DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803.json
2024-11-22 13:37:54 -05:00

40 lines
1.8 KiB
JSON

{
"type": "bundle",
"id": "bundle--d75f5597-857c-45f1-ba97-9fc2a49f2b4d",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--6b495bb5-d2ab-4da7-9530-a1aadd488803",
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
"created": "2024-11-22T16:43:58.19525Z",
"modified": "2024-11-22T16:43:58.19525Z",
"name": "Launder Information Assets",
"description": "Laundering occurs when an influence operation acquires control of previously legitimate information assets such as accounts, channels, pages etc. from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered assets to reach target audience members from within an existing information community and to complicate attribution.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "persist-in-the-information-environment"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0128.004.md",
"external_id": "T0128.004"
}
],
"object_marking_refs": [
"marking-definition--f79f25d2-8b96-4580-b169-eb7b613a7c31"
],
"x_mitre_is_subtechnique": true,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "2.1"
}
]
}