txt2stix 1.1.8__py3-none-any.whl → 1.1.10__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/includes/extractions/ai/config.yaml +20 -0
- txt2stix/includes/extractions/lookup/config.yaml +33 -15
- txt2stix/includes/lookups/_generate_lookups.py +39 -30
- txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
- txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
- txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
- txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
- txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
- txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
- txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
- txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
- txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
- txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
- txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
- txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
- txt2stix/includes/tests/test_cases.yaml +8 -0
- txt2stix/retriever.py +6 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/METADATA +2 -10
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/RECORD +27 -26
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/WHEEL +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/entry_points.txt +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/licenses/LICENSE +0 -0
|
@@ -1,347 +1,410 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
Conduct Pump Priming
|
|
7
|
-
Deliver Content
|
|
8
|
-
Drive Offline Activity
|
|
9
|
-
Persist in the Information Environment
|
|
10
|
-
Assess Effectiveness
|
|
11
|
-
Target Audience Analysis
|
|
12
|
-
Develop Narratives
|
|
13
|
-
Establish Assets
|
|
14
|
-
Establish Legitimacy
|
|
15
|
-
Maximise Exposure
|
|
16
|
-
Drive Online Harms
|
|
17
|
-
Facilitate State Propaganda
|
|
18
|
-
Leverage Existing Narratives
|
|
19
|
-
Develop Competing Narratives
|
|
20
|
-
Create Inauthentic Social Media Pages and Groups
|
|
21
|
-
Cultivate Ignorant Agents
|
|
22
|
-
Create Inauthentic Websites
|
|
23
|
-
Prepare Fundraising Campaigns
|
|
24
|
-
Raise Funds from Malign Actors
|
|
25
|
-
Raise Funds from Ignorant Agents
|
|
26
|
-
Create Hashtags and Search Artefacts
|
|
27
|
-
Create Clickbait
|
|
28
|
-
Conduct Fundraising
|
|
29
|
-
Conduct Crowdfunding Campaigns
|
|
30
|
-
Purchase Targeted Advertisements
|
|
31
|
-
Trial Content
|
|
32
|
-
Leverage Conspiracy Theory Narratives
|
|
33
|
-
Amplify Existing Conspiracy Theory Narratives
|
|
34
|
-
Develop Original Conspiracy Theory Narratives
|
|
35
|
-
Distort Facts
|
|
1
|
+
Deceptively Edit Images (Cheap Fakes)
|
|
2
|
+
Identify Trending Topics/Hashtags
|
|
3
|
+
Think Tank Persona
|
|
4
|
+
Fabricated Persona
|
|
5
|
+
Co-Opt Grassroots Groups
|
|
36
6
|
Reframe Context
|
|
37
|
-
|
|
7
|
+
Community Sub-Forum
|
|
8
|
+
Demographic Segmentation
|
|
9
|
+
Crowdfunding Platform
|
|
10
|
+
Launder Information Assets
|
|
11
|
+
Discredit Credible Sources
|
|
12
|
+
Deceptively Edit Audio (Cheap Fakes)
|
|
13
|
+
Traditional Media
|
|
14
|
+
