{ "type": "bundle", "id": "bundle--a97c0772-126c-4632-a1c6-eb243efbda51", "spec_version": "2.0", "objects": [ { "type": "relationship", "id": "relationship--0f18b876-b698-4f70-aa98-50e8b5a7eae2", "created": "2018-04-18T17:59:24.739Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "revoked": false, "external_references": [ { "source_name": "Andy Greenburg June 2019", "description": "Andy Greenburg 2019, June 20 Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount Retrieved. 2020/01/03 ", "url": "https://www.wired.com/story/iran-hackers-us-phishing-tensions/" }, { "source_name": "Jacqueline O'Leary et al. September 2017", "description": "Jacqueline O'Leary et al. 2017, September 20 Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware Retrieved. 2019/12/02 ", "url": "https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "modified": "2022-10-12T15:41:49.943Z", "description": "[APT33](https://attack.mitre.org/groups/G0064) sent spear phishing emails containing links to HTML application files, which were embedded with malicious code. (Citation: Jacqueline O'Leary et al. September 2017) [APT33](https://attack.mitre.org/groups/G0064) has conducted targeted spear phishing campaigns against U.S. government agencies and private sector companies. (Citation: Andy Greenburg June 2019)", "relationship_type": "uses", "source_ref": "intrusion-set--fbd29c89-18ba-4c2d-b792-51c0adee049f", "target_ref": "attack-pattern--648f995e-9c3a-41e4-aeee-98bb41037426", "x_mitre_deprecated": false, "x_mitre_version": "1.0", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }