txt2stix 1.1.8__py3-none-any.whl → 1.1.9__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. txt2stix/includes/extractions/ai/config.yaml +20 -0
  2. txt2stix/includes/extractions/lookup/config.yaml +33 -15
  3. txt2stix/includes/lookups/_generate_lookups.py +39 -30
  4. txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
  5. txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
  6. txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
  7. txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
  8. txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
  9. txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
  10. txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
  11. txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
  12. txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
  13. txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
  14. txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
  15. txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
  16. txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
  17. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
  18. txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
  19. txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
  20. txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
  21. txt2stix/includes/tests/test_cases.yaml +8 -0
  22. txt2stix/retriever.py +6 -0
  23. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/METADATA +1 -1
  24. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/RECORD +27 -26
  25. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
  26. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
  27. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
  28. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
  29. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
  30. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
  31. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/WHEEL +0 -0
  32. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/entry_points.txt +0 -0
  33. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/licenses/LICENSE +0 -0
@@ -1,347 +1,410 @@
1
- Plan Strategy
2
- Plan Objectives
3
- Microtarget
4
- Develop Content
5
- Select Channels and Affordances
6
- Conduct Pump Priming
7
- Deliver Content
8
- Drive Offline Activity
9
- Persist in the Information Environment
10
- Assess Effectiveness
11
- Target Audience Analysis
12
- Develop Narratives
13
- Establish Assets
14
- Establish Legitimacy
15
- Maximise Exposure
16
- Drive Online Harms
17
- Facilitate State Propaganda
18
- Leverage Existing Narratives
19
- Develop Competing Narratives
20
- Create Inauthentic Social Media Pages and Groups
21
- Cultivate Ignorant Agents
22
- Create Inauthentic Websites
23
- Prepare Fundraising Campaigns
24
- Raise Funds from Malign Actors
25
- Raise Funds from Ignorant Agents
26
- Create Hashtags and Search Artefacts
27
- Create Clickbait
28
- Conduct Fundraising
29
- Conduct Crowdfunding Campaigns
30
- Purchase Targeted Advertisements
31
- Trial Content
32
- Leverage Conspiracy Theory Narratives
33
- Amplify Existing Conspiracy Theory Narratives
34
- Develop Original Conspiracy Theory Narratives
35
- Distort Facts
1
+ Deceptively Edit Images (Cheap Fakes)
2
+ Identify Trending Topics/Hashtags
3
+ Think Tank Persona
4
+ Fabricated Persona
5
+ Co-Opt Grassroots Groups
36
6
  Reframe Context
37
- Edit Open-Source Content
7
+ Community Sub-Forum
8
+ Demographic Segmentation
9
+ Crowdfunding Platform
10
+ Launder Information Assets
11
+ Discredit Credible Sources
12
+ Deceptively Edit Audio (Cheap Fakes)
13
+ Traditional Media
14
+ Cultivate Support
15
+ Trolls Amplify and Manipulate
38
16
  Online Polls
39
- Bait Influencer
40
- Demand Insurmountable Proof
41
- Seed Kernel of Truth
42
- Chat Apps
43
- Use Encrypted Chat Apps
44
- Use Unencrypted Chats Apps
45
- Seed Distortions