Cultivate Support
|
|
15
|
+
Trolls Amplify and Manipulate
|
|
38
16
|
Online Polls
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
17
|
+
Use Existing Echo Chambers/Filter Bubbles
|
|
18
|
+
Online Community Group
|
|
19
|
+
Map Target Audience Information Environment
|
|
20
|
+
Extort
|
|
21
|
+
Website Hosting Platform
|
|
22
|
+
Acquire/Recruit Network
|
|
23
|
+
Destroy Information Generation Capabilities
|
|
24
|
+
Break Association with Content
|
|
25
|
+
Establish Account Imagery
|
|
26
|
+
Bookmarking and Content Curation
|
|
27
|
+
Bypass Content Blocking
|
|
28
|
+
Paid Account Asset
|
|
29
|
+
File Hosting Platform
|
|
30
|
+
Video Platform
|
|
31
|
+
Leverage Content Farms
|
|
32
|
+
Create Hashtags and Search Artefacts
|
|
33
|
+
QR Code Asset
|
|
34
|
+
Impersonated Persona
|
|
35
|
+
Make Money
|
|
36
|
+
Deceptively Labelled or Translated
|
|
37
|
+
Use Follow Trains
|
|
38
|
+
Build Network
|
|
39
|
+
Develop Image-Based Content
|
|
40
|
+
Proxy IP Address Asset
|
|
41
|
+
Post across Groups
|
|
42
|
+
Conceal Infrastructure
|
|
43
|
+
Incentivize Sharing
|
|
46
44
|
Use Fake Experts
|
|
47
|
-
Use Search Engine Optimisation
|
|
48
|
-
Censor Social Media as a Political Force
|
|
49
|
-
Harass
|
|
50
|
-
Boycott/"Cancel" Opponents
|
|
51
|
-
Harass People Based on Identities
|
|
52
|
-
Threaten to Dox
|
|
53
|
-
Dox
|
|
54
|
-
Flood Information Space
|
|
55
|
-
Trolls Amplify and Manipulate
|
|
56
|
-
Flood Existing Hashtag
|
|
57
45
|
Bots Amplify via Automated Forwarding and Reposting
|
|
58
|
-
|
|
59
|
-
|
|
46
|
+
NGO Persona
|
|
47
|
+
Deceptively Edit Video (Cheap Fakes)
|
|
48
|
+
Local Persona
|
|
49
|
+
Domain Asset
|
|
50
|
+
Knowledge
|
|
51
|
+
Account Asset
|
|
52
|
+
Subscription Processing Capability
|
|
53
|
+
Use Contests and Prizes
|
|
54
|
+
Degrade Adversary
|
|
55
|
+
Undermine
|
|
56
|
+
Use Affiliate Marketing Programmes
|
|
57
|
+
Link Shortening Platform
|
|
58
|
+
Bulk Created Asset
|
|
59
|
+
Chat Community Server
|
|
60
|
+
Website Asset
|
|
61
|
+
Leverage Existing Narratives
|
|
62
|
+
Sell Merchandise
|
|
60
63
|
Conduct Keyword Squatting
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
64
|
+
Direct Messaging
|
|
65
|
+
Digital Community Hosting Asset
|
|
66
|
+
Present Persona
|
|
67
|
+
Harass People Based on Identities
|
|
68
|
+
Deliver Ads
|
|
69
|
+
Identify Susceptible Targets in Networks
|
|
70
|
+
Activist Persona
|
|
71
|
+
Cause Harm
|
|
72
|
+
Conceal Network Identity
|
|
73
|
+
Consumer Review Networks
|
|
74
|
+
Social Cause Persona
|
|
75
|
+
Change Names of Information Assets
|
|
76
|
+
Establish Inauthentic News Sites
|
|
77
|
+
Encourage Physical Violence
|
|
78
|
+
Deter
|
|
79
|
+
eCommerce Platform
|
|
80
|
+
Redirecting Domain Asset
|
|
81
|
+
Flood Information Space
|
|
82
|
+
Post Violative Content to Provoke Takedown and Backlash
|
|
83
|
+
Email Domain Asset
|
|
84
|
+
Economic Advantage
|
|
85
|
+
Journalist Persona
|
|
86
|
+
Justify Action
|
|
87
|
+
Outsource Content Creation to External Organisations
|
|
88
|
+
Online Game Platform
|
|
