txt2stix 0.0.4__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/__init__.py +33 -0
- txt2stix/ai_extractor/__init__.py +15 -0
- txt2stix/ai_extractor/anthropic.py +12 -0
- txt2stix/ai_extractor/base.py +87 -0
- txt2stix/ai_extractor/deepseek.py +19 -0
- txt2stix/ai_extractor/gemini.py +18 -0
- txt2stix/ai_extractor/openai.py +15 -0
- txt2stix/ai_extractor/openrouter.py +20 -0
- txt2stix/ai_extractor/prompts.py +164 -0
- txt2stix/ai_extractor/utils.py +85 -0
- txt2stix/attack_flow.py +101 -0
- txt2stix/bundler.py +428 -0
- txt2stix/common.py +23 -0
- txt2stix/extractions.py +59 -0
- txt2stix/includes/__init__.py +0 -0
- txt2stix/includes/extractions/ai/config.yaml +1023 -0
- txt2stix/includes/extractions/lookup/config.yaml +393 -0
- txt2stix/includes/extractions/pattern/config.yaml +609 -0
- txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
- txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
- txt2stix/includes/helpers/tlds.txt +1446 -0
- txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
- txt2stix/includes/lookups/_README.md +11 -0
- txt2stix/includes/lookups/_generate_lookups.py +247 -0
- txt2stix/includes/lookups/attack_pattern.txt +1 -0
- txt2stix/includes/lookups/campaign.txt +1 -0
- txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
- txt2stix/includes/lookups/course_of_action.txt +1 -0
- txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
- txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
- txt2stix/includes/lookups/extensions.txt +78 -0
- txt2stix/includes/lookups/identity.txt +1 -0
- txt2stix/includes/lookups/infrastructure.txt +1 -0
- txt2stix/includes/lookups/intrusion_set.txt +1 -0
- txt2stix/includes/lookups/malware.txt +2 -0
- txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
- txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
- txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
- txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
- txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
- txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
- txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
- txt2stix/includes/lookups/threat_actor.txt +1 -0
- txt2stix/includes/lookups/tld.txt +1422 -0
- txt2stix/includes/lookups/tool.txt +1 -0
- txt2stix/includes/tests/test_cases.yaml +695 -0
- txt2stix/indicator.py +860 -0
- txt2stix/lookups.py +68 -0
- txt2stix/pattern/__init__.py +13 -0
- txt2stix/pattern/extractors/__init__.py +0 -0
- txt2stix/pattern/extractors/base_extractor.py +167 -0
- txt2stix/pattern/extractors/card/README.md +34 -0
- txt2stix/pattern/extractors/card/__init__.py +15 -0
- txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
- txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
- txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
- txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
- txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
- txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
- txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
- txt2stix/pattern/extractors/crypto/__init__.py +3 -0
- txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
- txt2stix/pattern/extractors/directory/__init__.py +10 -0
- txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
- txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
- txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/domain/__init__.py +8 -0
- txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
- txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
- txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
- txt2stix/pattern/extractors/hashes/__init__.py +16 -0
- txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
- txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
- txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
- txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
- txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
- txt2stix/pattern/extractors/helper.py +64 -0
- txt2stix/pattern/extractors/ip/__init__.py +14 -0
- txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
- txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
- txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
- txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
- txt2stix/pattern/extractors/others/__init__.py +22 -0
- txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
- txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
- txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
- txt2stix/pattern/extractors/others/email_extractor.py +21 -0
- txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
- txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
- txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
- txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
- txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
- txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
- txt2stix/pattern/extractors/url/__init__.py +7 -0
- txt2stix/pattern/extractors/url/url_extractor.py +22 -0
- txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
- txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
- txt2stix/retriever.py +126 -0
- txt2stix/stix.py +1 -0
- txt2stix/txt2stix.py +336 -0
- txt2stix/utils.py +86 -0
- txt2stix-0.0.4.dist-info/METADATA +190 -0
- txt2stix-0.0.4.dist-info/RECORD +119 -0
- txt2stix-0.0.4.dist-info/WHEEL +4 -0
- txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
- txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,345 @@
|
|
1
|
+
T0002
|
2
|
+
T0003
|
3
|
+
T0004
|
4
|
+
T0007
|
5
|
+
T0010
|
6
|
+
T0013
|
7
|
+
T0014
|
8
|
+
T0014.001
|
9
|
+
T0014.002
|
10
|
+
T0015
|
11
|
+
T0016
|
12
|
+
T0017
|
13
|
+
T0017.001
|
14
|
+
T0018
|
15
|
+
T0020
|
16
|
+
T0022
|
17
|
+
T0022.001
|
18
|
+
T0022.002
|
19
|
+
T0023
|
20
|
+
T0023.001
|
21
|
+
T0023.002
|
22
|
+
T0029
|
23
|
+
T0039
|
24
|
+
T0040
|
25
|
+
T0042
|
26
|
+
T0043
|
27
|
+
T0043.001
|
28
|
+
T0043.002
|
29
|
+
T0044
|
30
|
+
T0045
|
31
|
+
T0046
|
32
|
+
T0047
|
33
|
+
T0048
|
34
|
+
T0048.001
|
35
|
+
T0048.002
|
36
|
+
T0048.003
|
37
|
+
T0048.004
|
38
|
+
T0049
|
39
|
+
T0049.001
|
40
|
+
T0049.002
|
41
|
+
T0049.003
|
42
|
+
T0049.004
|
43
|
+
T0049.005
|
44
|
+
T0049.006
|
45
|
+
T0049.007
|
46
|
+
T0049.008
|
47
|
+
T0057
|
48
|
+
T0057.001
|
49
|
+
T0057.002
|
50
|
+
T0059
|
51
|
+
T0060
|
52
|
+
T0061
|
53
|
+
T0065
|
54
|
+
T0066
|
55
|
+
T0068
|
56
|
+
T0072
|
57
|
+
T0072.001
|
58
|
+
T0072.002
|
59
|
+
T0072.003
|
60
|
+
T0072.004
|
61
|
+
T0072.005
|
62
|
+
T0073
|
63
|
+
T0074
|
64
|
+
T0074.001
|
65
|
+
T0074.002
|
66
|
+
T0074.003
|
67
|
+
T0074.004
|
68
|
+
T0075
|
69
|
+
T0075.001
|
70
|
+
T0076
|
71
|
+
T0077
|
72
|
+
T0078
|
73
|
+
T0079
|
74
|
+
T0080
|
75
|
+
T0080.001
|
76
|
+
T0080.002
|
77
|
+
T0080.003
|
78
|
+
T0080.004
|
79
|
+
T0080.005
|
80
|
+
T0081
|
81
|
+
T0081.001
|
82
|
+
T0081.002
|
83
|
+
T0081.003
|
84
|
+
T0081.004
|
85
|
+
T0081.005
|
86
|
+
T0081.006
|
87
|
+
T0081.007
|
88
|
+
T0081.008
|
89
|
+
T0082
|
90
|
+
T0083
|
91
|
+
T0084
|
92
|
+
T0084.001
|
93
|
+
T0084.002
|
94
|
+
T0084.003
|
95
|
+
T0084.004
|
96
|
+
T0085
|
97
|
+
T0085.001
|
98
|
+
T0085.003
|
99
|
+
T0085.004
|
100
|
+
T0085.005
|
101
|
+
T0085.006
|
102
|
+
T0085.007
|
103
|
+
T0085.008
|
104
|
+
T0086
|
105
|
+
T0086.001
|
106
|
+
T0086.002
|
107
|
+
T0086.003
|
108
|
+
T0086.004
|
109
|
+
T0087
|
110
|
+
T0087.001
|
111
|
+
T0087.002
|
112
|
+
T0088
|
113
|
+
T0088.001
|
114
|
+
T0088.002
|
115
|
+
T0089
|
116
|
+
T0089.001
|
117
|
+
T0089.003
|
118
|
+
T0090
|
119
|
+
T0090.001
|
120
|
+
T0090.002
|
121
|
+
T0090.003
|
122
|
+
T0090.004
|
123
|
+
T0091
|
124
|
+
T0091.001
|
125
|
+
T0091.002
|
126
|
+
T0091.003
|
127
|
+
T0092
|
128
|
+
T0092.001
|
129
|
+
T0092.002
|
130
|
+
T0092.003
|
131
|
+
T0093
|
132
|
+
T0093.001
|
133
|
+
T0093.002
|
134
|
+
T0094
|
135
|
+
T0094.001
|
136
|
+
T0094.002
|
137
|
+
T0095
|
138
|
+
T0096
|
139
|
+
T0096.001
|
140
|
+
T0096.002
|
141
|
+
T0097
|
142
|
+
T0097.100
|
143
|
+
T0097.101
|
144
|
+
T0097.102
|
145
|
+
T0097.103
|
146
|
+
T0097.104
|
147
|
+
T0097.105
|
148
|
+
T0097.106
|
149
|
+
T0097.107
|
150
|
+
T0097.108
|
151
|
+
T0097.109
|
152
|
+
T0097.110
|
153
|
+
T0097.111
|
154
|
+
T0097.112
|
155
|
+
T0097.200
|
156
|
+
T0097.201
|
157
|
+
T0097.202
|
158
|
+
T0097.203
|
159
|
+
T0097.204
|
160
|
+
T0097.205
|
161
|
+
T0097.206
|
162
|
+
T0097.207
|
163
|
+
T0097.208
|
164
|
+
T0098
|
165
|
+
T0098.001
|
166
|
+
T0098.002
|
167
|
+
T0100
|
168
|
+
T0100.001
|
169
|
+
T0100.002
|
170
|
+
T0100.003
|
171
|
+
T0101
|
172
|
+
T0102
|
173
|
+
T0102.001
|
174
|
+
T0102.002
|
175
|
+
T0102.003
|
176
|
+
T0103
|
177
|
+
T0103.001
|
178
|
+
T0103.002
|
179
|
+
T0104
|
180
|
+
T0104.001
|
181
|
+
T0104.002
|
182
|
+
T0104.003
|
183
|
+
T0104.004
