.313584Z", + "modified": "2023-09-28T21:25:13.313584Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--9a5261b8-5051-47ed-a4f6-bdbb7b6edcb4", + "target_ref": "attack-pattern--1997947a-7e08-4ea9-802c-85391d561266", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d841b5dc-21e6-47dc-9bc5-50a618807bc7.json b/generated_files/DISARM_STIX/relationship/relationship--d841b5dc-21e6-47dc-9bc5-50a618807bc7.json new file mode 100644 index 0000000..3c7d9cf --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d841b5dc-21e6-47dc-9bc5-50a618807bc7.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a30013b2-57c5-4085-9f6a-d1689d10a04a", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d841b5dc-21e6-47dc-9bc5-50a618807bc7", + "created": "2023-09-28T21:25:13.314695Z", + "modified": "2023-09-28T21:25:13.314695Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--89b88c22-0686-4d28-9c2b-e0c6ac31a4ab", + "target_ref": "attack-pattern--7e3a06ee-c109-4901-8720-69c46fe04a76", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d84c5543-5820-482d-a457-0cb9efe5cab2.json b/generated_files/DISARM_STIX/relationship/relationship--d84c5543-5820-482d-a457-0cb9efe5cab2.json new file mode 100644 index 0000000..6e1bcea --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d84c5543-5820-482d-a457-0cb9efe5cab2.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--8ed28736-e0fb-4c59-8b8c-82410b00f1ab", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d84c5543-5820-482d-a457-0cb9efe5cab2", + "created": "2023-09-28T21:25:13.321548Z", + "modified": "2023-09-28T21:25:13.321548Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--b8a49b7d-5a2e-44ff-9c18-6f6501231f15", + "target_ref": "attack-pattern--1e8087ee-e56c-4647-ad77-523634c39b28", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d8eb9fe8-ace5-493e-a11c-d5dace85a93f.json b/generated_files/DISARM_STIX/relationship/relationship--d8eb9fe8-ace5-493e-a11c-d5dace85a93f.json new file mode 100644 index 0000000..f9d56c3 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d8eb9fe8-ace5-493e-a11c-d5dace85a93f.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--5a73f677-42bd-4039-a39d-09bbfab880ad", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d8eb9fe8-ace5-493e-a11c-d5dace85a93f", + "created": "2023-09-28T21:25:13.320265Z", + "modified": "2023-09-28T21:25:13.320265Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ca3d3bb7-d3eb-4c2b-9b83-8b8579185636", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d93dd97a-12e2-4d7b-8c6a-cc113777e7dc.json b/generated_files/DISARM_STIX/relationship/relationship--d93dd97a-12e2-4d7b-8c6a-cc113777e7dc.json new file mode 100644 index 0000000..c7d857f --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d93dd97a-12e2-4d7b-8c6a-cc113777e7dc.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--77e865ac-f094-4e17-b931-e4f5c2d46ccf", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d93dd97a-12e2-4d7b-8c6a-cc113777e7dc", + "created": "2023-09-28T21:25:13.317907Z", + "modified": "2023-09-28T21:25:13.317907Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--deb9a225-0803-4a1f-b37b-3a10c3e7ca79", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--d986b4c4-c99a-4153-a962-fc14533bce5e.json b/generated_files/DISARM_STIX/relationship/relationship--d986b4c4-c99a-4153-a962-fc14533bce5e.json new file mode 100644 index 0000000..29200ad --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--d986b4c4-c99a-4153-a962-fc14533bce5e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--f8c466f6-d3d1-42be-a393-88488e00823b", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--d986b4c4-c99a-4153-a962-fc14533bce5e", + "created": "2023-09-28T21:25:13.304059Z", + "modified": "2023-09-28T21:25:13.304059Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--694bafc2-bd74-40c9-89f2-2ad033f079f4", + "target_ref": "attack-pattern--03692306-7b8e-4b5a-991f-23c91eeed4c5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--da229950-65f7-4561-b8c7-c48e84a888b8.json b/generated_files/DISARM_STIX/relationship/relationship--da229950-65f7-4561-b8c7-c48e84a888b8.json new file mode 100644 index 0000000..948d834 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--da229950-65f7-4561-b8c7-c48e84a888b8.