89
|
+
Attract Traditional Media
|
|
90
|
+
Software Asset
|
|
91
|
+
Conceal Sponsorship
|
|
92
|
+
Verified Account Asset
|
|
93
|
+
Utilise Butterfly Attacks
|
|
94
|
+
Internet Connected Physical Asset
|
|
95
|
+
Psychographic Segmentation
|
|
96
|
+
Amplify Existing Narrative
|
|
97
|
+
Action/Attitude
|
|
98
|
+
Online Infrastructure
|
|
99
|
+
Develop Memes
|
|
100
|
+
Remove Post Origins
|
|
101
|
+
Raise Funds from Malign Actors
|
|
102
|
+
Business Persona
|
|
103
|
+
AI-Generated Account Imagery
|
|
104
|
+
Compromised Asset
|
|
105
|
+
Share Memes
|
|
106
|
+
Comment or Reply on Content
|
|
107
|
+
Amplify Existing Conspiracy Theory Narratives
|
|
108
|
+
Smear
|
|
109
|
+
Obtain Authentic Documents
|
|
110
|
+
Conduct Fundraising
|
|
111
|
+
Spread Hate
|
|
112
|
+
Machine Translated Text
|
|
113
|
+
Divide
|
|
65
114
|
Conduct Symbolic Action
|
|
66
|
-
|
|
115
|
+
Motivate to Act
|
|
67
116
|
Continue to Amplify
|
|
68
|
-
|
|
117
|
+
People Focused
|
|
118
|
+
Coordinate on Encrypted/Closed Networks
|
|
69
119
|
Prepare Physical Broadcast Capabilities
|
|
70
|
-
Degrade Adversary
|
|
71
|
-
Respond to Breaking News Event or Active Crisis
|
|
72
|
-
Segment Audiences
|
|
73
|
-
Geographic Segmentation
|
|
74
|
-
Demographic Segmentation
|
|
75
|
-
Economic Segmentation
|
|
76
|
-
Psychographic Segmentation
|
|
77
|
-
Political Segmentation
|
|
78
|
-
Determine Target Audiences
|
|
79
|
-
Determine Strategic Ends
|
|
80
|
-
Geopolitical Advantage
|
|
81
|
-
Domestic Political Advantage
|
|
82
|
-
Economic Advantage
|
|
83
|
-
Ideological Advantage
|
|
84
|
-
Dismiss
|
|
85
|
-
Discredit Credible Sources
|
|
86
|
-
Distort
|
|
87
|
-
Distract
|
|
88
|
-
Dismay
|
|
89
|
-
Divide
|
|
90
|
-
Map Target Audience Information Environment
|
|
91
|
-
Monitor Social Media Analytics
|
|
92
120
|
Evaluate Media Surveys
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
Identify Existing Conspiracy Narratives/Suspicions
|
|
102
|
-
Identify Wedge Issues
|
|
103
|
-
Identify Target Audience Adversaries
|
|
104
|
-
Identify Media System Vulnerabilities
|
|
105
|
-
Develop New Narratives
|
|
106
|
-
Integrate Target Audience Vulnerabilities into Narrative
|
|
107
|
-
Reuse Existing Content
|
|
108
|
-
Use Copypasta
|
|
121
|
+
News Outlet Persona
|
|
122
|
+
Co-Opt Trusted Sources
|
|
123
|
+
Deny Involvement
|
|
124
|
+
Generate Content Unrelated to Narrative
|
|
125
|
+
Manipulate Stocks
|
|
126
|
+
Boycott/"Cancel" Opponents
|
|
127
|
+
Researcher Persona
|
|
128
|
+
Develop Owned Media Assets
|
|
109
129
|
Plagiarise Content
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
Develop Document
|
|
116
|
-
Develop Book
|
|
117
|
-
Develop Opinion Article
|
|
118
|
-
Create Fake Research
|
|
119
|
-
Machine Translated Text
|
|
120
|
-
Develop Image-Based Content
|
|
121
|
-
Develop Memes
|
|
130
|
+
Awareness
|
|
131
|
+
Identify Data Voids
|
|
132
|
+
Purchase Targeted Advertisements
|
|
133
|
+
Dox
|
|
134
|
+
Subscription Access Asset
|
|
122
135
|
Develop AI-Generated Images (Deepfakes)