|
184
|
+
T0104.005
|
185
|
+
T0104.006
|
186
|
+
T0105
|
187
|
+
T0105.001
|
188
|
+
T0105.002
|
189
|
+
T0105.003
|
190
|
+
T0106
|
191
|
+
T0106.001
|
192
|
+
T0107
|
193
|
+
T0108
|
194
|
+
T0109
|
195
|
+
T0110
|
196
|
+
T0111
|
197
|
+
T0111.001
|
198
|
+
T0111.002
|
199
|
+
T0111.003
|
200
|
+
T0112
|
201
|
+
T0113
|
202
|
+
T0114
|
203
|
+
T0114.001
|
204
|
+
T0114.002
|
205
|
+
T0115
|
206
|
+
T0115.001
|
207
|
+
T0115.002
|
208
|
+
T0115.003
|
209
|
+
T0116
|
210
|
+
T0116.001
|
211
|
+
T0117
|
212
|
+
T0118
|
213
|
+
T0119
|
214
|
+
T0119.001
|
215
|
+
T0119.002
|
216
|
+
T0119.003
|
217
|
+
T0120
|
218
|
+
T0120.001
|
219
|
+
T0120.002
|
220
|
+
T0121
|
221
|
+
T0121.001
|
222
|
+
T0122
|
223
|
+
T0123
|
224
|
+
T0123.001
|
225
|
+
T0123.002
|
226
|
+
T0123.003
|
227
|
+
T0123.004
|
228
|
+
T0124
|
229
|
+
T0124.001
|
230
|
+
T0124.002
|
231
|
+
T0124.003
|
232
|
+
T0125
|
233
|
+
T0126
|
234
|
+
T0126.001
|
235
|
+
T0126.002
|
236
|
+
T0127
|
237
|
+
T0127.001
|
238
|
+
T0127.002
|
239
|
+
T0128
|
240
|
+
T0128.001
|
241
|
+
T0128.002
|
242
|
+
T0128.003
|
243
|
+
T0128.004
|
244
|
+
T0128.005
|
245
|
+
T0129
|
246
|
+
T0129.001
|
247
|
+
T0129.002
|
248
|
+
T0129.003
|
249
|
+
T0129.004
|
250
|
+
T0129.005
|
251
|
+
T0129.006
|
252
|
+
T0129.007
|
253
|
+
T0129.008
|
254
|
+
T0129.009
|
255
|
+
T0129.010
|
256
|
+
T0130
|
257
|
+
T0130.001
|
258
|
+
T0130.002
|
259
|
+
T0130.003
|
260
|
+
T0130.004
|
261
|
+
T0130.005
|
262
|
+
T0131
|
263
|
+
T0131.001
|
264
|
+
T0131.002
|
265
|
+
T0132
|
266
|
+
T0132.001
|
267
|
+
T0132.002
|
268
|
+
T0132.003
|
269
|
+
T0133
|
270
|
+
T0133.001
|
271
|
+
T0133.002
|
272
|
+
T0133.003
|
273
|
+
T0133.004
|
274
|
+
T0133.005
|
275
|
+
T0134
|
276
|
+
T0134.001
|
277
|
+
T0134.002
|
278
|
+
T0135
|
279
|
+
T0135.001
|
280
|
+
T0135.002
|
281
|
+
T0135.003
|
282
|
+
T0135.004
|
283
|
+
T0136
|
284
|
+
T0136.001
|
285
|
+
T0136.002
|
286
|
+
T0136.003
|
287
|
+
T0136.004
|
288
|
+
T0136.005
|
289
|
+
T0136.006
|
290
|
+
T0136.007
|
291
|
+
T0136.008
|
292
|
+
T0137
|
293
|
+
T0137.001
|
294
|
+
T0137.002
|
295
|
+
T0137.003
|
296
|
+
T0137.004
|
297
|
+
T0137.005
|
298
|
+
T0137.006
|
299
|
+
T0138
|
300
|
+
T0138.001
|
301
|
+
T0138.002
|
302
|
+
T0138.003
|
303
|
+
T0139
|
304
|
+
T0139.001
|
305
|
+
T0139.002
|
306
|
+
T0139.003
|
307
|
+
T0140
|
308
|
+
T0140.001
|
309
|
+
T0140.002
|
310
|
+
T0140.003
|
311
|
+
T0141
|
312
|
+
T0141.001
|
313
|
+
T0141.002
|
314
|
+
T0143
|
315
|
+
T0143.001
|
316
|
+
T0143.002
|
317
|
+
T0143.003
|
318
|
+
T0143.004
|
319
|
+
T0144
|
320
|
+
T0144.001
|
321
|
+
T0144.002
|
322
|
+
T0145
|
323
|
+
T0145.001
|
324
|
+
T0145.002
|
325
|
+
T0145.003
|
326
|
+
T0145.004
|
327
|
+
T0145.005
|
328
|
+
T0145.006
|
329
|
+
T0145.007
|
330
|
+
TA01
|
331
|
+
TA02
|
332
|
+
TA05
|
333
|
+
TA06
|
334
|
+
TA07
|
335
|
+
TA08
|
336
|
+
TA09
|
337
|
+
TA10
|
338
|
+
TA11
|
339
|
+
TA12
|
340
|
+