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--596db475-0697-43dd-ad03-538d03867f7b", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--da229950-65f7-4561-b8c7-c48e84a888b8", + "created": "2023-09-28T21:25:13.302952Z", + "modified": "2023-09-28T21:25:13.302952Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--1c13465b-8b75-4b7d-a763-fe5b1d091635", + "target_ref": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--daa30fdf-bce7-4950-a4a1-ff73ed6e9f21.json b/generated_files/DISARM_STIX/relationship/relationship--daa30fdf-bce7-4950-a4a1-ff73ed6e9f21.json new file mode 100644 index 0000000..52d7d26 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--daa30fdf-bce7-4950-a4a1-ff73ed6e9f21.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--bf1064af-1247-4cf2-8463-67dab51b9b38", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--daa30fdf-bce7-4950-a4a1-ff73ed6e9f21", + "created": "2023-09-28T21:25:13.322439Z", + "modified": "2023-09-28T21:25:13.322439Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--54edae40-39dc-45c4-a473-cef151d299ff", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--dc2b4103-a1d1-4f95-ae0d-e86b1858f58e.json b/generated_files/DISARM_STIX/relationship/relationship--dc2b4103-a1d1-4f95-ae0d-e86b1858f58e.json new file mode 100644 index 0000000..68cc4cc --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--dc2b4103-a1d1-4f95-ae0d-e86b1858f58e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a3117246-23a0-4045-8bd6-5024f805b06f", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--dc2b4103-a1d1-4f95-ae0d-e86b1858f58e", + "created": "2023-09-28T21:25:13.31082Z", + "modified": "2023-09-28T21:25:13.31082Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a50d7269-9365-46f0-ba81-27964e422faa", + "target_ref": "attack-pattern--283333f5-e161-4195-9070-5a7c22505adf", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--dc3d7ab5-2308-45ac-997a-2cb8af2adcde.json b/generated_files/DISARM_STIX/relationship/relationship--dc3d7ab5-2308-45ac-997a-2cb8af2adcde.json new file mode 100644 index 0000000..a48f503 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--dc3d7ab5-2308-45ac-997a-2cb8af2adcde.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--9169f59a-0d8c-46ff-8379-f1490504728a", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--dc3d7ab5-2308-45ac-997a-2cb8af2adcde", + "created": "2023-09-28T21:25:13.30158Z", + "modified": "2023-09-28T21:25:13.30158Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--032f24c1-bc1d-457a-8f43-6c5fc416f733", + "target_ref": "attack-pattern--45dae307-ba74-4038-90ef-2282a32e38b9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e2521498-37a1-47c2-beb8-add02a338fea.json b/generated_files/DISARM_STIX/relationship/relationship--e2521498-37a1-47c2-beb8-add02a338fea.json new file mode 100644 index 0000000..7e8a582 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e2521498-37a1-47c2-beb8-add02a338fea.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--87fd0134-7233-4a29-888c-5dff15a0a962", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e2521498-37a1-47c2-beb8-add02a338fea", + "created": "2023-09-28T21:25:13.303063Z", + "modified": "2023-09-28T21:25:13.303063Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--bfce790b-dfd6-46ca-8fab-c2d72f21bba2", + "target_ref": "attack-pattern--0c765d19-99b2-4703-af48-e20a677c4bfc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e2b08baa-2534-43a5-8b86-7363dab5d08e.json b/generated_files/DISARM_STIX/relationship/relationship--e2b08baa-2534-43a5-8b86-7363dab5d08e.json new file mode 100644 index 0000000..75dcec1 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e2b08baa-2534-43a5-8b86-7363dab5d08e.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--0e833079-33b3-40d0-91f9-dcce431e302c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e2b08baa-2534-43a5-8b86-7363dab5d08e", + "created": "2023-09-28T21:25:13.307209Z", + "modified": "2023-09-28T21:25:13.307209Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a60b4d87-cca8-4e17-a51c-f9c2af96aef4", + "target_ref": "attack-pattern--5f8a5d7e-fc17-48f2-a6fa-38fcf7843bdf", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e30726e8-b394-4e94-a9d5-a0c3d23c7fd2.json b/generated_files/DISARM_STIX/relationship/relationship--e30726e8-b394-4e94-a9d5-a0c3d23c7fd2.json new file mode 100644 index 0000000..f746c87 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e30726e8-b394-4e94-a9d5-a0c3d23c7fd2.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a36d9df9-4686-41bd-a7b7-c02346c46574", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e30726e8-b394-4e94-a9d5-a0c3d23c7fd2", + "created": "2023-09-28T21:25:13.306369Z", + "modified": "2023-09-28T21:25:13.306369Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--4cd719a9-e817-4acc-9581-6b6a60e42f35", + "target_ref": "attack-pattern--9636ae57-0b93-41a0-8323-85109ee34877", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e30857c9-921f-4918-b4b4-8717d4e82ad0.json b/generated_files/DISARM_STIX/relationship/relationship--e30857c9-921f-4918-b4b4-8717d4e82ad0.json new file mode 100644 index 0000000..9993bd5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e30857c9-921f-4918-b4b4-8717d4e82ad0.