{ "type": "bundle", "id": "bundle--0a78f273-bec2-4bc4-bb8b-98d12cd1a654", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", "id": "attack-pattern--7763a745-0e8f-4319-b877-440860e304e7", "created_by_ref": "identity--47399482-4979-4318-a257-30fcce1fb09f", "created": "2022-07-02T19:59:12.662918Z", "modified": "2022-07-02T19:59:12.662918Z", "name": "Fund Proxies", "description": "An influence operation may fund proxies, or external entities that work for the operation. An operation may recruit/train users with existing sympathies towards the operation\u2019s narratives and/or goals as proxies. Funding proxies serves various purposes including: \n- Diversifying operation locations to complicate attribution \n- Reducing the workload for direct operation assets ", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", "phase_name": "establish-social-assets" } ], "external_references": [ { "source_name": "DISARM", "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0093.001.md", "external_id": "T0093.001" } ], "object_marking_refs": [ "marking-definition--f958993d-04d3-4aeb-a0ff-0854d5e56e22" ], "x_mitre_is_subtechnique": true, "x_mitre_platforms": [ "Windows", "Linux", "Mac" ], "x_mitre_version": "1.0" } ] }