TA13
|
341
|
+
TA14
|
342
|
+
TA15
|
343
|
+
TA16
|
344
|
+
TA17
|
345
|
+
TA18
|
@@ -0,0 +1,347 @@
|
|
1
|
+
Plan Strategy
|
2
|
+
Plan Objectives
|
3
|
+
Microtarget
|
4
|
+
Develop Content
|
5
|
+
Select Channels and Affordances
|
6
|
+
Conduct Pump Priming
|
7
|
+
Deliver Content
|
8
|
+
Drive Offline Activity
|
9
|
+
Persist in the Information Environment
|
10
|
+
Assess Effectiveness
|
11
|
+
Target Audience Analysis
|
12
|
+
Develop Narratives
|
13
|
+
Establish Assets
|
14
|
+
Establish Legitimacy
|
15
|
+
Maximise Exposure
|
16
|
+
Drive Online Harms
|
17
|
+
Facilitate State Propaganda
|
18
|
+
Leverage Existing Narratives
|
19
|
+
Develop Competing Narratives
|
20
|
+
Create Inauthentic Social Media Pages and Groups
|
21
|
+
Cultivate Ignorant Agents
|
22
|
+
Create Inauthentic Websites
|
23
|
+
Prepare Fundraising Campaigns
|
24
|
+
Raise Funds from Malign Actors
|
25
|
+
Raise Funds from Ignorant Agents
|
26
|
+
Create Hashtags and Search Artefacts
|
27
|
+
Create Clickbait
|
28
|
+
Conduct Fundraising
|
29
|
+
Conduct Crowdfunding Campaigns
|
30
|
+
Purchase Targeted Advertisements
|
31
|
+
Trial Content
|
32
|
+
Leverage Conspiracy Theory Narratives
|
33
|
+
Amplify Existing Conspiracy Theory Narratives
|
34
|
+
Develop Original Conspiracy Theory Narratives
|
35
|
+
Distort Facts
|
36
|
+
Reframe Context
|
37
|
+
Edit Open-Source Content
|
38
|
+
Online Polls
|
39
|
+
Bait Influencer
|
40
|
+
Demand Insurmountable Proof
|
41
|
+
Seed Kernel of Truth
|
42
|
+
Chat Apps
|
43
|
+
Use Encrypted Chat Apps
|
44
|
+
Use Unencrypted Chats Apps
|
45
|
+
Seed Distortions
|
46
|
+
Use Fake Experts
|
47
|
+
Use Search Engine Optimisation
|
48
|
+
Censor Social Media as a Political Force
|
49
|
+
Harass
|
50
|
+
Boycott/"Cancel" Opponents
|
51
|
+
Harass People Based on Identities
|
52
|
+
Threaten to Dox
|
53
|
+
Dox
|
54
|
+
Flood Information Space
|
55
|
+
Trolls Amplify and Manipulate
|
56
|
+
Flood Existing Hashtag
|
57
|
+
Bots Amplify via Automated Forwarding and Reposting
|
58
|
+
Utilise Spamoflauge
|
59
|
+
Conduct Swarming
|
60
|
+
Conduct Keyword Squatting
|
61
|
+
Inauthentic Sites Amplify News and Narratives
|
62
|
+
Generate Information Pollution
|
63
|
+
Organise Events
|
64
|
+
Pay for Physical Action
|
65
|
+
Conduct Symbolic Action
|
66
|
+
Play the Long Game
|
67
|
+
Continue to Amplify
|
68
|
+
Sell Merchandise
|
69
|
+
Prepare Physical Broadcast Capabilities
|
70
|
+
Degrade Adversary
|
71
|
+
Respond to Breaking News Event or Active Crisis
|
72
|
+
Segment Audiences
|
73
|
+
Geographic Segmentation
|
74
|
+
Demographic Segmentation
|
75
|
+
Economic Segmentation
|
76
|
+
Psychographic Segmentation
|
77
|
+
Political Segmentation
|
78
|
+
Determine Target Audiences
|
79
|
+
Determine Strategic Ends
|
80
|
+
Geopolitical Advantage
|
81
|
+
Domestic Political Advantage
|
82
|
+
Economic Advantage
|
83
|
+
Ideological Advantage
|
84
|
+
Dismiss
|
85
