mirror of
https://github.com/DISARMFoundation/DISARMframeworks.git
synced 2025-07-30 18:18:35 -04:00
Update STIX Bundle for v1.5
This commit is contained in:
parent
9c2735869d
commit
4227d24f41
263 changed files with 3872 additions and 2509 deletions
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--52a592b7-f9bb-473f-a5e2-3f9f1106ee6a",
|
||||
"id": "bundle--442149fd-c3ba-4532-a9ba-3e97c92180a0",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--19886784-0e07-474f-803c-30c443e65347",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.186695Z",
|
||||
"modified": "2023-09-28T21:25:13.186695Z",
|
||||
"created": "2024-08-02T17:12:32.320822Z",
|
||||
"modified": "2024-08-02T17:12:32.320822Z",
|
||||
"name": "Assess Effectiveness",
|
||||
"description": "Assess effectiveness of action, for use in future plans",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--b32e4cab-100e-4f98-ac58-3637604bf819",
|
||||
"id": "bundle--4899bab7-b6f8-4e03-9654-d1b82f3ff9a0",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--1e005da9-56cc-4802-af90-b267d17a1ad1",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.187205Z",
|
||||
"modified": "2023-09-28T21:25:13.187205Z",
|
||||
"created": "2024-08-02T17:12:32.321082Z",
|
||||
"modified": "2024-08-02T17:12:32.321082Z",
|
||||
"name": "Target Audience Analysis",
|
||||
"description": "Identifying and analysing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analysing target audience members allows influence operations to tailor operation strategy and content to their analysis.",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--2a72125a-b7b2-4bbf-88d7-92d369bd8e5a",
|
||||
"id": "bundle--4b1cb8d8-ab81-4b78-8fca-49fb129277fd",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--3c73d309-b066-44f9-ad81-866a64e438c9",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.182957Z",
|
||||
"modified": "2023-09-28T21:25:13.182957Z",
|
||||
"created": "2024-08-02T17:12:32.319152Z",
|
||||
"modified": "2024-08-02T17:12:32.319152Z",
|
||||
"name": "Select Channels and Affordances",
|
||||
"description": "Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximise an influence operation\u2019s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content.",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--40338e40-9ab4-470d-bf26-19bb94cf9045",
|
||||
"id": "bundle--6b5c6735-b69e-4d71-8d85-fbe5fc37bfbf",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--3fa1ad18-ca09-40ed-be45-f210b9c07e0b",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.185109Z",
|
||||
"modified": "2023-09-28T21:25:13.185109Z",
|
||||
"created": "2024-08-02T17:12:32.320208Z",
|
||||
"modified": "2024-08-02T17:12:32.320208Z",
|
||||
"name": "Drive Offline Activity",
|
||||
"description": "Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline.",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--4aef62b2-77b6-4405-8596-e2f470ee224c",
|
||||
"id": "bundle--f7f0b2ef-f30f-4070-9f4d-1b1547f82f0e",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--431af018-56ae-406c-9648-4857f074fffc",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.180855Z",
|
||||
"modified": "2023-09-28T21:25:13.180855Z",
|
||||
"created": "2024-08-02T17:12:32.316693Z",
|
||||
"modified": "2024-08-02T17:12:32.316693Z",
|
||||
"name": "Plan Objectives",
|
||||
"description": "Set clearly defined, measurable, and achievable objectives. In some cases achieving objectives ties execution of tactical tasks to reaching the desired strategic end state. In other cases, where there is no clearly defined strategic end state, the tactical objective may stand on its own. The objective statement should not specify the way and means of accomplishment but rather the goal the threat actor wishes to achieve. ",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--e3eeb954-2439-49c2-88bb-fcfd224bb58a",
|
||||
"id": "bundle--fd1b176a-2423-440f-aa63-09b5387b1681",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--4a9c3d11-801b-4ee9-a5bc-b5bc042a92f9",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.184288Z",
|
||||
"modified": "2023-09-28T21:25:13.184288Z",
|
||||
"created": "2024-08-02T17:12:32.319893Z",
|
||||
"modified": "2024-08-02T17:12:32.319893Z",
|
||||
"name": "Deliver Content",
|
||||
"description": "Release content to general public or larger population",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--e92a0dc6-22a3-48af-ae7a-c3788871e273",
|
||||
"id": "bundle--5b2f0531-0898-43fb-b50e-bada4fe95404",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--82039146-59a3-4353-b328-a422da34db6b",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.182374Z",
|
||||
"modified": "2023-09-28T21:25:13.182374Z",
|
||||
"created": "2024-08-02T17:12:32.318087Z",
|
||||
"modified": "2024-08-02T17:12:32.318087Z",
|
||||
"name": "Develop Content",
|