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--29d53978-d397-4545-950b-81969bf5fb98", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e30857c9-921f-4918-b4b4-8717d4e82ad0", + "created": "2023-09-28T21:25:13.309438Z", + "modified": "2023-09-28T21:25:13.309438Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--d522f417-ba0e-4e2d-ae96-df2c1fd607e6", + "target_ref": "attack-pattern--c1182f49-4318-486f-81be-d44b99300343", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e68f8a83-ea71-48f6-a991-abf47ad0c044.json b/generated_files/DISARM_STIX/relationship/relationship--e68f8a83-ea71-48f6-a991-abf47ad0c044.json new file mode 100644 index 0000000..0edefa0 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e68f8a83-ea71-48f6-a991-abf47ad0c044.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--9581c0e9-dfc5-4814-8da3-fbffed31396c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e68f8a83-ea71-48f6-a991-abf47ad0c044", + "created": "2023-09-28T21:25:13.320422Z", + "modified": "2023-09-28T21:25:13.320422Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--924eb596-25cc-4c13-8395-56ed892e5771", + "target_ref": "attack-pattern--54ea78c9-da07-4b80-90de-192e53719db5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e6c21d05-0d5e-4189-a5e1-ef63f0503607.json b/generated_files/DISARM_STIX/relationship/relationship--e6c21d05-0d5e-4189-a5e1-ef63f0503607.json new file mode 100644 index 0000000..9a35da5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e6c21d05-0d5e-4189-a5e1-ef63f0503607.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--9dfb5b2d-9df3-489b-bc4b-fb26f8175f72", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e6c21d05-0d5e-4189-a5e1-ef63f0503607", + "created": "2023-09-28T21:25:13.322676Z", + "modified": "2023-09-28T21:25:13.322676Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--1ba99e5a-e7f0-4075-a9bf-9da7bd87f15d", + "target_ref": "attack-pattern--92dca51a-8441-49d0-9c75-d060da716fa8", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e70a6b66-7629-408b-aac6-6845b29a57a1.json b/generated_files/DISARM_STIX/relationship/relationship--e70a6b66-7629-408b-aac6-6845b29a57a1.json new file mode 100644 index 0000000..6167583 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e70a6b66-7629-408b-aac6-6845b29a57a1.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a0ac671e-b9dc-4be6-b7bc-4ef24f22195f", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e70a6b66-7629-408b-aac6-6845b29a57a1", + "created": "2023-09-28T21:25:13.316953Z", + "modified": "2023-09-28T21:25:13.316953Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--eb037d2a-82a7-4bcb-bffd-e7791de21d1c", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e8b1de3d-7880-4c7f-be61-ed3bff8f61f8.json b/generated_files/DISARM_STIX/relationship/relationship--e8b1de3d-7880-4c7f-be61-ed3bff8f61f8.json new file mode 100644 index 0000000..9236298 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e8b1de3d-7880-4c7f-be61-ed3bff8f61f8.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--30a83a55-1684-4698-8c00-99a3e1bfb9cf", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e8b1de3d-7880-4c7f-be61-ed3bff8f61f8", + "created": "2023-09-28T21:25:13.320109Z", + "modified": "2023-09-28T21:25:13.320109Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--cb324e3c-1041-4a26-9fa8-da45547b7dcc", + "target_ref": "attack-pattern--6aa772c8-f51f-428e-a7e5-2d69dd8d4add", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--e8c8543d-247f-4d46-ba54-916a94d15321.json b/generated_files/DISARM_STIX/relationship/relationship--e8c8543d-247f-4d46-ba54-916a94d15321.json new file mode 100644 index 0000000..f73f991 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--e8c8543d-247f-4d46-ba54-916a94d15321.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2ddcb5b5-f635-43bf-a2e8-50f46aebb6c0", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--e8c8543d-247f-4d46-ba54-916a94d15321", + "created": "2023-09-28T21:25:13.301842Z", + "modified": "2023-09-28T21:25:13.301842Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--36f4dc58-e164-4819-83f8-52875377ff16", + "target_ref": "attack-pattern--23fc4de3-6f2c-4080-b8ed-13e996b1a4b9", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ea0325cb-dcc4-44c1-8ec4-b509d74ec8ad.json b/generated_files/DISARM_STIX/relationship/relationship--ea0325cb-dcc4-44c1-8ec4-b509d74ec8ad.json new file mode 100644 index 0000000..827b8d1 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ea0325cb-dcc4-44c1-8ec4-b509d74ec8ad.