|
+
Discredit Credible Sources
|
86
|
+
Distort
|
87
|
+
Distract
|
88
|
+
Dismay
|
89
|
+
Divide
|
90
|
+
Map Target Audience Information Environment
|
91
|
+
Monitor Social Media Analytics
|
92
|
+
Evaluate Media Surveys
|
93
|
+
Identify Trending Topics/Hashtags
|
94
|
+
Conduct Web Traffic Analysis
|
95
|
+
Assess Degree/Type of Media Access
|
96
|
+
Identify Social and Technical Vulnerabilities
|
97
|
+
Find Echo Chambers
|
98
|
+
Identify Data Voids
|
99
|
+
Identify Existing Prejudices
|
100
|
+
Identify Existing Fissures
|
101
|
+
Identify Existing Conspiracy Narratives/Suspicions
|
102
|
+
Identify Wedge Issues
|
103
|
+
Identify Target Audience Adversaries
|
104
|
+
Identify Media System Vulnerabilities
|
105
|
+
Develop New Narratives
|
106
|
+
Integrate Target Audience Vulnerabilities into Narrative
|
107
|
+
Reuse Existing Content
|
108
|
+
Use Copypasta
|
109
|
+
Plagiarise Content
|
110
|
+
Deceptively Labelled or Translated
|
111
|
+
Appropriate Content
|
112
|
+
Develop Text-Based Content
|
113
|
+
Develop AI-Generated Text
|
114
|
+
Develop Inauthentic News Articles
|
115
|
+
Develop Document
|
116
|
+
Develop Book
|
117
|
+
Develop Opinion Article
|
118
|
+
Create Fake Research
|
119
|
+
Machine Translated Text
|
120
|
+
Develop Image-Based Content
|
121
|
+
Develop Memes
|
122
|
+
Develop AI-Generated Images (Deepfakes)
|
123
|
+
Deceptively Edit Images (Cheap Fakes)
|
124
|
+
Aggregate Information into Evidence Collages
|
125
|
+
Develop Video-Based Content
|
126
|
+
Develop AI-Generated Videos (Deepfakes)
|
127
|
+
Deceptively Edit Video (Cheap Fakes)
|
128
|
+
Develop Audio-Based Content
|
129
|
+
Develop AI-Generated Audio (Deepfakes)
|
130
|
+
Deceptively Edit Audio (Cheap Fakes)
|
131
|
+
Obtain Private Documents
|
132
|
+
Obtain Authentic Documents
|
133
|
+
Alter Authentic Documents
|
134
|
+
Create Inauthentic Accounts
|
135
|
+
Create Anonymous Accounts
|
136
|
+
Create Cyborg Accounts
|
137
|
+
Create Bot Accounts
|
138
|
+
Create Sockpuppet Accounts
|
139
|
+
Recruit Malign Actors
|
140
|
+
Recruit Contractors
|
141
|
+
Recruit Partisans
|
142
|
+
Enlist Troll Accounts
|
143
|
+
Build Network
|
144
|
+
Create Organisations
|
145
|
+
Use Follow Trains
|
146
|
+
Create Community or Sub-Group
|
147
|
+
Acquire/Recruit Network
|
148
|
+
Fund Proxies
|
149
|
+
Acquire Botnets
|
150
|
+
Infiltrate Existing Networks
|
151
|
+
Identify Susceptible Targets in Networks
|
152
|
+
Utilise Butterfly Attacks
|
153
|
+
Develop Owned Media Assets
|
154
|
+
Leverage Content Farms
|
155
|
+
Create Content Farms
|
156
|
+
Outsource Content Creation to External Organisations
|
157
|
+
Present Persona
|
158
|
+
Individual Persona
|
159
|
+
Local Persona
|
160
|
+
Journalist Persona
|
161
|
+
Activist Persona
|
162
|
+
Hacktivist Persona
|
163
|
+
Military Personnel Persona
|
164
|
+
Recruiter Persona
|
165
|
+
Researcher Persona
|
166
|
+
Expert Persona
|
167