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
136
|
+
Geographic Segmentation
|
|
137
|
+
Social Media
|
|
138
|
+
Utilise Bulletproof Hosting
|
|
139
|
+
Attractive Person Account Imagery
|
|
140
|
+
Wiki Platform
|
|
141
|
+
Trial Content
|
|
142
|
+
Boost Reputation
|
|
143
|
+
Formal Diplomatic Channels
|
|
144
|
+
Scam
|
|
126
145
|
Develop AI-Generated Videos (Deepfakes)
|
|
127
|
-
|
|
128
|
-
Develop Audio-Based Content
|
|
129
|
-
Develop AI-Generated Audio (Deepfakes)
|
|
130
|
-
Deceptively Edit Audio (Cheap Fakes)
|
|
131
|
-
Obtain Private Documents
|
|
132
|
-
Obtain Authentic Documents
|
|
133
|
-
Alter Authentic Documents
|
|
134
|
-
Create Inauthentic Accounts
|
|
135
|
-
Create Anonymous Accounts
|
|
136
|
-
Create Cyborg Accounts
|
|
137
|
-
Create Bot Accounts
|
|
138
|
-
Create Sockpuppet Accounts
|
|
139
|
-
Recruit Malign Actors
|
|
146
|
+
Persona Legitimacy
|
|
140
147
|
Recruit Contractors
|
|
141
|
-
|
|
142
|
-
Enlist Troll Accounts
|
|
143
|
-
Build Network
|
|
144
|
-
Create Organisations
|
|
145
|
-
Use Follow Trains
|
|
146
|
-
Create Community or Sub-Group
|
|
147
|
-
Acquire/Recruit Network
|
|
148
|
-
Fund Proxies
|
|
149
|
-
Acquire Botnets
|
|
150
|
-
Infiltrate Existing Networks
|
|
151
|
-
Identify Susceptible Targets in Networks
|
|
152
|
-
Utilise Butterfly Attacks
|
|
153
|
-
Develop Owned Media Assets
|
|
154
|
-
Leverage Content Farms
|
|
155
|
-
Create Content Farms
|
|
156
|
-
Outsource Content Creation to External Organisations
|
|
157
|
-
Present Persona
|
|
158
|
-
Individual Persona
|
|
159
|
-
Local Persona
|
|
160
|
-
Journalist Persona
|
|
161
|
-
Activist Persona
|
|
162
|
-
Hacktivist Persona
|
|
163
|
-
Military Personnel Persona
|
|
164
|
-
Recruiter Persona
|
|
165
|
-
Researcher Persona
|
|
166
|
-
Expert Persona
|
|
148
|
+
Distort
|
|
167
149
|
Romantic Suitor Persona
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
Institutional Persona
|
|
172
|
-
Local Institution Persona
|
|
173
|
-
News Outlet Persona
|
|
174
|
-
Fact Checking Organisation Persona
|
|
175
|
-
Think Tank Persona
|
|
176
|
-
Business Persona
|
|
150
|
+
Comments Section
|
|
151
|
+
Legacy Online Forum Platform
|
|
152
|
+
Thwart
|
|
177
153
|
Government Institution Persona
|
|
178
|
-
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
Co-Opt Trusted Individuals
|
|
185
|
-
Co-Opt Grassroots Groups
|
|
186
|
-
Co-Opt Influencers
|
|
187
|
-
Create Localised Content
|
|
188
|
-
Leverage Echo Chambers/Filter Bubbles
|
|
189
|
-
Use Existing Echo Chambers/Filter Bubbles
|
|
190
|
-
Create Echo Chambers/Filter Bubbles
|
|
191
|
-
Exploit Data Voids
|
|
192
|
-
Livestream
|
|
193
|
-
Video Livestream
|
|
194
|
-
Audio Livestream
|
|
195
|
-
Social Networks
|
|
196
|
-
Mainstream Social Networks
|
|
197
|
-
Dating App
|
|
198
|
-
Private/Closed Social Networks
|
|
199
|
-
Interest-Based Networks
|
|
200
|
-
Use Hashtags
|
|
201
|
-
Create Dedicated Hashtag
|
|
202
|
-
Media Sharing Networks
|
|
203
|
-
Photo Sharing
|
|
204
|
-
Video Sharing
|
|
205
|
-
Audio Sharing
|
|
206
|
-
Discussion Forums
|
|
207
|