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--7d697517-e21a-4f4a-9efe-5cd9116f3bc1", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ea0325cb-dcc4-44c1-8ec4-b509d74ec8ad", + "created": "2023-09-28T21:25:13.312059Z", + "modified": "2023-09-28T21:25:13.312059Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--0461a925-3bb7-466c-a7ae-40aee015f403", + "target_ref": "attack-pattern--78a2af04-ac4a-430b-b233-6223715a76f5", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--ebf8a345-ad43-486d-b7b3-99b25aa902e6.json b/generated_files/DISARM_STIX/relationship/relationship--ebf8a345-ad43-486d-b7b3-99b25aa902e6.json new file mode 100644 index 0000000..01aef90 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--ebf8a345-ad43-486d-b7b3-99b25aa902e6.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--2bafcc22-6721-493e-bd66-4eaced51c898", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--ebf8a345-ad43-486d-b7b3-99b25aa902e6", + "created": "2023-09-28T21:25:13.30041Z", + "modified": "2023-09-28T21:25:13.30041Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--ec740173-f964-47cc-b849-06a1b134ee4f", + "target_ref": "attack-pattern--7981d39a-01be-46f6-b9f9-507d0c03e919", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--eedba334-395a-4372-9047-768e8842d748.json b/generated_files/DISARM_STIX/relationship/relationship--eedba334-395a-4372-9047-768e8842d748.json new file mode 100644 index 0000000..5c1ced5 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--eedba334-395a-4372-9047-768e8842d748.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--36f61bc8-26fe-4ac5-ae9a-6262edba0fdb", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--eedba334-395a-4372-9047-768e8842d748", + "created": "2023-09-28T21:25:13.314349Z", + "modified": "2023-09-28T21:25:13.314349Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--29dd92fd-fb77-4565-b58a-74795144c9a9", + "target_ref": "attack-pattern--872f0dc3-202e-4e9a-a4fc-0457252aecae", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--f3bd25c3-b90b-4ba4-ba59-752d3c5d7918.json b/generated_files/DISARM_STIX/relationship/relationship--f3bd25c3-b90b-4ba4-ba59-752d3c5d7918.json new file mode 100644 index 0000000..085fd2c --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--f3bd25c3-b90b-4ba4-ba59-752d3c5d7918.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--3837b951-d8c5-46d0-92dd-0f18b84fc9ac", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--f3bd25c3-b90b-4ba4-ba59-752d3c5d7918", + "created": "2023-09-28T21:25:13.317186Z", + "modified": "2023-09-28T21:25:13.317186Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--a09fbbeb-58ef-4e7a-8183-5eaa668200c9", + "target_ref": "attack-pattern--08db3527-8fc9-4bf6-bb49-e5a5249cc051", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--f6fb3fe1-9f71-4aa5-8298-7e003d62c5b2.json b/generated_files/DISARM_STIX/relationship/relationship--f6fb3fe1-9f71-4aa5-8298-7e003d62c5b2.json new file mode 100644 index 0000000..efc4968 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--f6fb3fe1-9f71-4aa5-8298-7e003d62c5b2.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--a16e3973-d4ab-4b2d-9032-05a59f05d000", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--f6fb3fe1-9f71-4aa5-8298-7e003d62c5b2", + "created": "2023-09-28T21:25:13.313016Z", + "modified": "2023-09-28T21:25:13.313016Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--db9eafc0-261b-48d0-97a2-1c92dcb4026a", + "target_ref": "attack-pattern--314ecce1-6d89-4304-a149-1c3d8fddaf9e", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--f9d57280-0e6e-4305-866d-f1db779e1dd3.json b/generated_files/DISARM_STIX/relationship/relationship--f9d57280-0e6e-4305-866d-f1db779e1dd3.json new file mode 100644 index 0000000..4430c21 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--f9d57280-0e6e-4305-866d-f1db779e1dd3.