|
+
Romantic Suitor Persona
|
168
|
+
Party Official Persona
|
169
|
+
Government Official Persona
|
170
|
+
Government Employee Persona
|
171
|
+
Institutional Persona
|
172
|
+
Local Institution Persona
|
173
|
+
News Outlet Persona
|
174
|
+
Fact Checking Organisation Persona
|
175
|
+
Think Tank Persona
|
176
|
+
Business Persona
|
177
|
+
Government Institution Persona
|
178
|
+
NGO Persona
|
179
|
+
Social Cause Persona
|
180
|
+
Establish Inauthentic News Sites
|
181
|
+
Create Inauthentic News Sites
|
182
|
+
Leverage Existing Inauthentic News Sites
|
183
|
+
Co-Opt Trusted Sources
|
184
|
+
Co-Opt Trusted Individuals
|
185
|
+
Co-Opt Grassroots Groups
|
186
|
+
Co-Opt Influencers
|
187
|
+
Create Localised Content
|
188
|
+
Leverage Echo Chambers/Filter Bubbles
|
189
|
+
Use Existing Echo Chambers/Filter Bubbles
|
190
|
+
Create Echo Chambers/Filter Bubbles
|
191
|
+
Exploit Data Voids
|
192
|
+
Livestream
|
193
|
+
Video Livestream
|
194
|
+
Audio Livestream
|
195
|
+
Social Networks
|
196
|
+
Mainstream Social Networks
|
197
|
+
Dating App
|
198
|
+
Private/Closed Social Networks
|
199
|
+
Interest-Based Networks
|
200
|
+
Use Hashtags
|
201
|
+
Create Dedicated Hashtag
|
202
|
+
Media Sharing Networks
|
203
|
+
Photo Sharing
|
204
|
+
Video Sharing
|
205
|
+
Audio Sharing
|
206
|
+
Discussion Forums
|
207
|
+
Anonymous Message Boards
|
208
|
+
Bookmarking and Content Curation
|
209
|
+
Blogging and Publishing Networks
|
210
|
+
Consumer Review Networks
|
211
|
+
Formal Diplomatic Channels
|
212
|
+
Traditional Media
|
213
|
+
TV
|
214
|
+
Newspaper
|
215
|
+
Radio
|
216
|
+
Email
|
217
|
+
Employ Commercial Analytic Firms
|
218
|
+
Deliver Ads
|
219
|
+
Social Media
|
220
|
+
Traditional Media
|
221
|
+
Post Content
|
222
|
+
Share Memes
|
223
|
+
Post Violative Content to Provoke Takedown and Backlash
|
224
|
+
One-Way Direct Posting
|
225
|
+
Comment or Reply on Content
|
226
|
+
Post Inauthentic Social Media Comment
|
227
|
+
Attract Traditional Media
|
228
|
+
Amplify Existing Narrative
|
229
|
+
Cross-Posting
|
230
|
+
Post across Groups
|
231
|
+
Post across Platform
|
232
|
+
Post across Disciplines
|
233
|
+
Incentivize Sharing
|
234
|
+
Use Affiliate Marketing Programmes
|
235
|
+
Use Contests and Prizes
|
236
|
+
Manipulate Platform Algorithm
|
237
|
+
Bypass Content Blocking
|
238
|
+
Direct Users to Alternative Platforms
|
239
|
+
Control Information Environment through Offensive Cyberspace Operations
|
240
|
+
Delete Opposing Content
|
241
|
+
Block Content
|
242
|
+
Destroy Information Generation Capabilities
|
243
|
+
Conduct Server Redirect
|
244
|
+
Suppress Opposition
|
245
|
+
Report Non-Violative Opposing Content
|
246
|
+
Goad People into Harmful Action (Stop Hitting Yourself)
|
247
|
+
Exploit Platform TOS/Content Moderation
|
248
|
+
Platform Filtering
|
249
|
+
Encourage Attendance at Events
|
250
|
+
Call to Action to Attend
|
251
|