-
Anonymous Message Boards
|
|
208
|
-
Bookmarking and Content Curation
|
|
209
|
-
Blogging and Publishing Networks
|
|
210
|
-
Consumer Review Networks
|
|
211
|
-
Formal Diplomatic Channels
|
|
212
|
-
Traditional Media
|
|
213
|
-
TV
|
|
214
|
-
Newspaper
|
|
215
|
-
Radio
|
|
216
|
-
Email
|
|
217
|
-
Employ Commercial Analytic Firms
|
|
218
|
-
Deliver Ads
|
|
219
|
-
Social Media
|
|
220
|
-
Traditional Media
|
|
221
|
-
Post Content
|
|
222
|
-
Share Memes
|
|
223
|
-
Post Violative Content to Provoke Takedown and Backlash
|
|
224
|
-
One-Way Direct Posting
|
|
225
|
-
Comment or Reply on Content
|
|
226
|
-
Post Inauthentic Social Media Comment
|
|
227
|
-
Attract Traditional Media
|
|
228
|
-
Amplify Existing Narrative
|
|
229
|
-
Cross-Posting
|
|
230
|
-
Post across Groups
|
|
231
|
-
Post across Platform
|
|
154
|
+
Use Existing Hashtag
|
|
155
|
+
Develop New Narratives
|
|
156
|
+
Cultivate Ignorant Agents
|
|
157
|
+
Integrate Target Audience Vulnerabilities into Narrative
|
|
158
|
+
Bait Influencer
|
|
159
|
+
Recruit Malign Actors
|
|
232
160
|
Post across Disciplines
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
|
|
236
|
-
|
|
237
|
-
|
|
238
|
-
|
|
239
|
-
|
|
240
|
-
|
|
241
|
-
Block Content
|
|
242
|
-
Destroy Information Generation Capabilities
|
|
161
|
+
Automated Account Asset
|
|
162
|
+
Dormant Asset
|
|
163
|
+
Measure Effectiveness
|
|
164
|
+
Invite Gated Asset
|
|
165
|
+
Compel
|
|
166
|
+
Utilise Spamoflauge
|
|
167
|
+
Develop Inauthentic News Articles
|
|
168
|
+
Platform Filtering
|
|
243
169
|
Conduct Server Redirect
|
|
244
|
-
|
|
170
|
+
Use Shell Organisations
|
|
171
|
+
Image Board Platform
|
|
172
|
+
Social Media Platform
|
|
173
|
+
Dismay
|
|
174
|
+
Encrypted Communication Channel
|
|
175
|
+
Recruit Members
|
|
245
176
|
Report Non-Violative Opposing Content
|
|
246
|
-
|
|
177
|
+
Intimidate
|
|
178
|
+
Cryptocurrency Exchange Platform
|
|
179
|
+
Animal Account Imagery
|
|
180
|
+
Co-Opt Influencers
|
|
181
|
+
Chat Broadcast Group
|
|
182
|
+
Party Official Persona
|
|
183
|
+
Reuse Existing Content
|
|
184
|
+
Cultvate Support for Initiative
|
|
185
|
+
Cross-Posting
|
|
186
|
+
Control Information Environment through Offensive Cyberspace Operations
|
|
187
|
+
Password Gated Asset
|
|
188
|
+
Fund Proxies
|
|
189
|
+
Identify Existing Fissures
|
|
190
|
+
Encourage
|
|
191
|
+
Conceal Network Identity
|
|
192
|
+
Copy Account Imagery
|
|
193
|
+
Content Recommendation Algorithm
|
|
194
|
+
Generate Ad Revenue
|
|
195
|
+
Create Fake Research
|
|
196
|
+
Develop Opinion Article
|
|
197
|
+
Leverage Echo Chambers/Filter Bubbles
|
|
198
|
+
Shortened Link Asset
|
|
247
199
|
Exploit Platform TOS/Content Moderation
|
|
248
|
-
|
|
249
|
-
|
|
200
|
+
Cryptocurrency Wallet
|
|
201
|
+
Institutional Persona
|
|
202
|
+
Server Asset
|
|
203
|
+
Geopolitical Advantage
|
|
204
|
+
Persona Legitimacy Evidence
|
|
205
|
+
Domestic Political Advantage
|
|
206
|
+
AI Media Platform
|
|
207
|
+
Facilitate State Propaganda
|
|
250
208
|
Call to Action to Attend
|
|
251