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--ab1744be-a227-48cc-b1d2-de900f11922c", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--f9d57280-0e6e-4305-866d-f1db779e1dd3", + "created": "2023-09-28T21:25:13.321782Z", + "modified": "2023-09-28T21:25:13.321782Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--4c06f94a-13d2-4b86-9505-38684b317bcb", + "target_ref": "attack-pattern--e1dec40e-b2c2-48ba-b04d-a2c4d46f2637", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--fc6d9723-b04c-4613-8ca6-5da7fc663dc4.json b/generated_files/DISARM_STIX/relationship/relationship--fc6d9723-b04c-4613-8ca6-5da7fc663dc4.json new file mode 100644 index 0000000..009aa5a --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--fc6d9723-b04c-4613-8ca6-5da7fc663dc4.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--af327d71-c6a1-4e33-94dd-f4f6c4106e79", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--fc6d9723-b04c-4613-8ca6-5da7fc663dc4", + "created": "2023-09-28T21:25:13.31532Z", + "modified": "2023-09-28T21:25:13.31532Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--c31542d3-d9c4-4fe4-ac5d-47632225a425", + "target_ref": "attack-pattern--e22e3d7d-40fc-4a5e-8d6c-d528b9f78e8e", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--fcf5a909-516b-4729-b74c-9a75d4938a26.json b/generated_files/DISARM_STIX/relationship/relationship--fcf5a909-516b-4729-b74c-9a75d4938a26.json new file mode 100644 index 0000000..368ad86 --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--fcf5a909-516b-4729-b74c-9a75d4938a26.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--0ce93975-b65b-432d-a404-d73eb473d5c5", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--fcf5a909-516b-4729-b74c-9a75d4938a26", + "created": "2023-09-28T21:25:13.311148Z", + "modified": "2023-09-28T21:25:13.311148Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--39ceaac8-e5f8-49be-95cf-0cbad07dfe72", + "target_ref": "attack-pattern--4a1d1dad-6784-42be-a7cd-1653cf8f34cc", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/relationship/relationship--fd7ee722-73fb-44c9-987c-c10a6b7b9a12.json b/generated_files/DISARM_STIX/relationship/relationship--fd7ee722-73fb-44c9-987c-c10a6b7b9a12.json new file mode 100644 index 0000000..56a8e9c --- /dev/null +++ b/generated_files/DISARM_STIX/relationship/relationship--fd7ee722-73fb-44c9-987c-c10a6b7b9a12.json @@ -0,0 +1,20 @@ +{ + "type": "bundle", + "id": "bundle--1c3f1509-81cb-4693-be46-546786c5ab0f", + "objects": [ + { + "type": "relationship", + "spec_version": "2.1", + "id": "relationship--fd7ee722-73fb-44c9-987c-c10a6b7b9a12", + "created": "2023-09-28T21:25:13.308214Z", + "modified": "2023-09-28T21:25:13.308214Z", + "relationship_type": "subtechnique-of", + "description": "", + "source_ref": "attack-pattern--3845d1f0-db88-41bb-95bf-8741ff9e72ea", + "target_ref": "attack-pattern--8c7832cb-8877-4f54-8e05-7e6df9a3d2b4", + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--0e0c1597-4b7d-43f1-b768-1c4a253c44df.json b/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--0e0c1597-4b7d-43f1-b768-1c4a253c44df.json index 47dd64d..b5d6620 100644 --- a/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--0e0c1597-4b7d-43f1-b768-1c4a253c44df.json +++ b/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--0e0c1597-4b7d-43f1-b768-1c4a253c44df.json @@ -1,13 +1,13 @@ { "type": "bundle", - "id": "bundle--a879c143-5452-46a1-b3b0-f7968461477e", + "id": "bundle--c2b53fd2-3ac4-4bd3-8bf3-8a8747b64414", "objects": [ { "type": "x-mitre-matrix", "spec_version": "2.1", "id": "x-mitre-matrix--0e0c1597-4b7d-43f1-b768-1c4a253c44df", - "created": "2023-09-25T16:17:56.814047Z", - "modified": "2023-09-25T16:17:56.814047Z", + "created": "2023-09-28T21:25:13.324673Z", + "modified": "2023-09-28T21:25:13.324673Z", "name": "DISARM Framework", "description": "DISARM is a framework designed for describing and understanding disinformation incidents.", "tactic_refs": [ @@ -22,7 +22,7 @@ "x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9", "x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4", "x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9", - "x-mitre-tactic--963a9c59-5e4d-433b-9fbe-485d3ceb0ce0", + "x-mitre-tactic--9e114812-fcc3-4b44-b259-18a32d7babbc", "x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db", "x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b", "x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9", diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--19886784-0e07-474f-803c-30c443e65347.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--19886784-0e07-474f-803c-30c443e65347.json index 09e2b2f..478aadc 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--19886784-0e07-474f-803c-30c443e65347.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--19886784-0e07-474f-803c-30c443e65347.