||||
"description": "Create or acquire text, images, and other content",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--8fdbde27-7007-4be3-9741-d0e4a4dbd77f",
|
||||
"id": "bundle--36c1be7b-91f0-4ae9-bc0d-9600a9913837",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--8a96b3ce-332e-4685-8ec6-5140eef192a4",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.183576Z",
|
||||
"modified": "2023-09-28T21:25:13.183576Z",
|
||||
"created": "2024-08-02T17:12:32.319623Z",
|
||||
"modified": "2024-08-02T17:12:32.319623Z",
|
||||
"name": "Conduct Pump Priming",
|
||||
"description": "Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing.",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--c561d450-ae76-4161-9598-67847531f587",
|
||||
"id": "bundle--b38671b6-d748-4ff8-8932-e644a7074118",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--8f32bafc-edb2-4d3c-9b7e-e42a9147123b",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.187908Z",
|
||||
"modified": "2023-09-28T21:25:13.187908Z",
|
||||
"created": "2024-08-02T17:12:32.323279Z",
|
||||
"modified": "2024-08-02T17:12:32.323279Z",
|
||||
"name": "Establish Legitimacy",
|
||||
"description": "Establish assets that create trust",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,16 +1,16 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--4c1911e5-a0b6-4ada-bae9-ee314503ac71",
|
||||
"id": "bundle--a9eecd21-6a21-46b7-a79d-463ccabc5e15",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--acaf8903-418f-425a-93dc-8e1bfb626876",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.18167Z",
|
||||
"modified": "2023-09-28T21:25:13.18167Z",
|
||||
"created": "2024-08-02T17:12:32.317385Z",
|
||||
"modified": "2024-08-02T17:12:32.317385Z",
|
||||
"name": "Microtarget",
|
||||
"description": "Target very specific populations of people",
|
||||
"description": "Actions taken which help target content to specific audiences identified and analysed as part of TA13: Target Audience Analysis.",
|
||||
"external_references": [
|
||||
{
|
||||
"source_name": "DISARM",
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--b9899bec-37bb-4032-a83e-c844d855b0db",
|
||||
"id": "bundle--3e665718-cc2e-4727-8286-38854aaf7d0a",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--b03163eb-7e81-4fed-9819-641bf7c99507",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.179932Z",
|
||||
"modified": "2023-09-28T21:25:13.179932Z",
|
||||
"created": "2024-08-02T17:12:32.315732Z",
|
||||
"modified": "2024-08-02T17:12:32.315732Z",
|
||||
"name": "Plan Strategy",
|
||||
"description": "Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives.",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--5aecbbe7-4a9a-4a88-839f-7e13041260b2",
|
||||
"id": "bundle--969ae781-05f1-4bef-a83d-a1dfbbf6ec67",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--dffcf337-d4d9-449b-aa9c-6a97a891c5a9",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.186189Z",
|
||||
"modified": "2023-09-28T21:25:13.186189Z",
|
||||
"created": "2024-08-02T17:12:32.320492Z",
|
||||
"modified": "2024-08-02T17:12:32.320492Z",
|
||||
"name": "Persist in the Information Environment",
|
||||
"description": "Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign.",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--58694133-2400-4c47-a4ac-6b2e76740824",
|
||||
"id": "bundle--558c8a96-9961-4f4e-b383-07377fbbfcec",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--f0505ac9-8979-49e4-a87c-d1109536a7db",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.188786Z",
|
||||
"modified": "2023-09-28T21:25:13.188786Z",
|
||||
"created": "2024-08-02T17:12:32.324963Z",
|
||||
"modified": "2024-08-02T17:12:32.324963Z",
|
||||
"name": "Drive Online Harms",
|
||||
"description": "Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations.",
|
||||
"external_references": [
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
{
|
||||
"type": "bundle",
|
||||
"id": "bundle--1d8616ee-7364-4497-84df-ab4881152510",
|
||||
"id": "bundle--7b19bab9-0254-469a-84b8-10a21bce4431",
|
||||
"objects": [
|
||||
{
|
||||
"type": "x-mitre-tactic",
|
||||
"spec_version": "2.1",
|
||||
"id": "x-mitre-tactic--fd1e7dd3-63d0-4040-808e-3e61b9ddca86",
|
||||
"created_by_ref": "identity--f1a0f560-2d9e-4c5d-bf47-7e96e805de82",
|
||||
"created": "2023-09-28T21:25:13.187521Z",
|
||||
"modified": "2023-09-28T21:25:13.187521Z",
|
||||
"created": "2024-08-02T17:12:32.32137Z",
|
||||
"modified": "2024-08-02T17:12:32.32137Z",
|
||||
"name": "Develop Narratives",
|
||||
"description": "The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a \"\"whole of society\"\" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives centre more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline.",
|
||||
"external_references": [
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue