test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /campaign /campaign--ab747e62-1bcb-479f-a26b-1cd39d413d81.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
2.53 kB
{
"type": "bundle",
"id": "bundle--af08a825-4cfe-40fc-8029-80bf88dfa8fa",
"spec_version": "2.0",
"objects": [
{
"modified": "2022-10-04T20:18:28.362Z",
"name": "C0010",
"description": "[C0010](https://attack.mitre.org/campaigns/C0010) was a cyber espionage campaign conducted by UNC3890 that targeted Israeli shipping, government, aviation, energy, and healthcare organizations. Security researcher assess UNC3890 conducts operations in support of Iranian interests, and noted several limited technical connections to Iran, including PDB strings and Farsi language artifacts. [C0010](https://attack.mitre.org/campaigns/C0010) began by at least late 2020, and was still ongoing as of mid-2022.(Citation: Mandiant UNC3890 Aug 2022)",
"aliases": [
"C0010"
],
"first_seen": "2020-12-01T07:00:00.000Z",
"last_seen": "2022-08-01T06:00:00.000Z",
"x_mitre_first_seen_citation": "(Citation: Mandiant UNC3890 Aug 2022)",
"x_mitre_last_seen_citation": "(Citation: Mandiant UNC3890 Aug 2022)",
"x_mitre_deprecated": false,
"x_mitre_version": "1.0",
"type": "campaign",
"id": "campaign--ab747e62-1bcb-479f-a26b-1cd39d413d81",
"created": "2022-09-21T22:16:42.003Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/campaigns/C0010",
"external_id": "C0010"
},
{
"source_name": "Mandiant UNC3890 Aug 2022",
"description": "Mandiant Israel Research Team. (2022, August 17). Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors. Retrieved September 21, 2022.",
"url": "https://www.mandiant.com/resources/blog/suspected-iranian-actor-targeting-israeli-shipping"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "3.0.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_domains": [
"enterprise-attack"
]
}
]
}