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--e58078be-b203-465d-86b7-6d02f2e0682c", + "id": "bundle--52a592b7-f9bb-473f-a5e2-3f9f1106ee6a", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--19886784-0e07-474f-803c-30c443e65347", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.534109Z", - "modified": "2023-09-25T16:17:56.534109Z", + "created": "2023-09-28T21:25:13.186695Z", + "modified": "2023-09-28T21:25:13.186695Z", "name": "Assess Effectiveness", "description": "Assess effectiveness of action, for use in future plans", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--1e005da9-56cc-4802-af90-b267d17a1ad1.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--1e005da9-56cc-4802-af90-b267d17a1ad1.json index 77523e9..b819598 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--1e005da9-56cc-4802-af90-b267d17a1ad1.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--1e005da9-56cc-4802-af90-b267d17a1ad1.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--17a1290c-49c8-4ef3-a4e4-6af21ccb96e1", + "id": "bundle--b32e4cab-100e-4f98-ac58-3637604bf819", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--1e005da9-56cc-4802-af90-b267d17a1ad1", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.534552Z", - "modified": "2023-09-25T16:17:56.534552Z", + "created": "2023-09-28T21:25:13.187205Z", + "modified": "2023-09-28T21:25:13.187205Z", "name": "Target Audience Analysis", "description": "Identifying and analysing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analysing target audience members allows influence operations to tailor operation strategy and content to their analysis.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9.json index d9cc37c..43b5760 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f30e8544-4ad6-403e-95a1-d61126fcacdf", + "id": "bundle--2a72125a-b7b2-4bbf-88d7-92d369bd8e5a", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.53204Z", - "modified": "2023-09-25T16:17:56.53204Z", + "created": "2023-09-28T21:25:13.182957Z", + "modified": "2023-09-28T21:25:13.182957Z", "name": "Select Channels and Affordances", "description": "Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximise an influence operation\u2019s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b.json index f7d03f8..e92ce77 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a01d3fc5-1428-4647-9770-9bff1015ac5e", + "id": "bundle--40338e40-9ab4-470d-bf26-19bb94cf9045", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.53302Z", - "modified": "2023-09-25T16:17:56.53302Z", + "created": "2023-09-28T21:25:13.185109Z", + "modified": "2023-09-28T21:25:13.185109Z", "name": "Drive Offline Activity", "description": "Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--431af018-56ae-406c-9648-4857f074fffc.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--431af018-56ae-406c-9648-4857f074fffc.json index f8287e1..4c40014 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--431af018-56ae-406c-9648-4857f074fffc.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--431af018-56ae-406c-9648-4857f074fffc.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--54465e4f-2ab4-42b0-98bb-c4ee23f1efa2", + "id": "bundle--4aef62b2-77b6-4405-8596-e2f470ee224c", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--431af018-56ae-406c-9648-4857f074fffc", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.529781Z", - "modified": "2023-09-25T16:17:56.529781Z", + "created": "2023-09-28T21:25:13.180855Z", + "modified": "2023-09-28T21:25:13.180855Z", "name": "Plan Objectives", "description": "Set clearly defined, measurable, and achievable objectives. In some cases achieving objectives ties execution of tactical tasks to reaching the desired strategic end state. In other cases, where there is no clearly defined strategic end state, the tactical objective may stand on its own. The objective statement should not specify the way and means of accomplishment but rather the goal the threat actor wishes to achieve. ", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9.json index b7584c5..eee7027 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--34b7ee80-c9c3-46c4-9d7a-89cf3a51f600", + "id": "bundle--e3eeb954-2439-49c2-88bb-fcfd224bb58a", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.532627Z", - "modified": "2023-09-25T16:17:56.532627Z", + "created": "2023-09-28T21:25:13.184288Z", + "modified": "2023-09-28T21:25:13.184288Z", "name": "Deliver Content", "description": "Release content to general public or larger population", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--82039146-59a3-4353-b328-a422da34db6b.