DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--107e3180-34f6-4e11-a952-705df35b52f7.json
2022-07-02 16:01:17 -04:00

40 lines
1.7 KiB
JSON

{
"type": "bundle",
"id": "bundle--4174c131-9a90-4d85-b11d-439b04438456",
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--107e3180-34f6-4e11-a952-705df35b52f7",
"created_by_ref": "identity--9b2c579f-fdf5-4585-ba48-f4bfdcf6e703",
"created": "2022-07-02T19:59:12.731474Z",
"modified": "2022-07-02T19:59:12.731474Z",
"name": "Launder Accounts",
"description": "Account laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "persist-in-the-information-environment"
}
],
"external_references": [
{
"source_name": "DISARM",
"url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0128.004.md",
"external_id": "T0128.004"
}
],
"object_marking_refs": [
"marking-definition--1f97face-a051-4873-be69-61a6fb53fc4a"
],
"x_mitre_is_subtechnique": true,
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "1.0"
}
]
}