|
-
Facilitate Logistics or Support for Attendance
|
|
252
|
-
Physical Violence
|
|
253
|
-
Conduct Physical Violence
|
|
254
|
-
Encourage Physical Violence
|
|
255
|
-
Conceal Information Assets
|
|
256
|
-
Use Pseudonyms
|
|
257
|
-
Conceal Network Identity
|
|
258
|
-
Distance Reputable Individuals from Operation
|
|
259
|
-
Launder Information Assets
|
|
260
|
-
Change Names of Information Assets
|
|
261
|
-
Conceal Operational Activity
|
|
262
|
-
Conceal Network Identity
|
|
263
|
-
Generate Content Unrelated to Narrative
|
|
264
|
-
Break Association with Content
|
|
265
|
-
Delete URLs
|
|
266
|
-
Coordinate on Encrypted/Closed Networks
|
|
267
|
-
Deny Involvement
|
|
268
|
-
Delete Accounts/Account Activity
|
|
269
|
-
Redirect URLs
|
|
270
|
-
Remove Post Origins
|
|
271
|
-
Misattribute Activity
|
|
272
|
-
Conceal Infrastructure
|
|
273
|
-
Conceal Sponsorship
|
|
274
|
-
Utilise Bulletproof Hosting
|
|
275
|
-
Use Shell Organisations
|
|
276
209
|
Use Cryptocurrency
|
|
277
|
-
Obfuscate Payment
|
|
278
|
-
Exploit TOS/Content Moderation
|
|
279
|
-
Legacy Web Content
|
|
280
|
-
Post Borderline Content
|
|
281
|
-
Measure Performance
|
|
282
|
-
People Focused
|
|
283
|
-
Content Focused
|
|
284
|
-
View Focused
|
|
285
|
-
Measure Effectiveness
|
|
286
|
-
Behaviour Changes
|
|
287
210
|
Content
|
|
288
|
-
|
|
289
|
-
|
|
290
|
-
|
|
211
|
+
Acquire Botnets
|
|
212
|
+
Payment Processing Capability
|
|
213
|
+
Newly Created Asset
|
|
214
|
+
Harass
|
|
215
|
+
Generate Information Pollution
|
|
291
216
|
Measure Effectiveness Indicators (or KPIs)
|
|
217
|
+
Play the Long Game
|
|
218
|
+
Identify Existing Conspiracy Narratives/Suspicions
|
|
219
|
+
Create Community or Sub-Group
|
|
220
|
+
Traditional Media
|
|
221
|
+
Open Access Platform
|
|
222
|
+
Chat Room
|
|
223
|
+
Prepare Fundraising Campaigns
|
|
224
|
+
Malware Asset
|
|
225
|
+
Illustrated Character Account Imagery
|
|
226
|
+
Silence
|
|
227
|
+
Alter Authentic Documents
|
|
228
|
+
Delete Opposing Content
|
|
229
|
+
Raise Funds
|
|
230
|
+
Find Echo Chambers
|
|
231
|
+
Obfuscate Payment
|
|
232
|
+
Conceal Information Assets
|
|
233
|
+
Infiltrate Existing Networks
|
|
234
|
+
Delete URLs
|
|
235
|
+
Asset Origin
|
|
236
|
+
Blog Asset
|
|
237
|
+
Distract
|
|
238
|
+
Develop Document
|
|
239
|
+
Defame
|
|
240
|
+
Online Advertising Platform
|
|
241
|
+
Create Organisations
|
|
242
|
+
Respond to Breaking News Event or Active Crisis
|
|
243
|
+
Use Pseudonyms
|
|
244
|
+
Bank Account Asset
|
|
245
|
+
One-Way Direct Posting
|
|
246
|
+
Community Forum Platform
|
|
247
|
+
TV
|
|
248
|
+
View Focused
|
|
249
|
+
Develop Competing Narratives
|
|
250
|
+
Misattribute Activity
|
|
251
|
+
Create Clickbait
|
|
252
|
+
Develop Video-Based Content
|
|
253
|
+
Scenery Account Imagery
|
|
254
|
+
Conduct Web Traffic Analysis
|
|
255
|
+
Employ Commercial Analytic Firms
|
|
256
|
+
Recruiter Persona
|
|
257
|
+
Use Copypasta
|
|
258
|
+
Pay for Physical Action
|
|
259
|
+
Dissuade from Acting
|
|
260
|
+
Purchased Asset
|
|
261
|
+