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--82039146-59a3-4353-b328-a422da34db6b.json index 44d9cc6..0ac6cc0 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--82039146-59a3-4353-b328-a422da34db6b.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--82039146-59a3-4353-b328-a422da34db6b.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6784843b-fe2a-4735-8c2f-233383b165b1", + "id": "bundle--e92a0dc6-22a3-48af-ae7a-c3788871e273", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--82039146-59a3-4353-b328-a422da34db6b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.53159Z", - "modified": "2023-09-25T16:17:56.53159Z", + "created": "2023-09-28T21:25:13.182374Z", + "modified": "2023-09-28T21:25:13.182374Z", "name": "Develop Content", "description": "Create or acquire text, images, and other content", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4.json index 6465ff4..2869716 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--6117748d-8be4-449b-9ae0-fa1b5f964e21", + "id": "bundle--8fdbde27-7007-4be3-9741-d0e4a4dbd77f", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.532301Z", - "modified": "2023-09-25T16:17:56.532301Z", + "created": "2023-09-28T21:25:13.183576Z", + "modified": "2023-09-28T21:25:13.183576Z", "name": "Conduct Pump Priming", "description": "Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8f32bafc-edb2-4d3c-9b7e-e42a9147123b.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8f32bafc-edb2-4d3c-9b7e-e42a9147123b.json index 721f49c..6a5c153 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8f32bafc-edb2-4d3c-9b7e-e42a9147123b.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--8f32bafc-edb2-4d3c-9b7e-e42a9147123b.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--f670b3a4-493a-4203-8eed-8bf60f35c0d8", + "id": "bundle--c561d450-ae76-4161-9598-67847531f587", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--8f32bafc-edb2-4d3c-9b7e-e42a9147123b", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.535646Z", - "modified": "2023-09-25T16:17:56.535646Z", + "created": "2023-09-28T21:25:13.187908Z", + "modified": "2023-09-28T21:25:13.187908Z", "name": "Establish Legitimacy", "description": "Establish assets that create trust", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--9e114812-fcc3-4b44-b259-18a32d7babbc.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--9e114812-fcc3-4b44-b259-18a32d7babbc.json new file mode 100644 index 0000000..d9c8738 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--9e114812-fcc3-4b44-b259-18a32d7babbc.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--105b9d1c-435c-4a2a-bf54-19ee65db6fdb", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--9e114812-fcc3-4b44-b259-18a32d7babbc", + "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", + "created": "2023-09-28T21:25:13.188363Z", + "modified": "2023-09-28T21:25:13.188363Z", + "name": "Maximise Exposure", + "description": "Maximise exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/tactics/TA17.md", + "external_id": "TA17" + } + ], + "object_marking_refs": [ + "marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31" + ], + "x_mitre_shortname": "maximise-exposure" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--acaf8903-418f-425a-93dc-8e1bfb626876.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--acaf8903-418f-425a-93dc-8e1bfb626876.json index c8a58ce..b3023d0 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--acaf8903-418f-425a-93dc-8e1bfb626876.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--acaf8903-418f-425a-93dc-8e1bfb626876.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--51efa039-caf6-4662-8551-ec70ede5be1e", + "id": "bundle--4c1911e5-a0b6-4ada-bae9-ee314503ac71", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--acaf8903-418f-425a-93dc-8e1bfb626876", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.530818Z", - "modified": "2023-09-25T16:17:56.530818Z", + "created": "2023-09-28T21:25:13.18167Z", + "modified": "2023-09-28T21:25:13.18167Z", "name": "Microtarget", "description": "Target very specific populations of people", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--b03163eb-7e81-4fed-9819-641bf7c99507.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--b03163eb-7e81-4fed-9819-641bf7c99507.json index 8f3eae7..a7d6b29 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--b03163eb-7e81-4fed-9819-641bf7c99507.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--b03163eb-7e81-4fed-9819-641bf7c99507.