ceios/builder/stix/attack-flow-example.json
Jim Andrew Morris 9f997913c0 Pushed builder to wrong folder
changing the folder the disarm-attackflow builder was pushed to
2024-09-13 15:29:20 +09:30

335 строки
14 KiB
JSON

{
"type": "bundle",
"id": "bundle--e8d6416b-feb8-4e3b-833c-cb6b79dfd922",
"objects": [
{
"type": "extension-definition",
"id": "extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4",
"spec_version": "2.1",
"name": "Attack Flow",
"description": "Extends STIX 2.1 with features to create Attack Flows.",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"created_by_ref": "identity--d673f8cb-c168-42da-8ed4-0cb26725f86c",
"schema": "https://center-for-threat-informed-defense.github.io/attack-flow/stix/attack-flow-schema-2.0.0.json",
"version": "2.0.0",
"extension_types": [
"new-sdo"
],
"external_references": [
{
"source_name": "Documentation",
"description": "Documentation for Attack Flow",
"url": "https://center-for-threat-informed-defense.github.io/attack-flow"
},
{
"source_name": "GitHub",
"description": "Source code repository for Attack Flow",
"url": "https://github.com/center-for-threat-informed-defense/attack-flow"
}
]
},
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--d673f8cb-c168-42da-8ed4-0cb26725f86c",
"created_by_ref": "identity--d673f8cb-c168-42da-8ed4-0cb26725f86c",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"name": "MITRE Engenuity Center for Threat-Informed Defense",
"identity_class": "organization"
},
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--fe7860f3-e23f-4d3f-9248-91105467a77a",
"created_by_ref": "identity--fe7860f3-e23f-4d3f-9248-91105467a77a",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"name": "John Doe",
"contact_information": "jdoe@mitre.org",
"identity_class": "individual"
},
{
"type": "attack-flow",
"spec_version": "2.1",
"id": "attack-flow--e9ec3a4b-f787-4e81-a3d9-4cfe017ebc2f",
"created_by_ref": "identity--fe7860f3-e23f-4d3f-9248-91105467a77a",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"name": "Example Flow",
"description": "This Attack Flow example demonstrates some of the key concepts of the Attack Flow specification.",
"scope": "incident",
"start_refs": [
"attack-action--37345417-3ee0-4e11-b421-1d4be68e6f15",
"attack-action--3ea0de71-67a6-426e-bb2f-86375c620478",
"attack-action--4f541c4c-b7bb-4b14-befd-ca8e8fe12599"
],
"external_references": [
{
"source_name": "APT X Campaign Report. Fictitious Corp. August 15 2022.",
"description": "A threat intel report summarizing the public CTI associated with the APT X phishing campaign.",
"url": "http://blog.example.com/apt-x-campaign-report/"
},
{
"source_name": "APT X Threat Actor Report. Imaginary LLC. Jun 24 2022.",
"description": "A threat intel report summarizing the public CTI associated with the APT X threat actor profile.",
"url": "http://blog.example.com/apt-x-threat-actor/"
}
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-action",
"spec_version": "2.1",
"id": "attack-action--37345417-3ee0-4e11-b421-1d4be68e6f15",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"technique_id": "T1583.002",
"name": "Acquire Infrastructure: Domains",
"technique_ref": "attack-pattern--40f5caa0-4cb7-4117-89fc-d421bb493df3",
"description": "The attacker obtains a phishing domain similar to the target company.",
"effect_refs": [
"attack-condition--7e809f5b-319a-4b3f-82fe-e4dc09af5088"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--962081ff-716c-444c-a5fa-c581fbb500a7",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"relationship_type": "related-to",
"target_ref": "attack-action--37345417-3ee0-4e11-b421-1d4be68e6f15",
"source_ref": "infrastructure--0048e01d-260f-4af2-8ebc-90377f520830"
},
{
"type": "infrastructure",
"spec_version": "2.1",
"id": "infrastructure--0048e01d-260f-4af2-8ebc-90377f520830",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"name": "Phishing infra: blog.examp1e.com",
"description": "The phishing domain uses a homoglyphic variant of example.com.",
"infrastructure_types": [
"phishing"
]
},
{
"type": "attack-condition",
"spec_version": "2.1",
"id": "attack-condition--7e809f5b-319a-4b3f-82fe-e4dc09af5088",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"description": "Adversary possesses a phishing domain.",
"on_true_refs": [
"attack-operator--609d7adf-a3d2-44e8-82de-4b30e3fb97be"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-action",
"spec_version": "2.1",
"id": "attack-action--3ea0de71-67a6-426e-bb2f-86375c620478",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"technique_id": "T1583.003",