Government Employee Persona
|
|
262
|
+
Post Content
|
|
263
|
+
Assess Degree/Type of Media Access
|
|
264
|
+
Increase Prestige
|
|
265
|
+
Monitor Social Media Analytics
|
|
266
|
+
Lookalike Domain
|
|
267
|
+
Organise Events
|
|
268
|
+
Segment Audiences
|
|
269
|
+
Microblogging Platform
|
|
270
|
+
Leverage Conspiracy Theory Narratives
|
|
271
|
+
Conduct Crowdfunding Campaigns
|
|
272
|
+
Sell Items under False Pretences
|
|
273
|
+
Financial Instrument
|
|
274
|
+
Radio
|
|
275
|
+
Economic Segmentation
|
|
276
|
+
Identify Target Audience Adversaries
|
|
277
|
+
Physical Violence
|
|
278
|
+
Determine Strategic Ends
|
|
279
|
+
Develop AI-Generated Audio (Deepfakes)
|
|
292
280
|
Message Reach
|
|
293
281
|
Social Media Engagement
|
|
294
|
-
|
|
295
|
-
|
|
296
|
-
|
|
282
|
+
Conceal Operational Activity
|
|
283
|
+
Post across Platform
|
|
284
|
+
Create Localised Content
|
|
285
|
+
Discourage
|
|
286
|
+
Local Institution Persona
|
|
287
|
+
Authentic Persona
|
|
297
288
|
Subvert
|
|
298
|
-
|
|
299
|
-
|
|
289
|
+
Digital Content Creation Asset
|
|
290
|
+
Use Search Engine Optimisation
|
|
291
|
+
IP Address Asset
|
|
292
|
+
Identify Wedge Issues
|
|
293
|
+
Present Persona across Platforms
|
|
294
|
+
Seed Kernel of Truth
|
|
295
|
+
Geoblocked Asset
|
|
296
|
+
Paid Access Asset
|
|
297
|
+
Create Inauthentic News Sites
|
|
298
|
+
Dismiss
|
|
299
|
+
Audio Platform
|
|
300
|
+
AI LLM Platform
|
|
301
|
+
Content Focused
|
|
302
|
+
Military Personnel Persona
|
|
303
|
+
Subscription Service Platform
|
|
304
|
+
Censor Social Media as a Political Force
|
|
305
|
+
Political Segmentation
|
|
306
|
+
Create New Hashtag
|
|
307
|
+
Dating Platform
|
|
308
|
+
Exploit TOS/Content Moderation
|
|
309
|
+
Post Inauthentic Social Media Comment
|
|
310
|
+
Fact Checking Organisation Persona
|
|
311
|
+
Conduct Swarming
|
|
312
|
+
Develop Book
|
|
313
|
+
Edit Open-Source Content
|
|
300
314
|
Defend Reputaton
|
|
301
|
-
Justify Action
|
|
302
|
-
Energise Supporters
|
|
303
|
-
Boost Reputation
|
|
304
|
-
Cultvate Support for Initiative
|
|
305
|
-
Cultivate Support for Ally
|
|
306
|
-
Recruit Members
|
|
307
|
-
Increase Prestige
|
|
308
|
-
Make Money
|
|
309
|
-
Generate Ad Revenue
|
|
310
|
-
Scam
|
|
311
|
-
Raise Funds
|
|
312
|
-
Sell Items under False Pretences
|
|
313
|
-
Extort
|
|
314
|
-
Manipulate Stocks
|
|
315
|
-
Motivate to Act
|
|
316
|
-
Encourage
|
|
317
315
|
Provoke
|
|
318
|
-
|
|
319
|
-
|
|
320
|
-
|
|
321
|
-
|
|
322
|
-
|
|
323
|
-
|
|
324
|
-
|
|
325
|
-
|
|
326
|
-
|
|
327
|
-
|
|
328
|
-
|
|
329
|
-
|
|
330
|
-
|
|
331
|
-
|
|
332
|
-
|
|
333
|
-
|
|
316
|
+
Live Streaming Platform
|
|
317
|
+
Seed Distortions
|
|
318
|
+
Goad People into Harmful Action (Stop Hitting Yourself)
|
|
319
|
+
Digital Content Delivery Asset
|
|
320
|
+
Conduct Physical Violence
|
|
321
|
+
Aggregate Information into Evidence Collages
|
|
322
|
+
Free Account Asset
|
|
323
|
+
Obtain Private Documents
|
|
324
|
+
Question and Answer Platform
|
|
325
|
+
Government Official Persona
|
|
326
|
+
Ideological Advantage