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--34d45ed9-6d16-43e0-a601-37445b7166cc", + "id": "bundle--b9899bec-37bb-4032-a83e-c844d855b0db", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--b03163eb-7e81-4fed-9819-641bf7c99507", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.52801Z", - "modified": "2023-09-25T16:17:56.52801Z", + "created": "2023-09-28T21:25:13.179932Z", + "modified": "2023-09-28T21:25:13.179932Z", "name": "Plan Strategy", "description": "Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--c4eaa2a6-7e86-4eb3-beaa-981a96d4724a.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--c4eaa2a6-7e86-4eb3-beaa-981a96d4724a.json index 975083c..1179822 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--c4eaa2a6-7e86-4eb3-beaa-981a96d4724a.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--c4eaa2a6-7e86-4eb3-beaa-981a96d4724a.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4f85e9de-48a7-4d86-9ccd-ede19139df07", + "id": "bundle--18f01e1c-e06e-4f56-9dbb-5e16da7dadf2", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--c4eaa2a6-7e86-4eb3-beaa-981a96d4724a", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.535352Z", - "modified": "2023-09-25T16:17:56.535352Z", + "created": "2023-09-28T21:25:13.187698Z", + "modified": "2023-09-28T21:25:13.187698Z", "name": "Establish Social Assets", "description": "Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organisations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9.json index f0f662b..0e5249c 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--af09e20c-917b-497d-89df-50098a771a87", + "id": "bundle--5aecbbe7-4a9a-4a88-839f-7e13041260b2", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.533364Z", - "modified": "2023-09-25T16:17:56.533364Z", + "created": "2023-09-28T21:25:13.186189Z", + "modified": "2023-09-28T21:25:13.186189Z", "name": "Persist in the Information Environment", "description": "Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db.json index 9913c6f..f290eb7 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--df481540-864c-4534-a5f8-a50434d6ff2f", + "id": "bundle--58694133-2400-4c47-a4ac-6b2e76740824", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.536229Z", - "modified": "2023-09-25T16:17:56.536229Z", + "created": "2023-09-28T21:25:13.188786Z", + "modified": "2023-09-28T21:25:13.188786Z", "name": "Drive Online Harms", "description": "Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations.", "external_references": [ diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--fd1e7dd3-63d0-4040-808e-3e61b9ddca86.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--fd1e7dd3-63d0-4040-808e-3e61b9ddca86.json index b36e707..c2d307a 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--fd1e7dd3-63d0-4040-808e-3e61b9ddca86.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--fd1e7dd3-63d0-4040-808e-3e61b9ddca86.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--4739a313-d8d1-4509-a9c3-1c78b9460130", + "id": "bundle--1d8616ee-7364-4497-84df-ab4881152510", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", "id": "x-mitre-tactic--fd1e7dd3-63d0-4040-808e-3e61b9ddca86", "created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82", - "created": "2023-09-25T16:17:56.535079Z", - "modified": "2023-09-25T16:17:56.535079Z", + "created": "2023-09-28T21:25:13.187521Z", + "modified": "2023-09-28T21:25:13.187521Z", "name": "Develop Narratives", "description": "The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a \"\"whole of society\"\" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives centre more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline.", "external_references": [ diff --git a/generated_pages/techniques/T0139.001.md b/generated_pages/techniques/T0139.001.md index 5faeec0..8bc4cd8 100644 --- a/generated_pages/techniques/T0139.001.md +++ b/generated_pages/techniques/T0139.001.md @@ -1,6 +1,6 @@ # Technique T0139.001: Discourage -* **Summary**: Inspire, animate, or exhort a target to act. An actor can use propaganda, disinformation, or conspiracy theories to stimulate a target to act in its interest. +* **Summary**: To make a target disinclined or reluctant to act. Manipulators use disinformation to cause targets to question the utility, legality, or morality of taking an action. * **Belongs to tactic stage**: TA02 diff --git a/generated_pages/techniques_index.md b/generated_pages/techniques_index.md index b1a5e2f..19ea2bb 100644 --- a/generated_pages/techniques_index.md +++ b/generated_pages/techniques_index.md @@ -1732,7 +1732,7 @@