17
+ Use Existing Echo Chambers/Filter Bubbles
18
+ Online Community Group
19
+ Map Target Audience Information Environment
20
+ Extort
21
+ Website Hosting Platform
22
+ Acquire/Recruit Network
23
+ Destroy Information Generation Capabilities
24
+ Break Association with Content
25
+ Establish Account Imagery
26
+ Bookmarking and Content Curation
27
+ Bypass Content Blocking
28
+ Paid Account Asset
29
+ File Hosting Platform
30
+ Video Platform
31
+ Leverage Content Farms
32
+ Create Hashtags and Search Artefacts
33
+ QR Code Asset
34
+ Impersonated Persona
35
+ Make Money
36
+ Deceptively Labelled or Translated
37
+ Use Follow Trains
38
+ Build Network
39
+ Develop Image-Based Content
40
+ Proxy IP Address Asset
41
+ Post across Groups
42
+ Conceal Infrastructure
43
+ Incentivize Sharing
46
44
  Use Fake Experts
47
- Use Search Engine Optimisation
48
- Censor Social Media as a Political Force
49
- Harass
50
- Boycott/"Cancel" Opponents
51
- Harass People Based on Identities
52
- Threaten to Dox
53
- Dox
54
- Flood Information Space
55
- Trolls Amplify and Manipulate
56
- Flood Existing Hashtag
57
45
  Bots Amplify via Automated Forwarding and Reposting
58
- Utilise Spamoflauge
59
- Conduct Swarming
46
+ NGO Persona
47
+ Deceptively Edit Video (Cheap Fakes)
48
+ Local Persona
49
+ Domain Asset
50
+ Knowledge
51
+ Account Asset
52
+ Subscription Processing Capability
53
+ Use Contests and Prizes
54
+ Degrade Adversary
55
+ Undermine
56
+ Use Affiliate Marketing Programmes
57
+ Link Shortening Platform
58
+ Bulk Created Asset
59
+ Chat Community Server
60
+ Website Asset
61
+ Leverage Existing Narratives
62
+ Sell Merchandise
60
63
  Conduct Keyword Squatting
61
- Inauthentic Sites Amplify News and Narratives
62
- Generate Information Pollution
63
- Organise Events
64
- Pay for Physical Action
64
+ Direct Messaging
65
+ Digital Community Hosting Asset
66
+ Present Persona
67
+ Harass People Based on Identities
68
+ Deliver Ads
69
+ Identify Susceptible Targets in Networks
70
+ Activist Persona
71
+ Cause Harm
72
+ Conceal Network Identity
73
+ Consumer Review Networks
74
+ Social Cause Persona
75
+ Change Names of Information Assets
76
+ Establish Inauthentic News Sites
77
+ Encourage Physical Violence
78
+ Deter
79
+ eCommerce Platform
80
+ Redirecting Domain Asset
81
+ Flood Information Space
82
+ Post Violative Content to Provoke Takedown and Backlash
83
+ Email Domain Asset
84
+ Economic Advantage
85
+ Journalist Persona
86
+ Justify Action
87
+ Outsource Content Creation to External Organisations
88
+ Online Game Platform
89
+ Attract Traditional Media
90
+ Software Asset
91
+ Conceal Sponsorship
92
+ Verified Account Asset
93
+ Utilise Butterfly Attacks
94
+ Internet Connected Physical Asset
95
+ Psychographic Segmentation
96
+ Amplify Existing Narrative
97
+ Action/Attitude
98
+ Online Infrastructure
99
+ Develop Memes
100
+ Remove Post Origins
101
+ Raise Funds from Malign Actors
102
+ Business Persona
103
+ AI-Generated Account Imagery
104
+ Compromised Asset
105
+ Share Memes
106
+ Comment or Reply on Content
107
+ Amplify Existing Conspiracy Theory Narratives
108
+ Smear
109
+ Obtain Authentic Documents
110
+ Conduct Fundraising
111
+ Spread Hate
112
+ Machine Translated Text
113
+ Divide
65
114
  Conduct Symbolic Action
66
- Play the Long Game
115
+ Motivate to Act
67
116
  Continue to Amplify
68
- Sell Merchandise
117
+ People Focused
118
+ Coordinate on Encrypted/Closed Networks
69
119
  Prepare Physical Broadcast Capabilities
70
- Degrade Adversary
71
- Respond to Breaking News Event or Active Crisis
72
- Segment Audiences
73
- Geographic Segmentation
74
- Demographic Segmentation
75
- Economic Segmentation
76
- Psychographic Segmentation
77
- Political Segmentation
78
- Determine Target Audiences
79
- Determine Strategic Ends
80
- Geopolitical Advantage
81
- Domestic Political Advantage
82
- Economic Advantage