"name": "Acquire Infrastructure: Virtual Private Server",
"technique_ref": "attack-pattern--79da0971-3147-4af6-a4f5-e8cd447cd795",
"description": "The attacker obtains a VPC for hosting phishing sites.",
"effect_refs": [
"attack-condition--a9416f58-3fd1-4743-bd4c-6272dfd8c4e2"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a41c5033-da75-44cd-9bcb-632a7a165d11",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"relationship_type": "related-to",
"target_ref": "attack-action--3ea0de71-67a6-426e-bb2f-86375c620478",
"source_ref": "infrastructure--0048e01d-260f-4af2-8ebc-90377f520830"
},
{
"type": "attack-condition",
"spec_version": "2.1",
"id": "attack-condition--a9416f58-3fd1-4743-bd4c-6272dfd8c4e2",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"description": "Adversary possesses phishing server.",
"on_true_refs": [
"attack-operator--609d7adf-a3d2-44e8-82de-4b30e3fb97be"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-action",
"spec_version": "2.1",
"id": "attack-action--4f541c4c-b7bb-4b14-befd-ca8e8fe12599",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"technique_id": "T1589.002",
"name": "Gather Victim Identity Information: Email",
"technique_ref": "attack-pattern--69f897fd-12a9-4c89-ad6a-46d2f3c38262",
"description": "The attacker scrapes email addresses from the corporate web site.",
"effect_refs": [
"attack-condition--3ace48ed-24fd-4d24-a399-62202ae6356b"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-condition",
"spec_version": "2.1",
"id": "attack-condition--3ace48ed-24fd-4d24-a399-62202ae6356b",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"description": "Adversary possesses list of emails.",
"on_true_refs": [
"attack-operator--609d7adf-a3d2-44e8-82de-4b30e3fb97be"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-operator",
"spec_version": "2.1",
"id": "attack-operator--609d7adf-a3d2-44e8-82de-4b30e3fb97be",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"operator": "AND",
"effect_refs": [
"attack-action--d68e5201-796c-469c-b012-290b7040db02"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-action",
"spec_version": "2.1",
"id": "attack-action--d68e5201-796c-469c-b012-290b7040db02",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"technique_id": "1598.003",
"name": "Phishing: Spearphishing Link",
"technique_ref": "attack-pattern--20138b9d-1aac-4a26-8654-a36b6bbf2bba",
"description": "The email says that the users's Outlook credentials have been compromised and contain a fake link to reset the credentials.",
"asset_refs": [
"attack-asset--f7edf4aa-29ec-47aa-b4f6-c42dfbe2ac20"
],
"effect_refs": [
"attack-condition--2277d494-031e-4d79-b557-f31e4451a305"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-asset",
"spec_version": "2.1",
"id": "attack-asset--f7edf4aa-29ec-47aa-b4f6-c42dfbe2ac20",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"name": "Employee WordPress Account",
"description": "The employee's credentials for accessing the WordPress blog.",
"object_ref": "user-account--ce035bd0-8e58-4d18-aefb-f1fbb031d782",
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "user-account",
"spec_version": "2.1",
"id": "user-account--ce035bd0-8e58-4d18-aefb-f1fbb031d782",
"account_login": "jdoe@example.com",
"account_type": "wordpress"
},
{
"type": "attack-condition",
"spec_version": "2.1",
"id": "attack-condition--2277d494-031e-4d79-b557-f31e4451a305",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"description": "Adversary acquires an employee's password in plaintext.",
"on_true_refs": [
"attack-action--1c0078ec-0731-4bf4-b1e5-6e3289c9c4eb"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-action",
"spec_version": "2.1",
"id": "attack-action--1c0078ec-0731-4bf4-b1e5-6e3289c9c4eb",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"technique_id": "T1190",
"name": "Exploit Public-Facing Application",
"technique_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c",
"description": "Adversary logs into corporate WordPress blog with employee credentials.",
"asset_refs": [
"attack-asset--f7edf4aa-29ec-47aa-b4f6-c42dfbe2ac20",
"attack-asset--5638cc2e-39b9-4a83-8edc-b6875d2cd30b"
],
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
},
{
"type": "attack-asset",
"spec_version": "2.1",
"id": "attack-asset--5638cc2e-39b9-4a83-8edc-b6875d2cd30b",
"created": "2022-08-02T19:34:35.143Z",
"modified": "2022-08-02T19:34:35.143Z",
"name": "Corporate Blog on WordPress",
"description": "The corporate blog is hosted on a WordPress site.",
"extensions": {
"extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4": {
"extension_type": "new-sdo"
}
}
}
]
}