DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37.json

40 lines
1.8 KiB
JSON

{
"type": "bundle",
"id": "bundle--7634acc4-011d-4c1e-9077-04da054d9058",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--c254c765-c83d-4ae3-880e-7a253ef02d37",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2023-09-25T16:17:56.611937Z",
"modified": "2023-09-25T16:17:56.611937Z",
"name": "Integrate Target Audience Vulnerabilities into Narrative",
"description": "An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation\u2019s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "develop-narratives"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0083.md",
"external_id": "T0083"
}
],
"object_marking_refs": [
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "2.1"
}
]
}