83
- Ideological Advantage
84
- Dismiss
85
- Discredit Credible Sources
86
- Distort
87
- Distract
88
- Dismay
89
- Divide
90
- Map Target Audience Information Environment
91
- Monitor Social Media Analytics
92
120
  Evaluate Media Surveys
93
- Identify Trending Topics/Hashtags
94
- Conduct Web Traffic Analysis
95
- Assess Degree/Type of Media Access
96
- Identify Social and Technical Vulnerabilities
97
- Find Echo Chambers
98
- Identify Data Voids
99
- Identify Existing Prejudices
100
- Identify Existing Fissures
101
- Identify Existing Conspiracy Narratives/Suspicions
102
- Identify Wedge Issues
103
- Identify Target Audience Adversaries
104
- Identify Media System Vulnerabilities
105
- Develop New Narratives
106
- Integrate Target Audience Vulnerabilities into Narrative
107
- Reuse Existing Content
108
- Use Copypasta
121
+ News Outlet Persona
122
+ Co-Opt Trusted Sources
123
+ Deny Involvement
124
+ Generate Content Unrelated to Narrative
125
+ Manipulate Stocks
126
+ Boycott/"Cancel" Opponents
127
+ Researcher Persona
128
+ Develop Owned Media Assets
109
129
  Plagiarise Content
110
- Deceptively Labelled or Translated
111
- Appropriate Content
112
- Develop Text-Based Content
113
- Develop AI-Generated Text
114
- Develop Inauthentic News Articles
115
- Develop Document
116
- Develop Book
117
- Develop Opinion Article
118
- Create Fake Research
119
- Machine Translated Text
120
- Develop Image-Based Content
121
- Develop Memes
130
+ Awareness
131
+ Identify Data Voids
132
+ Purchase Targeted Advertisements
133
+ Dox
134
+ Subscription Access Asset
122
135
  Develop AI-Generated Images (Deepfakes)
123
- Deceptively Edit Images (Cheap Fakes)
124
- Aggregate Information into Evidence Collages
125
- Develop Video-Based Content
136
+ Geographic Segmentation
137
+ Social Media
138
+ Utilise Bulletproof Hosting
139
+ Attractive Person Account Imagery
140
+ Wiki Platform
141
+ Trial Content
142
+ Boost Reputation
143
+ Formal Diplomatic Channels
144
+ Scam
126
145
  Develop AI-Generated Videos (Deepfakes)
127
- Deceptively Edit Video (Cheap Fakes)
128
- Develop Audio-Based Content
129
- Develop AI-Generated Audio (Deepfakes)
130
- Deceptively Edit Audio (Cheap Fakes)
131
- Obtain Private Documents
132
- Obtain Authentic Documents
133
- Alter Authentic Documents
134
- Create Inauthentic Accounts
135
- Create Anonymous Accounts
136
- Create Cyborg Accounts
137
- Create Bot Accounts
138
- Create Sockpuppet Accounts
139
- Recruit Malign Actors
146
+ Persona Legitimacy
140
147
  Recruit Contractors
141
- Recruit Partisans
142
- Enlist Troll Accounts
143
- Build Network
144
- Create Organisations
145
- Use Follow Trains
146
- Create Community or Sub-Group
147
- Acquire/Recruit Network
148
- Fund Proxies
149
- Acquire Botnets
150
- Infiltrate Existing Networks
151
- Identify Susceptible Targets in Networks
152
- Utilise Butterfly Attacks
153
- Develop Owned Media Assets
154
- Leverage Content Farms
155
- Create Content Farms
156
- Outsource Content Creation to External Organisations
157
- Present Persona
158
- Individual Persona
159
- Local Persona
160
- Journalist Persona
161
- Activist Persona
162
- Hacktivist Persona
163
- Military Personnel Persona
164
- Recruiter Persona
165
- Researcher Persona
166
- Expert Persona
148
+ Distort
167
149
  Romantic Suitor Persona
168
- Party Official Persona
169
- Government Official Persona
170
- Government Employee Persona
171
- Institutional Persona
172
- Local Institution Persona
173
- News Outlet Persona
174
- Fact Checking Organisation Persona
175
- Think Tank Persona
176
- Business Persona
150
+ Comments Section
151
+ Legacy Online Forum Platform
152
+ Thwart
177
153
  Government Institution Persona
178
- NGO Persona
179
- Social Cause Persona
180
- Establish Inauthentic News Sites
181
- Create Inauthentic News Sites
182
- Leverage Existing Inauthentic News Sites
183
- Co-Opt Trusted Sources