+
Facilitate Logistics or Support for Attendance
|
252
|
+
Physical Violence
|
253
|
+
Conduct Physical Violence
|
254
|
+
Encourage Physical Violence
|
255
|
+
Conceal Information Assets
|
256
|
+
Use Pseudonyms
|
257
|
+
Conceal Network Identity
|
258
|
+
Distance Reputable Individuals from Operation
|
259
|
+
Launder Information Assets
|
260
|
+
Change Names of Information Assets
|
261
|
+
Conceal Operational Activity
|
262
|
+
Conceal Network Identity
|
263
|
+
Generate Content Unrelated to Narrative
|
264
|
+
Break Association with Content
|
265
|
+
Delete URLs
|
266
|
+
Coordinate on Encrypted/Closed Networks
|
267
|
+
Deny Involvement
|
268
|
+
Delete Accounts/Account Activity
|
269
|
+
Redirect URLs
|
270
|
+
Remove Post Origins
|
271
|
+
Misattribute Activity
|
272
|
+
Conceal Infrastructure
|
273
|
+
Conceal Sponsorship
|
274
|
+
Utilise Bulletproof Hosting
|
275
|
+
Use Shell Organisations
|
276
|
+
Use Cryptocurrency
|
277
|
+
Obfuscate Payment
|
278
|
+
Exploit TOS/Content Moderation
|
279
|
+
Legacy Web Content
|
280
|
+
Post Borderline Content
|
281
|
+
Measure Performance
|
282
|
+
People Focused
|
283
|
+
Content Focused
|
284
|
+
View Focused
|
285
|
+
Measure Effectiveness
|
286
|
+
Behaviour Changes
|
287
|
+
Content
|
288
|
+
Awareness
|
289
|
+
Knowledge
|
290
|
+
Action/Attitude
|
291
|
+
Measure Effectiveness Indicators (or KPIs)
|
292
|
+
Message Reach
|
293
|
+
Social Media Engagement
|
294
|
+
Undermine
|
295
|
+
Smear
|
296
|
+
Thwart
|
297
|
+
Subvert
|
298
|
+
Polarise
|
299
|
+
Cultivate Support
|
300
|
+
Defend Reputaton
|
301
|
+
Justify Action
|
302
|
+
Energise Supporters
|
303
|
+
Boost Reputation
|
304
|
+
Cultvate Support for Initiative
|
305
|
+
Cultivate Support for Ally
|
306
|
+
Recruit Members
|
307
|
+
Increase Prestige
|
308
|
+
Make Money
|
309
|
+
Generate Ad Revenue
|
310
|
+
Scam
|
311
|
+
Raise Funds
|
312
|
+
Sell Items under False Pretences
|
313
|
+
Extort
|
314
|
+
Manipulate Stocks
|
315
|
+
Motivate to Act
|
316
|
+
Encourage
|
317
|
+
Provoke
|
318
|
+
Compel
|
319
|
+
Dissuade from Acting
|
320
|
+
Discourage
|
321
|
+
Silence
|
322
|
+
Deter
|
323
|
+
Cause Harm
|
324
|
+
Defame
|
325
|
+
Intimidate
|
326
|
+
Spread Hate
|
327
|
+
Acquire Compromised Asset
|
328
|
+
Acquire Compromised Account
|
329
|
+
Acquire Compromised Website
|
330
|
+
Persona Legitimacy
|
331
|
+
Authentic Persona
|
332
|
+
Fabricated Persona
|
333
|
+
Impersonated Persona
|
334
|
+
Parody Persona
|
335
|
+
Persona Legitimacy Evidence
|
336
|
+
Present Persona across Platforms
|
337
|
+
Persona Template
|
338
|
+
Establish Account Imagery
|
339
|
+
Copy Account Imagery
|
340
|
+
AI-Generated Account Imagery
|
341
|
+
Animal Account Imagery
|
342
|
+
Scenery Account Imagery
|
343
|
+
Illustrated Character Account Imagery
|
344
|
+
Attractive Person Account Imagery
|
345
|
+
Stock Image Account Imagery
|
346
|
+
disarm2stix
|
347
|
+
None
|