|
|
327
|
+
Recruit Partisans
|
|
328
|
+
Game Mod Asset
|
|
329
|
+
Identify Social and Technical Vulnerabilities
|
|
330
|
+
Distance Reputable Individuals from Operation
|
|
331
|
+
Develop Audio-Based Content
|
|
332
|
+
Legacy Web Content
|
|
333
|
+
Gated Asset
|
|
334
|
+
Exploit Data Voids
|
|
335
|
+
Co-Opt Trusted Individuals
|
|
336
|
+
Blogging Platform
|
|
337
|
+
Encourage Attendance at Events
|
|
338
|
+
Suppress Opposition
|
|
339
|
+
Pre-Existing Asset
|
|
340
|
+
Energise Supporters
|
|
341
|
+
Administrator Account Asset
|
|
342
|
+
Repurposed Asset
|
|
343
|
+
Chat Platform
|
|
344
|
+
Game Asset
|
|
345
|
+
Polarise
|
|
346
|
+
Determine Target Audiences
|
|
347
|
+
Lookalike Account ID
|
|
348
|
+
Develop Original Conspiracy Theory Narratives
|
|
349
|
+
Develop Text-Based Content
|
|
350
|
+
Email Platform
|
|
351
|
+
Enlist Troll Accounts
|
|
352
|
+
Software Delivery Platform
|
|
353
|
+
Payment Processing Platform
|
|
354
|
+
Flood Existing Hashtag
|
|
355
|
+
Create Content Farms
|
|
356
|
+
Facilitate Logistics or Support for Attendance
|
|
357
|
+
Online Game Session
|
|
334
358
|
Parody Persona
|
|
335
|
-
|
|
336
|
-
|
|
337
|
-
|
|
338
|
-
|
|
339
|
-
|
|
340
|
-
|
|
341
|
-
|
|
342
|
-
|
|
343
|
-
|
|
344
|
-
|
|
359
|
+
Leverage Existing Inauthentic News Sites
|
|
360
|
+
Measure Performance
|
|
361
|
+
Inauthentic Sites Amplify News and Narratives
|
|
362
|
+
Hacktivist Persona
|
|
363
|
+
Expert Persona
|
|
364
|
+
Direct Users to Alternative Platforms
|
|
365
|
+
Cultivate Support for Ally
|
|
366
|
+
Delete Accounts/Account Activity
|
|
367
|
+
Demand Insurmountable Proof
|
|
368
|
+
VPN Asset
|
|
369
|
+
Behaviour Changes
|
|
370
|
+
Digital Content Hosting Asset
|
|
345
371
|
Stock Image Account Imagery
|
|
346
|
-
|
|
347
|
-
|
|
372
|
+
Online Community Page
|
|
373
|
+
Block Content
|
|
374
|
+
Post Borderline Content
|
|
375
|
+
Individual Persona
|
|
376
|
+
Mobile App Asset
|
|
377
|
+
Rented Asset
|
|
378
|
+
Develop AI-Generated Text
|
|
379
|
+
Persona Template
|
|
380
|
+
Manipulate Platform Algorithm
|
|
381
|
+
Identify Existing Prejudices
|
|
382
|
+
Create Echo Chambers/Filter Bubbles
|
|
383
|
+
Online Banking Platform
|
|
384
|
+
Raise Funds from Ignorant Agents
|
|
385
|
+
Identify Media System Vulnerabilities
|
|
386
|
+
Paste Platform
|
|
387
|
+
Appropriate Content
|
|
388
|
+
Distort Facts
|
|
389
|
+
Threaten to Dox
|
|
390
|
+
Newspaper
|
|
391
|
+
Approval Gated Asset
|
|
392
|
+
None
|
|
393
|
+
DISARM Red Framework
|
|
394
|
+
Microtarget
|
|
395
|
+
Target Audience Analysis
|
|
396
|
+
Select Channels and Affordances
|
|
397
|
+
Develop Content
|
|
398
|
+
Conduct Pump Priming
|
|
399
|
+
Persist in the Information Environment
|
|
400
|
+
Plan Objectives
|
|
401
|
+
Assess Effectiveness
|
|
402
|
+
Drive Online Harms
|
|
403
|
+
Establish Legitimacy
|
|
404
|
+
Plan Strategy
|
|
405
|
+
Establish Assets
|
|
406
|
+
Drive Offline Activity
|
|
407
|
+
Maximise Exposure
|
|
408
|
+
Develop Narratives
|
|
409
|
+
Deliver Content
|
|
410
|
+
dogesec
|