184
- Co-Opt Trusted Individuals
185
- Co-Opt Grassroots Groups
186
- Co-Opt Influencers
187
- Create Localised Content
188
- Leverage Echo Chambers/Filter Bubbles
189
- Use Existing Echo Chambers/Filter Bubbles
190
- Create Echo Chambers/Filter Bubbles
191
- Exploit Data Voids
192
- Livestream
193
- Video Livestream
194
- Audio Livestream
195
- Social Networks
196
- Mainstream Social Networks
197
- Dating App
198
- Private/Closed Social Networks
199
- Interest-Based Networks
200
- Use Hashtags
201
- Create Dedicated Hashtag
202
- Media Sharing Networks
203
- Photo Sharing
204
- Video Sharing
205
- Audio Sharing
206
- Discussion Forums
207
- Anonymous Message Boards
208
- Bookmarking and Content Curation
209
- Blogging and Publishing Networks
210
- Consumer Review Networks
211
- Formal Diplomatic Channels
212
- Traditional Media
213
- TV
214
- Newspaper
215
- Radio
216
- Email
217
- Employ Commercial Analytic Firms
218
- Deliver Ads
219
- Social Media
220
- Traditional Media
221
- Post Content
222
- Share Memes
223
- Post Violative Content to Provoke Takedown and Backlash
224
- One-Way Direct Posting
225
- Comment or Reply on Content
226
- Post Inauthentic Social Media Comment
227
- Attract Traditional Media
228
- Amplify Existing Narrative
229
- Cross-Posting
230
- Post across Groups
231
- Post across Platform
154
+ Use Existing Hashtag
155
+ Develop New Narratives
156
+ Cultivate Ignorant Agents
157
+ Integrate Target Audience Vulnerabilities into Narrative
158
+ Bait Influencer
159
+ Recruit Malign Actors
232
160
  Post across Disciplines
233
- Incentivize Sharing
234
- Use Affiliate Marketing Programmes
235
- Use Contests and Prizes
236
- Manipulate Platform Algorithm
237
- Bypass Content Blocking
238
- Direct Users to Alternative Platforms
239
- Control Information Environment through Offensive Cyberspace Operations
240
- Delete Opposing Content
241
- Block Content
242
- Destroy Information Generation Capabilities
161
+ Automated Account Asset
162
+ Dormant Asset
163
+ Measure Effectiveness
164
+ Invite Gated Asset
165
+ Compel
166
+ Utilise Spamoflauge
167
+ Develop Inauthentic News Articles
168
+ Platform Filtering
243
169
  Conduct Server Redirect
244
- Suppress Opposition
170
+ Use Shell Organisations
171
+ Image Board Platform
172
+ Social Media Platform
173
+ Dismay
174
+ Encrypted Communication Channel
175
+ Recruit Members
245
176
  Report Non-Violative Opposing Content
246
- Goad People into Harmful Action (Stop Hitting Yourself)
177
+ Intimidate
178
+ Cryptocurrency Exchange Platform
179
+ Animal Account Imagery
180
+ Co-Opt Influencers
181
+ Chat Broadcast Group
182
+ Party Official Persona
183
+ Reuse Existing Content
184
+ Cultvate Support for Initiative
185
+ Cross-Posting
186
+ Control Information Environment through Offensive Cyberspace Operations
187
+ Password Gated Asset
188
+ Fund Proxies
189
+ Identify Existing Fissures
190
+ Encourage
191
+ Conceal Network Identity
192
+ Copy Account Imagery
193
+ Content Recommendation Algorithm
194
+ Generate Ad Revenue
195
+ Create Fake Research
196
+ Develop Opinion Article
197
+ Leverage Echo Chambers/Filter Bubbles
198
+ Shortened Link Asset
247
199
  Exploit Platform TOS/Content Moderation
248
- Platform Filtering
249
- Encourage Attendance at Events
200
+ Cryptocurrency Wallet
201
+ Institutional Persona
202
+ Server Asset
203
+ Geopolitical Advantage
204
+ Persona Legitimacy Evidence
205
+ Domestic Political Advantage
206
+ AI Media Platform
207
+ Facilitate State Propaganda
250
208
  Call to Action to Attend
251
- Facilitate Logistics or Support for Attendance
252
- Physical Violence
253
- Conduct Physical Violence
254
- Encourage Physical Violence
255
- Conceal Information Assets
256
- Use Pseudonyms
257
- Conceal Network Identity
258
- Distance Reputable Individuals from Operation
259
- Launder Information Assets
260
- Change Names of Information Assets
261
- Conceal Operational Activity
262
- Conceal Network Identity
263
- Generate Content Unrelated to Narrative
264
- Break Association with Content
265
- Delete URLs
266
- Coordinate on Encrypted/Closed Networks
267
- Deny Involvement
268
- Delete Accounts/Account Activity
269
- Redirect URLs
270
- Remove Post Origins
271
- Misattribute Activity
272
- Conceal Infrastructure
273
- Conceal Sponsorship
274
- Utilise Bulletproof Hosting
275
- Use Shell Organisations
276
209
  Use Cryptocurrency
277
- Obfuscate Payment
278
- Exploit TOS/Content Moderation
279
- Legacy Web Content
280
- Post Borderline Content
281
- Measure Performance
282
- People Focused
283
- Content Focused
284
- View Focused
285
- Measure Effectiveness
286
- Behaviour Changes
287
210
  Content
288
- Awareness
289
- Knowledge
290
- Action/Attitude
211
+ Acquire Botnets
212
+ Payment Processing Capability
213
+ Newly Created Asset
214
+ Harass
215
+ Generate Information Pollution
291
216
  Measure Effectiveness Indicators (or KPIs)
217
+ Play the Long Game
218
+ Identify Existing Conspiracy Narratives/Suspicions
219
+ Create Community or Sub-Group
220
+ Traditional Media
221
+ Open Access Platform
222
+ Chat Room
223
+ Prepare Fundraising Campaigns
224
+ Malware Asset
225
+ Illustrated Character Account Imagery
226
+ Silence
227
+ Alter Authentic Documents
228
+ Delete Opposing Content
229
+ Raise Funds
230
+ Find Echo Chambers
231
+ Obfuscate Payment
232
+ Conceal Information Assets
233
+ Infiltrate Existing Networks
234
+ Delete URLs
235
+ Asset Origin
236
+ Blog Asset
237
+ Distract
238
+ Develop Document
239
+ Defame
240
+ Online Advertising Platform
241
+ Create Organisations
242
+ Respond to Breaking News Event or Active Crisis
243
+ Use Pseudonyms
244
+ Bank Account Asset
245
+ One-Way Direct Posting
246
+ Community Forum Platform
247
+ TV
248
+ View Focused
249
+ Develop Competing Narratives
250
+ Misattribute Activity
251
+ Create Clickbait
252
+ Develop Video-Based Content
253
+ Scenery Account Imagery
254
+ Conduct Web Traffic Analysis
255
+ Employ Commercial Analytic Firms
256
+ Recruiter Persona
257
+ Use Copypasta
258
+ Pay for Physical Action
259
+ Dissuade from Acting
260
+ Purchased Asset
261
+ Government Employee Persona
262
+ Post Content
263
+ Assess Degree/Type of Media Access
264
+ Increase Prestige
265
+ Monitor Social Media Analytics
266
+ Lookalike Domain
267
+ Organise Events
268
+ Segment Audiences
269
+ Microblogging Platform
270
+ Leverage Conspiracy Theory Narratives
271
+ Conduct Crowdfunding Campaigns
272
+ Sell Items under False Pretences
273
+ Financial Instrument
274
+ Radio
275
+ Economic Segmentation
276
+ Identify Target Audience Adversaries
277
+ Physical Violence
278
+ Determine Strategic Ends
279
+ Develop AI-Generated Audio (Deepfakes)
292
280
  Message Reach
293
281
  Social Media Engagement
294
- Undermine
295
- Smear
296
- Thwart
282
+ Conceal Operational Activity
283
+ Post across Platform
284
+ Create Localised Content
285
+ Discourage
286
+ Local Institution Persona
287
+ Authentic Persona
297
288
  Subvert
298
- Polarise
299
- Cultivate Support
289
+ Digital Content Creation Asset
290
+ Use Search Engine Optimisation
291
+ IP Address Asset
292
+ Identify Wedge Issues
293
+ Present Persona across Platforms
294
+ Seed Kernel of Truth
295
+ Geoblocked Asset
296
+ Paid Access Asset
297
+ Create Inauthentic News Sites
298
+ Dismiss
299
+ Audio Platform
300
+ AI LLM Platform
301
+ Content Focused
302
+ Military Personnel Persona
303
+ Subscription Service Platform
304
+ Censor Social Media as a Political Force
305
+ Political Segmentation
306
+ Create New Hashtag
307
+ Dating Platform
308
+ Exploit TOS/Content Moderation
309
+ Post Inauthentic Social Media Comment
310
+ Fact Checking Organisation Persona
311
+ Conduct Swarming
312
+ Develop Book
313
+ Edit Open-Source Content
300
314
  Defend Reputaton
301
- Justify Action
302
- Energise Supporters
303
- Boost Reputation
304
- Cultvate Support for Initiative
305
- Cultivate Support for Ally
306
- Recruit Members
307
- Increase Prestige
308
- Make Money
309
- Generate Ad Revenue
310
- Scam
311
- Raise Funds
312
- Sell Items under False Pretences
313
- Extort
314
- Manipulate Stocks
315
- Motivate to Act
316
- Encourage
317
315
  Provoke
318
- Compel
319
- Dissuade from Acting
320
- Discourage
321
- Silence
322
- Deter
323
- Cause Harm
324
- Defame
325
- Intimidate
326
- Spread Hate
327
- Acquire Compromised Asset
328
- Acquire Compromised Account
329
- Acquire Compromised Website
330
- Persona Legitimacy
331
- Authentic Persona
332
- Fabricated Persona
333
- Impersonated Persona
316
+ Live Streaming Platform
317
+ Seed Distortions
318
+ Goad People into Harmful Action (Stop Hitting Yourself)
319
+ Digital Content Delivery Asset
320
+ Conduct Physical Violence
321
+ Aggregate Information into Evidence Collages
322
+ Free Account Asset
323
+ Obtain Private Documents
324
+ Question and Answer Platform
325
+ Government Official Persona
326
+ Ideological Advantage
327
+ Recruit Partisans
328
+ Game Mod Asset
329
+ Identify Social and Technical Vulnerabilities
330
+ Distance Reputable Individuals from Operation
331
+ Develop Audio-Based Content
332
+ Legacy Web Content
333
+ Gated Asset
334
+ Exploit Data Voids
335
+ Co-Opt Trusted Individuals
336
+ Blogging Platform
337
+ Encourage Attendance at Events
338
+ Suppress Opposition
339
+ Pre-Existing Asset
340
+ Energise Supporters
341
+ Administrator Account Asset
342
+ Repurposed Asset
343
+ Chat Platform
344
+ Game Asset
345
+ Polarise
346
+ Determine Target Audiences
347
+ Lookalike Account ID
348
+ Develop Original Conspiracy Theory Narratives
349
+ Develop Text-Based Content
350
+ Email Platform
351
+ Enlist Troll Accounts
352
+ Software Delivery Platform
353
+ Payment Processing Platform
354
+ Flood Existing Hashtag
355
+ Create Content Farms
356
+ Facilitate Logistics or Support for Attendance
357
+ Online Game Session
334
358
  Parody Persona
335
- Persona Legitimacy Evidence
336
- Present Persona across Platforms
337
- Persona Template
338
- Establish Account Imagery
339
- Copy Account Imagery
340
- AI-Generated Account Imagery
341
- Animal Account Imagery
342
- Scenery Account Imagery
343
- Illustrated Character Account Imagery
344
- Attractive Person Account Imagery
359
+ Leverage Existing Inauthentic News Sites
360
+ Measure Performance
361
+ Inauthentic Sites Amplify News and Narratives
362
+ Hacktivist Persona
363
+ Expert Persona
364
+ Direct Users to Alternative Platforms
365
+ Cultivate Support for Ally
366
+ Delete Accounts/Account Activity
367
+ Demand Insurmountable Proof
368
+ VPN Asset
369
+ Behaviour Changes
370
+ Digital Content Hosting Asset
345
371
  Stock Image Account Imagery
346
- disarm2stix
347
- None
372
+ Online Community Page
373
+ Block Content
374
+ Post Borderline Content
375
+ Individual Persona
376
+ Mobile App Asset
377
+ Rented Asset
378
+ Develop AI-Generated Text
379
+ Persona Template
380
+ Manipulate Platform Algorithm
381
+ Identify Existing Prejudices
382
+ Create Echo Chambers/Filter Bubbles
383
+ Online Banking Platform
384
+ Raise Funds from Ignorant Agents
385
+ Identify Media System Vulnerabilities
386
+ Paste Platform
387
+ Appropriate Content
388
+ Distort Facts
389
+ Threaten to Dox
390
+ Newspaper
391
+ Approval Gated Asset
392
+ None
393
+ DISARM Red Framework
394
+ Microtarget
395
+ Target Audience Analysis
396
+ Select Channels and Affordances
397
+ Develop Content
398
+ Conduct Pump Priming
399
+ Persist in the Information Environment
400
+ Plan Objectives
401
+ Assess Effectiveness
402
+ Drive Online Harms
403
+ Establish Legitimacy
404
+ Plan Strategy
405
+ Establish Assets
406
+ Drive Offline Activity
407
+ Maximise Exposure
408
+ Develop Narratives
409
+ Deliver Content
410
+ dogesec